A new find by the researchers at CA Security have unearthed a new kind of malware on andriod which can record infected devices conversations and uploads it to a remote server !
Andriodians beware
Source: http://community.ca.com/blogs/securityadvisor/archive/2011/08/01/a-trojan-spying-on-your-conversations.aspx
Another reason why it's important to check the permissions for an app before installing it. I'm bad about sometimes just hitting ok without looking but usually I'll go back and check afterwards just in case.
Check out Permissions Denied and Privacy Blocker in the market, they are both good apps that will prevent apps from getting permission to do stuff you don't want them to. Just be aware that the affected app may FC if it tries to do something and you have it blocked. I believe CM7 now is also able to block permissions on an app by app basis.
I usually have some sort of security installed on my phone. Regardless of checking apps before you install them, is this something I should continue to do? I flash new ROM's / ROM updates quite often, and I worry sometimes that it may be a good idea to make sure that Lookout, which is the anti-virus / anti-malware program that I use is installed before I do anything else.
I usually try to read the permissions, and some apps go out of their way to use permissions that are not necessary. I have been using Lookout Mobile Security, but I am not sure how well it works.
I think its time phone makers start inculcating permission management as in CM 7 in to there builds to help user's control these things. You could also use LBE Privacy guard, to control apps.
xHausx said:
Another reason why it's important to check the permissions for an app before installing it. I'm bad about sometimes just hitting ok without looking but usually I'll go back and check afterwards just in case.
Check out Permissions Denied and Privacy Blocker in the market, they are both good apps that will prevent apps from getting permission to do stuff you don't want them to. Just be aware that the affected app may FC if it tries to do something and you have it blocked. I believe CM7 now is also able to block permissions on an app by app basis.
Click to expand...
Click to collapse
Another nice app for this is called LBE Privacy Guard. I'm also a bit lax on checking before installing, but LBE will ask you in your notification window to confirm each perm. Allowing you to choose permit, ask each time it needs it, or deny access all together. I use it to deny access for network on games that don't need it to function and phone identification for almost all apps as most really don't need that info to work.
Which software to record calls?
Hi there,
as far as I know you cannot really record calls in Android becuase you can not intercept the phone directly. Therefore basically all phone recording software requires you to switch to speaker mode and records the call via the microphone (which may result in very bad audio quality, depending on your location).
Or is there now another (a better) way to record calls? Does an app exist, which records calls?
Kind regards,
∵ ToBe
ToBe_HH said:
as far as I know you cannot really record calls in Android becuase you can not intercept the phone directly. Therefore basically all phone recording software requires you to switch to speaker mode and records the call via the microphone (which may result in very bad audio quality, depending on your location).
Click to expand...
Click to collapse
That was my understanding of it as well.. heck for the Desire you need to be rooted, flash a specially-modified kernel, and have the correct radio ROM flashed.
ToBe_HH said:
Hi there,
as far as I know you cannot really record calls in Android becuase you can not intercept the phone directly. Therefore basically all phone recording software requires you to switch to speaker mode and records the call via the microphone (which may result in very bad audio quality, depending on your location).
Or is there now another (a better) way to record calls? Does an app exist, which records calls?
Kind regards,
∵ ToBe
Click to expand...
Click to collapse
there is one, works well with sony ericsson x10 mini pro, from android market
https://market.android.com/details?id=com.schass.recording.call&feature=search_result
I installed "LBE Security Service". (needs root) : works great
The author writes:
Protect your privacy by controlling the permission of each application to access your sensitive data.
- Block malicious operation from Mal-wares and Trojans.
- Block unwanted network traffic if you don’t have a unlimited data plan.
- Find out which application is trying to steal your privacy by checking the security log.
But apps like Angry Birds steal nearly everything from your (Position, Contacts ,SMS and so on) so i think there should be a general rule in the market which forbids things like Call recording(really man who needs this ^^) , and personal data stuff only the Position for apps who really needs this. And i mean nearly every free apps sells your data and this is not so cool i think you dont know nothing what happends to this data and I think there is alot to do on every mobile OS ( for every os is an angrybirds convert ^^), I knew at s60 (Symbian) there were a lot of antivirus kits to download(kaspersky, Bitdefender etc) maybe they will now see the market of android for antivirus softworks
dstyl said:
But apps like Angry Birds steal nearly everything from your (Position, Contacts ,SMS and so on) so i think there should be a general rule in the market which forbids things like Call recording(really man who needs this ^^) , and personal data stuff only the Position for apps who really needs this. And i mean nearly every free apps sells your data and this is not so cool i think you dont know nothing what happends to this data and I think there is alot to do on every mobile OS ( for every os is an angrybirds convert ^^), I knew at s60 (Symbian) there were a lot of antivirus kits to download(kaspersky, Bitdefender etc) maybe they will now see the market of android for antivirus softworks
Click to expand...
Click to collapse
just checked and angrybirds has no permission to access anything you mentioned, it only has full network access for ads (cm7 permission revoked) and read network state, thats all.
Droid Wall
I think just by using droidwall you can already squish a lot of malicious intentions an app has.
Its allows you to set a whitelist (or blacklist) of apps that you would allow to block packets from being sent.
What's great about it is:
1. it doesnt drain your battery, because it doesnt run as a service, but modifies your device's iptables
2. one of its features is logging your network activity so you could see which apps are actually sending or downloading data... this is helpful if you got a doctored copy of your favorite game or app. In case that app was modified to spy-on-you you can still block it
wow, then I think that I'll delete my entire mobile memory and apps and then start installing apps over again but I have to read the permissions very well this time.
Google should do something serious about that!
Thanks.
@FadeFX
Sry my fault Only the iOS version of angry birds steals psw ,contacts etc.
http://online.wsj.com/article/SB10001424052748704694004576020083703574602.html?mod=what_they_know
there are the most apps who are watching u so if you are unshure take a look
For Android and iOS users knows anybody sm about apps who steals your data on WP7 ?
______________________________
LG e900 MFG Unlocked Mango Beta 2 <------------ Nokia 6630
Pretty much all apps need some kind or the other kind of permission .. so the wise thing is to look up these permissions while installing app or use any one of the other apps to do that for you ..
Pretty much all apps need some kind or the other kind of permission .. so the wise thing is to look up these permissions while installing app or use any one of the other apps to do that for you ..
__________________
Phone: Htc Desire HD (ACE)
Rom: HONEY3D 1.1
Radio:12.48.60.23p_26.08.04.07_m3
Kernel :Kquicksall
Recovery: 4 EXT CWM 3.0.2.8
OC : No frills
Yes ,but if you use an iOS device there came no permission screen ,so you have to lock it up in the Appcontract what this app does in background , so it seems like the only way to get malware on an Android/WP7 seems to dont read the Permissions and only click ok ( imean if you install a FartMaschine or sth. and it needs your Position data to work there must be something bad in the background
I mean for kids who uses there phone or ipod or whatever this is a really big responsibilty and u cant except from an 10 or 14 year old kid to take care about that i think these data stealing apps should be forbidden ,if you read the article you see that from 101 tested apps 56 send user data to different networks. Both the Android and iPhone versions of Pandora, a popular music app, sent age, gender, location and phone identifiers to various ad networks so i think there have to be a cut by the law. For me it was a new world to because i had an s60v2 device from 2004 till the last month so i had to learn to take care what my phone knews about me.
_____________________________________________
LG e900 MFG Unlocked Mango Beta 2<----------Nokia 6630
I never look at the application permissions, but this made me rethink after installing some applications...
Related
Last night browsing the market, after having my phone reset for constant rebooting, I downloaded an app called "adult videos." I woke this morning to find the app wiped from my phone and from the market. Now, the problem lies not in the fact that this app is missing from my life, but in the question is google sneaking around in the middle of the night tampering with people's phones? I read that article about google remotely removing apps from phones strictly on a necessity based need. It kind of makes me wonder how selective they will be when determining what is necessary.
Google has the ability to do this and have flexed their muscles with that feature too recently,cant post links but google: "google remove android application". It uses google talk to send these removal requests. In normal conditions google will only delete apps that were malicious. (spyware/damaging/ddos/fraud/etc)
Most smartphone/ebook platforms have remote kill switches now. The more worrying part is that they also have the ability to install apps onto remote phones.
Google does this with android too? This is one of the reasons I dont like apple. This sounds like rediculous invasion of privacy. How does this work exactly?
Read the link.. disturbing both the install assett and the remove asset options. Plus the fact that Android maintains a constant data connection. Is there anyway to kill this constant connection? do you get charged for it? and can you disable the install and remove assett options?
It's Google, they live and survive off your information!
They went round WiFi snooping when they did Streetview, so God knows what they do with your mobile phone...
hungry81 said:
Google does this with android too? This is one of the reasons I dont like apple. This sounds like rediculous invasion of privacy. How does this work exactly?
Read the link.. disturbing both the install assett and the remove asset options. Plus the fact that Android maintains a constant data connection. Is there anyway to kill this constant connection? do you get charged for it? and can you disable the install and remove assett options?
Click to expand...
Click to collapse
This connection is maintained by using google talk. So as long as you are online on google talk you have a hotline to the kill switch. After these security concerns I bet some chefs are working on ROM with the kill switch disabled. But nearly all smartphones have kill switches nowadays, companies like Google, Apple and Microsoft don't want to be seen as unable to get rid of a malicious app which would impact on their reputation.
Edit: Thinking about it, if you have extreme worries about this, install some kind of firewall (like iptables (requires rooting)) and block mtalk.google.com.
The best part about these google phones is the ability to make them your own. I am currently waiting for cyanogen's mod 6 which I am pretty sure won't constantly chat with google, but I think that the fact should be recognized of who the major players are in the cell phone game. Remember that 'incident' google had with china, and how the NSA and google became friends after that. Hmm... The largest data analyzer teaming up with the largest data collector, google also reports higher sales every quarter now as well, that is alot of direct connections with alot of people. I'm not sayin' anything...I'm just sayin'.
El_Zilcho said:
Edit: Thinking about it, if you have extreme worries about this, install some kind of firewall (like iptables (requires rooting)) and block mtalk.google.com.
Click to expand...
Click to collapse
Ummm..... no.
r3s-rt said:
Ummm..... no.
Click to expand...
Click to collapse
Umm why not? Its a Linux system below the dalvik vm. There are people who got iptables running on their system and when done correctly iptables. Be aware when I talk about this, I am talking tin foil hat style here.
What if someone modifies AOSP code to just remove the INSTALL_ASSET and REMOVE_ASSET portions of the code?
Google, don't go Apple way!
http://threatpost.com/en_us/blogs/android-also-gives-google-remote-app-installation-power-062510
Old news, but they've made me "a little bit" angry Is there any way to remove all that crapware?
hmmmmm well figuring they just got in trouble for stealing multiple GB of data from private routers I'd say its a sure bet. Also I recently took a federal job and low and behold they already had my gmail account on file even though I have never given it out and only use it for family and friends, but the feds sure had it.
I am new to Android. Just got my Vibrant. I want to protect this phone so that in case it is lost or stolen I can recover it. Could you tell me what are some of the best apps for this?
Here is a list of names I know about for now:
Where's My Droid - This is currently installed, but required me to send a text to my phone to activate the GPS and even then it won't keep the GPS active long enough to get a precise location. Furthermore, it can alert the would be robber.
Glympse - well, this is not for stolen phones
Wavesecure - couldn't find any good threads on this. Seems to have an annual subscription fee of $19. I don't want that. Just want a standalone tracker.
Remote security - Not clear that this is a good app.
TheftAlarm - Again, developed in foreign language and I don't know how good it is
MobileDefense - Maybe this is the best app, but it is still in beta and no more users are accepted. I already filled out a request.
Find My Android - Was suggested in this thread, but it doesn't seem to be different from Where's My Droid, except the notification when SIM is replaced.
Lookout Mobile Security - Doesn't seem bad, but it doesn't lock your phone remotely. Can easily uninstall the program. I also found out that I better use a different email address than the one my phone gets otherwise the phone gets an email with "location" of the phone when you look it up online. This is better than Where's My Droid since you can do it more discreetly online, without sending texts (but have to make sure the email you use is not managed by the phone).
Am I missing something? I really want to protect this phone and it is frustrating that among so many apps, we seem to be missing good anti-theft solutions. Preferably I want something that can lock the phone remotely and allow me to do things without interruptions from the thief or at least discreetly. What would you recommend?
Also, I have a rooted (stock) Vibrant.
Thanks.
Where's My Droid isn't exactly very subtle about sending out replies, the author basically said there's nothing he can do.
Most of the other options include AntiVirus and other nonsense, and are expensive or questionable.
Tasker can automatically upload GPS, respond to an email or SMS to do so.. If you send it the right command it could take pictures periodically, make an outgoing call, whatever... It's extremely flexible in what it can do.
khaytsus said:
Where's My Droid isn't exactly very subtle about sending out replies, the author basically said there's nothing he can do.
Most of the other options include AntiVirus and other nonsense, and are expensive or questionable.
Tasker can automatically upload GPS, respond to an email or SMS to do so.. If you send it the right command it could take pictures periodically, make an outgoing call, whatever... It's extremely flexible in what it can do.
Click to expand...
Click to collapse
WOW! Ok, but the question is - 1.can it lock the phone remotely? 2.What happens if the thief uninstalls Tracker or changes the SIM (can you password protect it)? Finally, 3.can it take picture AND email them remotely? Otherwise, I don't see much use to this feature if the phone is gone.
Lookout seems rather good, but I have not tested it personally. I'd add a link, but I'm a new user. Should be easy to find with a Google/Market search, though.
Well that (un installing tasker)may be the case with any tech anti theft, if the thief is smart and careful they will wipe/reset/format whatever they took, rendering a soft lo jack useless
I would just get tasker and lookup findmyandroid on lifehacker, its the best current option
Captiv
Yeah, I found out about LookOut on Android forums. I have installed it. It doesn't allow you to lock the phone remotely and can easily be uninstalled.
As for Find My Android, I don't see how is it different from Where's My Droid., maybe except the part where you're notified if the SIM card is replaced.
I updated the original post.
Find my android isn't the name of the app, its what the lifehacker post is tagged as (#findmyandroid)
The program is tasker, and its more customizable and it can turn on gps
Captiv
Sure, Lookout can be uninstalled, as can any other app. But really, you should have some sort of password on your device. With pattern unlock, there's really no reason not to do so.
According to one of the devs on their forums, remote locking as well as "other features" will be coming to Lookout "very soon".
https://lookout.zendesk.com/entries/24881-remote-lock
In the meanwhile, I use WaveSecure for locking my phone and Lookout for tracking, as its mechanism seems much better.
If you want to prevent Lookout from being uninstalled, just move the apk to /system/app (assuming your phone is rooted).
I have had Wave Secure since the Beta (it is free to beta testers) and love it. I can understand not wanting to pay, but it really is a great app. They have a zip file that you can flash in recovery if you are rooted. That will prevent the app from being erased if the phone is factory reset. I have also been using an app lately called "Tasker". It can track your phone, although I have not used it for this. Here is a link to the Wiki.
http://tasker.wikidot.com/locatephone
GPS Tracker by Instamapper is the one I use most. With a text message, it will return its location via Google maps. It will continually do so for as long as you have it set up for. Every 10 Seconds, Every 2 minutes, Every half hour, etc. I used it to track my stolen phone with the laptop in the car. This app saved me from buying a new phone.
stickerbob said:
I have had Wave Secure since the Beta (it is free to beta testers) and love it. I can understand not wanting to pay, but it really is a great app. They have a zip file that you can flash in recovery if you are rooted. That will prevent the app from being erased if the phone is factory reset. I have also been using an app lately called "Tasker". It can track your phone, although I have not used it for this. Here is a link to the Wiki.
http://tasker.wikidot.com/locatephone
Click to expand...
Click to collapse
Same here. Glad I got it while it was still a beta!
Worrying article on how apps are using personal information.
www.theregister.co.uk/2010/09/30/suspicious_android_apps/
I'm sick that they had to go too such lengths to find out. We need a better net architecture to enable a proper firewall to work.
Sent from my HTC Desire using XDA App
Also, app naming FAIL!
Well, since they only tested 30 apps and won't release the names of the ones they tested, only saying that they are "the most popular", personally I don't buy it.
And the information these apps are sending out is primarily geolocation. Well, no ****. If an app wants your location and you don't think it should have it, it's either using it for ads or you should decline to install the app and just send an email to the dev asking him why he needs that information.
tjhart85 said:
Well, since they only tested 30 apps and won't release the names of the ones they tested, only saying that they are "the most popular", personally I don't buy it.
And the information these apps are sending out is primarily geolocation. Well, no ****. If an app wants your location and you don't think it should have it, it's either using it for ads or you should decline to install the app and just send an email to the dev asking him why he needs that information.
Click to expand...
Click to collapse
Agreed... geolocation is pretty obviously straight forward. I don't know about the 'transmissing every 30 seconds' thing though.
Any thoughts ont he transmitting sim card and IMEI info?
http://www.youtube.com/watch?v=qnLujX1Dw4Y
Also discussed here:
http://forum.xda-developers.com/showthread.php?t=795702
With explanation where to get it from http://www.appanalysis.org/
A very well-written reply by "Steven Knox" on The Register, demonstrating how this 'research' is simply a pile of intentionally-misleading statistical rubbish:
By selecting only from applications that access both personal data and the internet, they're overstating the significance of their study by about 3x. Furthermore, their summaries blur this distinction unnecessarily.
Specifically, their FAQ says "We studied just over 8% of the top 50 popular free applications in each category that had access to privacy sensitive information in order to get a sense of the behaviors of these applications." Since there were 22 categories at the time they did the study, that would imply (22*50=1,100 * 8% =) 88 applications. However, they actually only tested 30, because of the 1,100 top 50 applications only (from the PDF) "roughly a third of the applications (358 of the 1,100 applications) require Internet permissions along with permissions to access
either location, camera, or audio data." -- meaning that the other 742 apps don't have the necessary permissions to play badly. The clause "..that had access to privacy sensitive information in order to get a sense of the behaviors of these applications." from the FAQ is grammatically ambiguous in this case (it may refer to "applications" or "category"), and not specific enough to indicate that over 2/3 of the applications are (relatively) safe by dint of not having the necessary permissions.
They also didn't include in their study apps from 10 of the 22 categories, but they don't explain whether that was due to a) there not being any or enough applications in those categories that required internet and personal data permissions, b) a conscious choice to focus on the other 12 categories, or c) the results of random selection (with an explanation of why they did not use a stratified sample).
Once you factor back in the applications they ignored, the numbers don't look quite so bad. Assuming their sample was representative, 2/3 of the 358, or about 239 applications of the top 1,100 of the time use personal data suspiciously. That's about 21.7% or just over 1 in 5 -- still significant, but a far cry from 2 out of 3. In fact, the worst case maximum is actually 358 of 1,100 or just under 1 in 3 (32.45%) because they are as mentioned above the only ones that actually acquire the permissions necessary to do anything "suspicious".
I understand why both the researchers and the reporter used the 2/3 figure -- you all believe you have to sell the point as hard as possible*. But the real story is that it's likely that at least 1 in 5 Android Apps use private data "suspiciously" -- and that number is still high enough to cause concern and to justify the further use of tools like TaintDroid. It's a pity you didn't trust the facts enough to avoid the unnecessary sensationalism.
*I am assuming, here, that Mr. Goodin did actually read and digest the paper as I did, rather than simply picking out the figures from the study, the FAQ, or a press release.
Click to expand...
Click to collapse
good spot. But one in ten woolf be too many. The point is we should have more fine grained control and transparency off what apps do over the net, and we can't, by design.
Sent from my HTC Desire using XDA App
We need to develop a shim that reports modified IMEI/SIM data for different apps. IMO, very few apps need that information. We may not be able to keep all those apps from sending our private information, but we can make that information useless if it appears that we all are using the same IMEI/SIM...
patp said:
...The point is we should have more fine grained control and transparency off what apps do over the net...
Click to expand...
Click to collapse
agreed....
if you are rooted. With Root Explorer go to /data/system/ and open accounts.db you might be surprised what you find in it... Some people it will be fine for but mine it shows my exchange email and password in plain text and a few others show up as plain text has well...Its not geo they are worried about (for the most part) and...this file has been known about for awhile
Don't worry though unless your downloaded android specific virus holding apps you wont have any problem. And if your getting all your apps legally through the market then its no big deal =) and if your pirating them...well I don't feel bad for you...
echoside said:
if you are rooted. With Root Explorer go to /data/system/ and open accounts.db you might be surprised what you find in it... Some people it will be fine for but mine it shows my exchange email and password in plain text and a few others show up as plain text has well...
Click to expand...
Click to collapse
Opened it, my accounts are there, but no passwords....
rori~ said:
Opened it, my accounts are there, but no passwords....
Click to expand...
Click to collapse
my gmail is somesort of encrypted but doesnt look that great.
Exchange shows up
facebook doesnt show anything at all aha
Thats why I said some might not have anything. Awhile back when I first heard about it one of my friends had two or three right there in plain English I didn't have a phone at the time to check...
Its been reported before but kind of just brushed over no biggy. To go real conspiracy theorist....I think apple is submitting all these articles...
ButtonBoy said:
We need to develop a shim that reports modified IMEI/SIM data for different apps.
Click to expand...
Click to collapse
Great idea
The source code/instructions for TaintDroid are now out:
http://appanalysis.org/download.html
Anybody found a (recent) kernel with built-in TaintDroid-support?
Hi, I'm a noobie when it comes to Android. Actually, I will be buying my phone only tonight. I have been researching some apps, and I have become a little concerned about security. Using the Permission tab in the Android Market place to see what the app is up to, has raised some red flags. For example Winamp is accessing phone state/identity and sensitive logs. An other app was accessing the contact list. These apps have no reason to be touching that part of my phone, but yet they are. A music app does not need to know my phone's ESN. If the app needs to profile me, then I should have an account and log in.
Am I being paranoid or does any one else share these concerns?
You are absolutely right to be paranoid and kudos to you for actually checking the permissions page. If something raises a red flag with you then don't touch it. Even if the dev isn't hell bent on stealing your secrets, it will send a message that people don't want every app to have unlimited access to everything that's on their devices.
Security is starting to become an issue with Android so clearly people need to be paying attention to what they are installing.
Unless you are familiar with the programming, it's hard to say for sure...a music app may need to know phone state to pause and resume music when you get a call or to be able to assign songs as ringtones... just use your best judgement, or email the dev to ask why the permissions are required.
HTC incRedibly-reEngineered
Is there anywhere on the net that certifies an android app as non malware?
I can recommend https://www.mylookout.com/ it's free as well,there is also a premium paid service if you so wish.
I have a Huawei p30 phone with last security patch received in august 2020, not rooted and never been in strangers hands.
This crazy psycopath woman has been stalking me badly for a year, but then in september 2020 she shared a weird (fake) video with the image of a pixeled pony on my Facebook page. I clicked on it but strangely it won't open. Few hours later this crazy woman deleted the fake video and begun to write me about things I said privately to a friend via Whatsapp! and in the following months she started insulting me with fake Instagram profiles every time I chatted privately with other girls, making fun of the things I wrote to them. She seems to see everything on every social network! And even when I took a picture with a girl that I never shared but only had privately in my gallery, she reacted to it by insulting me!
I don't know what kind of trojan or RAT is this but I would like so much to get rid of it!
1) Can you guys tell me how can I get rid of this RAT? I've already searched with Kaspersky, Malawarebytes, Avast for Android but they can't see a damn thing.
2) Can I put my sim card with my whole whatsapp (and related backup messages and contacts) on a new device or I am going to risk?
3) Can I keep my Gmail and Instagram accounts by disconnecting them from the hacked device and changing passwords from a new device?
THANKS
Personally don't think your phone got infected by a RAT and/or Trojan: this type of malicious software requires root-access get granted to it.
IMO your issue is related to the social media you make use of, the method you login there, the passwords you use with this accounts.
You know that FB, WA and Instagram basically are ONE company, that your related account details get shared between them?
jwoegerbauer said:
Personally don't think your phone got infected by a RAT and/or Trojan: this type of malicious software requires root-access get granted to it.
IMO your issue is related to the social media you make use of, the method you login there, the passwords you use with this accounts.
You know that FB, WA and Instagram basically are ONE company, that your related account details get shared between them?
Click to expand...
Click to collapse
If you look around over the Internet there is PLENTY of new generation RAT trojans that take root permissions of Android phones with just one click. Some of them are called drive-by download, they use a buffer overflow mechanism. Off course you need security holes for this to happen, and Huawei is very very exposed to this, they never release security patches! Even the police officer I talked to when I filled the complaint told me that they see many cases like these. It's absolutely possible.
Columbus93 said:
If you look around over the Internet there is PLENTY of new generation RAT trojans that take root permissions of Android phones with just one click. Some of them are called drive-by download, they use a buffer overflow mechanism. Off course you need security holes for this to happen, and Huawei is very very exposed to this, they never release security patches! Even the police officer I talked to when I filled the complaint told me that they see many cases like these. It's absolutely possible.
Click to expand...
Click to collapse
I want to say one thing to the one guy laughing underneath my post. ALL of my accounts were protected with double step autentication (2FA) and just yesterday, my phone received a series of notification about a Google chromecast device that was connected to my Huawei p30. I even got the last notification saying "you succeded connected google chromecast to your device". Now tell me how this is even possible, because I never had a google chromecast device and I was at work the whole time! Looks like there's a clone of my p30 smatphone out there. Do not aswer if you have no clue about new hacking programs.
1. Make sure that you have finished a full data backup.
2. Do a factory reset + wipe cache.
3. Change your passwords ASAP.
Just for your reference.
A side remark dedicated to visitors here who don't know what a RAT is:
A RAT ( read: Remote Administration Tool ) is an Android app that always runs as an Android service, what gets started at Android's boot. It has initially been developed as an university project. A RAT consits of a client module ( the mentioned Android service ) and a server module located somewhere outside of Android device, reachable via Android's network connection.
A RAT's client module only can get installed on Android devices with unlocked bootloader, AVB disabled and rooted Android. It's the user - and ONLY he /she - who allows a RAT service to get installed on Android
These are a RAT's functionalities typically available
Get contacts (and all theirs informations)
Get call logs
Get all messages
Location by GPS/Network
Monitoring received messages in live
Monitoring phone state in live (call received, call sent, call missed..)
Take a picture from the camera
Stream sound from microphone (or other sources..)
Streaming video (for activity based client only)
Do a toast
Send a text message
Give call
James_Watson said:
1. Make sure that you have finished a full data backup.
2. Do a factory reset + wipe cache.
3. Change your passwords ASAP.
Just for your reference.
Click to expand...
Click to collapse
About the backup: can I just connect the hacked phone (offline) to a clean PC to transfer my files? I am afraid I'll transfer also the rat this way!
jwoegerbauer said:
A side remark dedicated to visitors here who don't know what a RAT is:
A RAT ( read: Remote Administration Tool ) is an Android app that always runs as an Android service, what gets started at Android's boot. It has initially been developed as an university project. A RAT consits of a client module ( the mentioned Android service ) and a server module located somewhere outside of Android device, reachable via Android's network connection.
A RAT's client module only can get installed on Android devices with unlocked bootloader, AVB disabled and rooted Android. It's the user - and ONLY he /she - who allows a RAT service to get installed on Android
These are a RAT's functionalities typically available
Get contacts (and all theirs informations)
Get call logs
Get all messages
Location by GPS/Network
Monitoring received messages in live
Monitoring phone state in live (call received, call sent, call missed..)
Take a picture from the camera
Stream sound from microphone (or other sources..)
Streaming video (for activity based client only)
Do a toast
Send a text message
Give call
Click to expand...
Click to collapse
So you are basically telling everyone that when FBI is live monitoring your smartphone, that's because you CHOOSE to ALLOW a RAT service to get installed into your smartphone? I never ever allowed this thing to install inside my phone, all I did was to click on that fake video! and things like this, to mutuate the words of the police officer I talked to, do happen all the time!
My last 2 cents here:
If someone ( like FBI employee, spouse, life companion, etc.pp ) wants to monitor everything on your Android phone not having your phone in hands, wants to access your phone's data not having your phone in hands, he / she must install a monitoring app or RAT software ( e.g. AndroRAT ) on your Android phone. Point.
Have a nice day.
jwoegerbauer said:
My last 2 cents here:
If someone ( like FBI employee, spouse, life companion, etc.pp ) wants to monitor everything on your Android phone not having your phone in hands, wants to access your phone's data not having your phone in hands, he / she must install a monitoring app or RAT software ( e.g. AndroRAT ) on your Android phone. Point.
Have a nice day.
Click to expand...
Click to collapse
I'm positive with what you say, but I'm also saying that this monitoring app CAN be disguised as fake video or image, thus by clicking on it you will inadvertitely launch a series of payloads that will root and then hack your phone. This is a fact. It happened to me and if you give a look online you'll see how this works and how many apps are doing this (obviously you need HUGE security holes in your device to do that, and older Huawei devices, which are rarely updated, do have them).