Infinix note 10 attack - General Questions and Answers

I have being facing seriously issues with my infinix note 10 for over a month now. Unknown hacker took over my device controlling and disturbing my devices. I have changed up to 3 phone which they are still controlling till now. I seriously don't know what have done wrong.
Please the awesome form. I have come to you for recue from this unknown hackers. Both my emails, whatsapp, phone call and test messages is being controlled remotely with a lot of different apps downloaded on my phone.
Please I need help I beg you .... This are the many things downloaded on my phone.

Most of those are either integrated system processes or otherwise appear innocuous. I'm not sure how much help we can be if you believe someone has hacked you.
This is what I would recommend:
Using a computer, log into your Google account. Go to the Security tab, sign out from all devices, and disable third party app access. Immediately change your password. Use a secure password consisting of, at a minimum, 8 characters including lowercase, uppercase, numbers, and special characters. Enable two factor authentication using your phone.
Factory reset your device, and be careful what apps you install.
Never, ever give anyone else your personal information and passwords.
Remember, the best way to avoid being the victim of identity or financial theft is to practice good security.

Okay thank you. But I will say that have done everything you just mentioned and the same is still happening. This unknown are always online and I think they are in groups. But anyway I appreciate your respond so much . I will keep looking for a way out. Thank you

Related

[Q] What is the best phone tracker/recovery app?

I am new to Android. Just got my Vibrant. I want to protect this phone so that in case it is lost or stolen I can recover it. Could you tell me what are some of the best apps for this?
Here is a list of names I know about for now:
Where's My Droid - This is currently installed, but required me to send a text to my phone to activate the GPS and even then it won't keep the GPS active long enough to get a precise location. Furthermore, it can alert the would be robber.
Glympse - well, this is not for stolen phones
Wavesecure - couldn't find any good threads on this. Seems to have an annual subscription fee of $19. I don't want that. Just want a standalone tracker.
Remote security - Not clear that this is a good app.
TheftAlarm - Again, developed in foreign language and I don't know how good it is
MobileDefense - Maybe this is the best app, but it is still in beta and no more users are accepted. I already filled out a request.
Find My Android - Was suggested in this thread, but it doesn't seem to be different from Where's My Droid, except the notification when SIM is replaced.
Lookout Mobile Security - Doesn't seem bad, but it doesn't lock your phone remotely. Can easily uninstall the program. I also found out that I better use a different email address than the one my phone gets otherwise the phone gets an email with "location" of the phone when you look it up online. This is better than Where's My Droid since you can do it more discreetly online, without sending texts (but have to make sure the email you use is not managed by the phone).
Am I missing something? I really want to protect this phone and it is frustrating that among so many apps, we seem to be missing good anti-theft solutions. Preferably I want something that can lock the phone remotely and allow me to do things without interruptions from the thief or at least discreetly. What would you recommend?
Also, I have a rooted (stock) Vibrant.
Thanks.
Where's My Droid isn't exactly very subtle about sending out replies, the author basically said there's nothing he can do.
Most of the other options include AntiVirus and other nonsense, and are expensive or questionable.
Tasker can automatically upload GPS, respond to an email or SMS to do so.. If you send it the right command it could take pictures periodically, make an outgoing call, whatever... It's extremely flexible in what it can do.
khaytsus said:
Where's My Droid isn't exactly very subtle about sending out replies, the author basically said there's nothing he can do.
Most of the other options include AntiVirus and other nonsense, and are expensive or questionable.
Tasker can automatically upload GPS, respond to an email or SMS to do so.. If you send it the right command it could take pictures periodically, make an outgoing call, whatever... It's extremely flexible in what it can do.
Click to expand...
Click to collapse
WOW! Ok, but the question is - 1.can it lock the phone remotely? 2.What happens if the thief uninstalls Tracker or changes the SIM (can you password protect it)? Finally, 3.can it take picture AND email them remotely? Otherwise, I don't see much use to this feature if the phone is gone.
Lookout seems rather good, but I have not tested it personally. I'd add a link, but I'm a new user. Should be easy to find with a Google/Market search, though.
Well that (un installing tasker)may be the case with any tech anti theft, if the thief is smart and careful they will wipe/reset/format whatever they took, rendering a soft lo jack useless
I would just get tasker and lookup findmyandroid on lifehacker, its the best current option
Captiv
Yeah, I found out about LookOut on Android forums. I have installed it. It doesn't allow you to lock the phone remotely and can easily be uninstalled.
As for Find My Android, I don't see how is it different from Where's My Droid., maybe except the part where you're notified if the SIM card is replaced.
I updated the original post.
Find my android isn't the name of the app, its what the lifehacker post is tagged as (#findmyandroid)
The program is tasker, and its more customizable and it can turn on gps
Captiv
Sure, Lookout can be uninstalled, as can any other app. But really, you should have some sort of password on your device. With pattern unlock, there's really no reason not to do so.
According to one of the devs on their forums, remote locking as well as "other features" will be coming to Lookout "very soon".
https://lookout.zendesk.com/entries/24881-remote-lock
In the meanwhile, I use WaveSecure for locking my phone and Lookout for tracking, as its mechanism seems much better.
If you want to prevent Lookout from being uninstalled, just move the apk to /system/app (assuming your phone is rooted).
I have had Wave Secure since the Beta (it is free to beta testers) and love it. I can understand not wanting to pay, but it really is a great app. They have a zip file that you can flash in recovery if you are rooted. That will prevent the app from being erased if the phone is factory reset. I have also been using an app lately called "Tasker". It can track your phone, although I have not used it for this. Here is a link to the Wiki.
http://tasker.wikidot.com/locatephone
GPS Tracker by Instamapper is the one I use most. With a text message, it will return its location via Google maps. It will continually do so for as long as you have it set up for. Every 10 Seconds, Every 2 minutes, Every half hour, etc. I used it to track my stolen phone with the laptop in the car. This app saved me from buying a new phone.
stickerbob said:
I have had Wave Secure since the Beta (it is free to beta testers) and love it. I can understand not wanting to pay, but it really is a great app. They have a zip file that you can flash in recovery if you are rooted. That will prevent the app from being erased if the phone is factory reset. I have also been using an app lately called "Tasker". It can track your phone, although I have not used it for this. Here is a link to the Wiki.
http://tasker.wikidot.com/locatephone
Click to expand...
Click to collapse
Same here. Glad I got it while it was still a beta!

[GUIDE] How to secure your android from attackers! Up your droid's survival skills!

{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Hello, my name is Keith and I'm interested in sharing tips with the community to protect you from losing your device to thieves or other attackers. I'm sure many on xda-developers have heard of stolen device recovery apps like Android Lost and Cerberus, this guide will involve these, but also walk you through avoiding mistakes that can result in you never getting your phone back from an attacker. While the two apps I mentioned are very powerful, it's not as easy as installing an app to insure you get your phone back the way you left it. I'll also include other methods of recovery for a plan B approach.
So lets begin!
REQUIREMENTS
A phone or tablet duh! (data plans are a plus, but not necessary to use this guide)
Root access helps quite a bit!
Knowledge involving recoveries like CWM or TWRP.
A secure launcher. By secure I mean one that can't uninstall apps outside of the settings menu (ADW Ex just fixed this!)
NO PIN ON LOCKSCREEN (explained)
Step 1:
Download Android Lost (no sms add-on for wifi-only tablets) OR Cerberus!
These two apps are for theft recovery. They allow you to do things like:
-Locate & Track GPS
-Lock Device (and unlock device if you're deadset on having a lock, not ideal for recovery)
-Sound Alarms
-Wipe Internal/External Storage
-Recover Call Logs
-Recover SMS Logs
-Popup messages on device(great for trolling thieves)
-Call Forwarding
-Device information (battery left, network status, etc)
-Capture Photos (get a mugshot for the police)
-Record Sound (Cerberus only)
Which should you choose and how are they different? Well a lot of people like Android Lost, it's free (as in beer) and can even be installed and utilized from your google account after your device is stolen. It's a little more wifi-only tablet friendly. Android Lost has a unique feature that lets it hide SMS commands sent to the phone from Android Lost so you don't alert the attacker.
That said I personally use Cerberus. It's a lot less suspicious looking, a little less known, and is easily flashed to your ROM's /system/app folder (even with the option of disguising itself as framework). Cerberus however, is not free, it has a small fee of $3-5 which protects up to 5 devices. I like that Cerberus is a little more featured with sound recording, and it can run as a device administrator (I don't think Android Lost does this).
Step 2:
After you've chosen a security application, the time comes to protect that application. You may have seen me mention above that it's recommended you don't put a lock screen on your device. Let me take a second to explain why. Google. The first page of results on google for "how to bypass lockscreen" has the potential to foil everything. It can lead to your attacker learning how to easily preform a hard reset, and for the sake of recovering your phone this is not optimal. My brother has stolen a few iphones, and not once has a lock ever stopped him (he's a mechanic not a computer guy).
I like to take an open door approach to security. Leave your door unlocked, but nail everything valuable inside to the floor. Now leaving your device open to everyone requires you to stop and think about what YOU need to protect. To start you must download an app locker. There are tons of these out there, some OEMs even ship devices with them these days. The one I am using in this guide is UAG, or Ultimate App Guard - check out UAG Helper as well to potentially protect UAG from deletion.
There are many apps and services you can lock in a variety of ways ranging from pins to patterns to passwords. Here are the basic things you should lock.
- Settings
- Root File Explorers (or even your stock explorer if you've got photos you're not keen of others seeing)
- Gmail (especially if it's the account you're registered for android lost/cerberus with)
- App Markets (so they can't install more apps like root file explorers or rack up charges to your account)
- Package Installer (so the attacker can't install third party apps like root browsers, uncheck 3rd party installs in settings when you don't need it anyway)
- ADB Toggle (uncheck adb in settings, download adb toggle to quickly toggle on and off as needed, even locked it's still quicker)
- Titanium Backup
- Rom Toolbox
- SD Maid and similar apps that can delete files
Now this isn't all you should lock, just the essentials. Try not to lock too much else or else the attacker will have motive to use google to figure out how to hard reset. Let them play angry birds, let them check facebook (don't remember passwords for important stuff), let them play with your toys basically.
If you are on a wifi only tablet, then locking settings will present an issue - they can't connect to networks for Android Lost or Cerberus. There are two things you can do about it.
- Download Wifi Manager and place it in a location the attacker will see it (I put it under the system app drawer in ADW)
- Preload as many wifi hotspots as you can think of (starbucks, mcdonalds, libraries, etc).
It is highly unlikely the attacker will not want to connect to the internet on your device, even it's only over wifi. So even if you have a data plan consider doing the above in case they decide it's not safe to use your phone service.
Step 3:
Other Security Threats to consider
Launchers
Many launchers seek to be powerful and give you quick control over every little detail. Unfortunately that means some of them allow uninstalls. Recently I reported an uninstall vulnerability in ADW Ex to it's developer, and he's patched it with a lock pin which specifically addresses this issue. So for example, in ADW Ex to uninstall anything or access important launcher settings the attacker would need to know your launcher's lock pin. I am unsure of the situation on other launchers, but always check and report it to the developer if it's vulnerable! Do not overlook this and underestimate the attackers ability to notice this stuff, it could cost you your phone.
Recovery
If you have your Anti-theft application flashed to your ROM this isn't SUPER important. But you're still vulnerable to those who flash over your ROM. Don't forget your backups either! Having an insecure backup sitting on your sd card can cost you your device. If this vulnerability bothers you, try resetting your recovery to stock, and use Mobile ODIN or NVFLASH. Very few attackers (if any?) will be connecting in APX mode over usb to flash a blob over NvFlash lol.
WARNING FOR CM10/AOKP USERS: Remove the reboot menus!! Reboot into recovery in the reboot options when the power is pushed couldn't make it more obvious to an attacker!
Terminals
It only takes a few commands in android for an attacker to delete a few important links in your security chain. You may want to consider locking your terminal if you're still paranoid.
Plan B approaches
Your Carrier
If you own a smartphone under Sprint, Verizon, or AT&T - don't ever let their sales reps tell you your carrier can't find your phone. They have no problem when it comes selling this information to law enforcement. Granted an attacker may remove the sim card, go into airplane mode, or a sales rep may not have that kind of access, it's still a possibility for them to access your phone's GPS or use tower triangulation. Unfortunately in this case, some carriers like T-Mobile don't collect this kind of data, great for privacy - not as much for security.
EXIF Data
I've talked to the developers of cerberus briefly about implementing features to enable geotagging on photos remotely, but something like this hasn't been implemented yet. However a reasonable amount of device identifying information is still stored in EXIF data of photos taken from your device. Websites like stolencamerafinder allow you to upload photos you've taken on your device and search the internet for photos with exif data containing your devices serial number. It also allows you to enter your serial number and search for that alone. This can potentially find an attacker's facebook profile with that beautiful mirror photo taken with your phone. Once you have a name, websites like spokeo or reverse whitepages lookups can help you find addresses to report to authorities.
Be sure to check your serial number beforehand so you can figure out if this method is reliable for your device.
SSH
Here's a classic recovery video I'll end this with, done largely over ssh.
Thanks for information
Sent from my WT19i using xda app-developers app
holy cow great info!!! i am one of those who just installed 'android lost' and was good to go. lots of things to consider in addition to that..the 'hard reset' being the most troublesome.
i like the trojan horse approach..just let them in but lock down anything important.
pa33vel said:
Thanks for information
Sent from my WT19i using xda app-developers app
Click to expand...
Click to collapse
nyvram1 said:
holy cow great info!!! i am one of those who just installed 'android lost' and was good to go. lots of things to consider in addition to that..the 'hard reset' being the most troublesome.
i like the trojan horse approach..just let them in but lock down anything important.
Click to expand...
Click to collapse
thank you both for posting. glad this could be of use to others.
I actually wrote this just as my buddy got his brand new galaxy note 2 stolen from starbucks. Tried to walk him through recovery but his phone wasn't prepared beforehand. He had some battery apps installed that completely screwed his chances of recovery.
Nice guide but pretty much every thief will take the battery out, throw out the sim and either sell it to the local phone guy or hard reset it themselves.
This guide will only work on people who happen to find a lost phone or those really stupid thieves who have no idea what their doing.
Sent from my GT-I9000 using xda premium
NIMBAH said:
Nice guide but pretty much every thief will take the battery out, throw out the sim and either sell it to the local phone guy or hard reset it themselves.
This guide will only work on people who happen to find a lost phone or those really stupid thieves who have no idea what their doing.
Sent from my GT-I9000 using xda premium
Click to expand...
Click to collapse
how will they hard reset a stolen phone without a recovery or adb? furthermore - cerberus is flashed to /system, so a reset alone won't work.
the moment the person they're selling it to tests out the wifi it's over.
How good is the avast anti theft thing.?
pa33vel said:
Thanks for information
Sent from my WT19i using xda app-developers app
Click to expand...
Click to collapse
Lifehacker7 said:
How good is the avast anti theft thing.?
Click to expand...
Click to collapse
I just checked it out it looks like it would get the job done. It's missing some features cerberus / android lost have, has one or two unique features I saw - the one I noticed is it sends you an email when you battery is low and as much geographic data as it can acquire. This may be annoying though because your battery gets low quite often.
Seems a litte bloated in some areas, I'm generally against virus scanners on android because as long as you're getting your apps from reputable sources and they're not requesting odd permissions you're really just vulnerable to zero day exploits that this software won't be programmed to detect. If you're a person that pirates apps, loads JavaScript in random emails sent to you, or downloads very obscure apps - this may be more useful.
Shame that we have to sacrifice battery for security apps.
ickkii said:
how will they hard reset a stolen phone without a recovery or adb? furthermore - cerberus is flashed to /system, so a reset alone won't work.
the moment the person they're selling it to tests out the wifi it's over.
Click to expand...
Click to collapse
How would you remove the recovery? I don't know how it is where you are but over here they can simply flash everything back to normal with JTAG. Most phones get shipped over seas anyway so yeah.
Oh and Samsung phones you can just flash back to stock in download mode. Sony I'm pretty sure you flash back to stock in flash mode as well.
Sent from my Sony Tablet S using xda premium
NIMBAH said:
How would you remove the recovery? I don't know how it is where you are but over here they can simply flash everything back to normal with JTAG. Most phones get shipped over seas anyway so yeah.
Oh and Samsung phones you can just flash back to stock in download mode. Sony I'm pretty sure you flash back to stock in flash mode as well.
Sent from my Sony Tablet S using xda premium
Click to expand...
Click to collapse
it varies by device, most easy thing to do is flash stock. I'd love to see a day where cwm or twrp implement a recovery pin. TWRP can pull up a keyboard, and it could be done with a volume rocker, so I'm not sure why they don't implement some kind of security feature to it.
You could always break your volume rocker :laugh:
crashlen0 said:
Shame that we have to sacrifice battery for security apps.
Click to expand...
Click to collapse
not in every case, just don't set your antenna rules too strict. My friend set it to only grant access when his bluetooth headset is connected, bad results for him.
Very useful tutorial. I'd give you more stars if I could. You’ve obviously studied this carefully. I also appreciate your taking the time to provide comments on avast.. .those comments were useful.
I’m just trying to think through the pro’s and con’s of the approach recommended in the guide. (open the front door but nail everything down inside).
The big con for me
It will take time to enter a pin/pattern/password for every sensitive application (gmail, settings, playstore, file manager, many more), rather then just one when I unlock my screen. It means I have to dramatically alter the way I use my phone every single day.
So I want to understand the benefit, the “why” a little better:
If someone steals my phone which is screen-locked and USB debuggin off (*), then the only way for them to get in is to do some kind of factory reset? Doesn’t that process remove all the sensitive information from the phone? i.e. they're not going to be able to get into gmail once they break in? . I did spend awhile googling as you mentioned methods breaking into the phone, but these answers weren't clear to me.
Where I'm coming from (My uninformed opinion fwiw): I’d like to get my phone back, but protecting my sensitive data is also important. So I'd like to understand if the likely break-in method an attacker will take facing a locked phone at least protects my sensitive data:
if it does block access to sensitive data, then it's not a total loss to allow them to do it (I've lost my phone but not my identify)
if it does not block access to sensitive data, then I'm much more interested in locking down the individual apps like gmail etc.
* By the way, I did see while googling they can get past locked phone without factory reset if you have USB debugging on. That would be a big deal since they could get to gmail etc if you rely soley on lock screen and have USB debugging on. I'm definitely turning it off and only on when I need it.
Thanks
Very useful
Thanks for information
electricpete1 said:
Very useful tutorial. I'd give you more stars if I could. You’ve obviously studied this carefully. I also appreciate your taking the time to provide comments on avast.. .those comments were useful.
I’m just trying to think through the pro’s and con’s of the approach recommended in the guide. (open the front door but nail everything down inside).
The big con for me
It will take time to enter a pin/pattern/password for every sensitive application (gmail, settings, playstore, file manager, many more), rather then just one when I unlock my screen. It means I have to dramatically alter the way I use my phone every single day.
So I want to understand the benefit, the “why” a little better:
If someone steals my phone which is screen-locked and USB debuggin off (*), then the only way for them to get in is to do some kind of factory reset? Doesn’t that process remove all the sensitive information from the phone? i.e. they're not going to be able to get into gmail once they break in? . I did spend awhile googling as you mentioned methods breaking into the phone, but these answers weren't clear to me.
Where I'm coming from (My uninformed opinion fwiw): I’d like to get my phone back, but protecting my sensitive data is also important. So I'd like to understand if the likely break-in method an attacker will take facing a locked phone at least protects my sensitive data:
if it does block access to sensitive data, then it's not a total loss to allow them to do it (I've lost my phone but not my identify)
if it does not block access to sensitive data, then I'm much more interested in locking down the individual apps like gmail etc.
* By the way, I did see while googling they can get past locked phone without factory reset if you have USB debugging on. That would be a big deal since they could get to gmail etc if you rely soley on lock screen and have USB debugging on. I'm definitely turning it off and only on when I need it.
Click to expand...
Click to collapse
Sorry I wasn't quicker to respond - But UAG has a setting that makes it to where you must only enter it once until you power the screen off and it applies it to all locked apps. UAG isn't working for the time being on my current rom, I don't know if it's the same for others but I've notifed the developer regardless.
I'm a forensics student and can tell you that a reset alone won't wipe all the slack byte data off of the device, but fortunately this is an area of security that malicious hackers haven't quite caught up too. Mainly Military and Law Enforcement possess the tools and skillsets to do this on mobile devices because a lot of the software created to image your device and recover deleted data isn't liscensed to the general public. Solid State drives have put a few penetration testers out of business because it is notoriously difficult for forensic analysis. I can assure you that from this angle your common theif will not be stealing your identity - if you're a big shot with the CIA as an enemy, no so much. Account hijackings occur far more commonly through bad recovery questions, poor network security, or coming in contact with maliscious software.
However you should be prepared to immediately change your passwords to important accounts whenever any of your computers are compromised. Diceware is actually a pretty neat app for creating passwords with lots of entropy that makes cracking them more difficult. I've heard of a few gmail accounts being stolen lately that could have been avoided with two step authentication, so hiding google authenticater can be beneficial.
If a factory reset happens your user app data will be deleted apart from what is saved to internal storage and your sd card. What will remain is the device recovery backup that was saved to /system/apps so the option remains for you to remote wipe if you can contact the device. With avast I noticed the backup I created was in my app drawer, this worries me some because it may not be saving to the system folder - but cerberus does this for sure.

How security improvements can make your device more vulnerable (sic!)

First of - I'm just an everyday user of Android device, never interested in hacking or any other "advanced" use of computers and likes. My greatest achievements so far are jailbreaking Iphone, rooting an Android phone and installing stock ROM on it. You can call me a noob. However - I like to improve things I use and I also value my privacy. That's why I installed a software that locks access to certain apps on my phone. I recently found this app actually made an opposite - it made my device vulnerable to identity theft and potential financial loss. I wouldn't really bother telling my story if developers didn't delete my one-star-rating with a brief description of the problem right after I posted it in Play store.
So, to the point. I installed CM Security and app lock app (nearly 14 millions of users and 4,7 rating) and locked some of the "sensitive" apps with it. One evening I was bored enough to try and play "a hacker" who "found my phone" and see what such person could do. Considering "a hacker" somehow managed to unlock the device he'd now encounter my second line of the defense - the mighty app locker. And now, in a few short steps I'll show you how much damage you can do with it:
1. First it obviously asks you for an unlocking password/pattern, but -as you don't know it - you hit in-app menu button and choose "forgot password?" option.
2. It asks you to log in to your Google account in order to reset the password (YES, you can access Google password recovery from inside the app, so even if you lock your device's Settings, your mail client and so on, you can still access the most vulnerable option of your account from "security" app).
3. As you don't know a Google password you hit the "forgot password" link that starts Google password reset process.
4. It will ask you for the "last password you remember", but you can just say you don't know it and then it gives you an option to get a verification code by SMS - chances are it will be sent to the device you're just holding in your hands. And these chances are big.
5. After you get a verification code you're in. You can now set a new Google account password and reset app locker password/pattern.
It's that easy. You not only unlocked an app locker but also got access to Google account which gives you pretty much endless possibilities, including purchase of some apps in the Play Store as it stores your card details and you only need an account password to authenticate the purchase. You can also try to restore Ebay or Paypal passwords or even try to get directly into bank accounts via banking apps. Sky is the limit.
I already deleted CM "security" app and looked for some replacement. I wasn't really surprised it's kind of a standard that when you install them, security apps ask you to give your Google account details just in case you need to recover your password in a future. And they often make you think that giving these details is an integral part of installation process, a must-do that is necessary for an app to install and work. Some apps, like CM "security" don't even ask - they just use your Google account details and don't give you a chance to give up such option.
After all - here's some advice I can give:
1. Don't install any security software that connects to your Google account and gives "password reset" options;
2. Don't give Google your mobile number, even if it seems convinient;
3. Don't use your Google account address as your contact information in "owner info" option of your device.
If you have any other suggestions that may improve security, please share.
Cheers
Question is why you didn't lock your device in the first place.
I think you are misappling this feature 's benefit/use. It is not there, IMO, to secure your phone from an advesary that has even brief access to your phone.
That is what a combination of a lock screen pwd,short for convenience, and full encryption using a separate and longer pwd of high entropy/randomness is for. Even with that its important to understand how it works and its limitations. Such as it does not encrypt.the ext sd card data. So if you put apps or privledged data there you either should not or using other means to encrypt it. One such way would be to use truecrypt to encrypt it using a pc, being the easiest and then use one of the apks that gives suports accessing those types of partitions/files.
The function you are speaking of is ther to prevent people you have a large degree of trust in such as a family member or close.friend possibly that you may allow to use your phone but do not want them to be able to access private data. Think of a parent allowing their child to use the phone to play a game but does not want them scewing up email or going into their bank app and randoming clicking around etc...
I hope you get the idea. Its not there to prevent someone that means to do you direct intentional harm.
I also want to point out my comments are only directed at the most basic level and only deal with physical secure of data on the phone and not the phone itself nor from remote access or privacy.
Also want to point out that a screen lock pwd is nothing but a inconvenience at best to someone wanting access to your data. A quick reboot into recovery and a bkup to a sd card will get them all your data and any weakly secured credentials there in. Its only one part of physical security, of which, is only itself one part in over all data security, which itself, is only a part of data privacy. Its a large house of cards and removing one or putting one little piece in just slightly the wrong place and collapse the whole house.
Its hard to do just the small piece of each of these parts correctly and exrremely hard to.combine all the small and large parts together for a total protection scheme. It takes considerable research and learning to do these things especially if your goals are for higher levles of security and privacy.
As an example someone that really wants their phone data ue on android to be private from commerical.data collection which via proxy means all gov access to said data would never install goggle play store or any google app on their device. That is just one glaring example of many.
http://ad.cmcm.com/en/?f=home-en-top
Cheetah Mobile is spyware. watch the video on their website
I would suggest using the built-in encryption on Android. I don't use it myself, but have the Avira app installed. I like their PC software, and gave it a try.
It can be used to track a lost phone or lock it remotely. Since I have rooted my Huawei G300 it complains a bit, but still scans all apps being installed.
bigeasy911 said:
I think you are misappling this feature 's benefit/use. It is not there, IMO, to secure your phone from an advesary that has even brief access to your phone.
Click to expand...
Click to collapse
Fact is still that this app claims it provides certain security, yet it doesn't. Not everyone will realize this. So it's always good that people keep pointing this out.
Nearly a year gone since I posted this and now I returned to "AppLockers" during my mobile security research. This is such a bad thing I can't believe apps of this kind are accepted by PlayStore and not banned eternally as the most fake security solution that ever existed. What surprised me even more, "serious" companies, eg. Norton are also in this business... anyway
I checked this one first - Best App Lock - it's "best", right? And it's got 4.5 stars rating with 1,000,000 - 5,000,000 downloads.
I set it up, set the PIN, locked test app - everything seems fine.. as long as you don't go to Settings > Apps and don't force stop Best App Lock, because then - your protection is gone. But OK, you can also lock Settings and prevent such tricks and it works... as long as you don't use Activity Launcher to call App Lock's pin reset activity... Yes, you can reset the PIN without even opening the app itself.
Now, Best App Lock was clearly made by some amateur, so let's see what pros got for us, the big ones. I checked mentioned Norton App Lock, with 4.6 rating and surprisingly not as popular, with "only" 500,000 - 1,000,000 downloads. It's a bit better, it only contains one activity, so you can't bypass it easily, because the app itself is protected with a pattern, but here's another trick - reboot device in Safe Mode and you can disable Norton's permission to draw over other apps to make it helpless as a baby. Or you can just uninstall it in SM. I didn't check anything else, because what more you can do to prevent such workaround, than Norton already did?
If someone is aware of a way to disable power menu, or at least the ability to disable Safe Mode on unrooted Android please share. Until then I call all the App Lock apps the biggest scam in mobile security.
minimale_ldz said:
Nearly a year gone since I posted this and now I returned to "AppLockers" during my mobile security research. This is such a bad thing I can't believe apps of this kind are accepted by PlayStore and not banned eternally as the most fake security solution that ever existed. What surprised me even more, "serious" companies, eg. Norton are also in this business... anyway
I checked this one first - Best App Lock - it's "best", right? And it's got 4.5 stars rating with 1,000,000 - 5,000,000 downloads.
I set it up, set the PIN, locked test app - everything seems fine.. as long as you don't go to Settings > Apps and don't force stop Best App Lock, because then - your protection is gone. But OK, you can also lock Settings and prevent such tricks and it works... as long as you don't use Activity Launcher to call App Lock's pin reset activity... Yes, you can reset the PIN without even opening the app itself.
Now, Best App Lock was clearly made by some amateur, so let's see what pros got for us, the big ones. I checked mentioned Norton App Lock, with 4.6 rating and surprisingly not as popular, with "only" 500,000 - 1,000,000 downloads. It's a bit better, it only contains one activity, so you can't bypass it easily, because the app itself is protected with a pattern, but here's another trick - reboot device in Safe Mode and you can disable Norton's permission to draw over other apps to make it helpless as a baby. Or you can just uninstall it in SM. I didn't check anything else, because what more you can do to prevent such workaround, than Norton already did?
If someone is aware of a way to disable power menu, or at least the ability to disable Safe Mode on unrooted Android please share. Until then I call all the App Lock apps the biggest scam in mobile security.
Click to expand...
Click to collapse
The first step to real security is removing all Googleapps and Google account. There is no other way around this. Next, don't install any app that is not open source. Also, don't use any recovery. And finally, either epoxy your entire usb port, if you have let's say a magnetic charging port or cut all usb port pins except for 2 for charging. In addition, you should open the phone and epoxy usb port and contacts from inside, so that it can't be replaced. Or even better: epoxy your entire motherboard. That would take care of UART socket or any other way of entering CPU/GPU/RAM from inside. Encrypt your phone. After that, your phone couldn't be penetrated (other than through the air/baseband, which is a whole different level of sophistication). If someone targets you over the baseband, throw your phone and run for your freedom...
Seriously, in the above scenario, no one can have access to your data: no fastboot, no adb, no recovery. They wouldn't be able to replace kernel, recovery, system or use any OEM official flashing method... . I welcome any suggestion to hack such a device...
minimale_ldz said:
Nearly a year gone since I posted this and now I returned to "AppLockers" during my mobile security research. This is such a bad thing I can't believe apps of this kind are accepted by PlayStore and not banned eternally as the most fake security solution that ever existed. What surprised me even more, "serious" companies, eg. Norton are also in this business... anyway
I checked this one first - Best App Lock - it's "best", right? And it's got 4.5 stars rating with 1,000,000 - 5,000,000 downloads.
I set it up, set the PIN, locked test app - everything seems fine.. as long as you don't go to Settings > Apps and don't force stop Best App Lock, because then - your protection is gone. But OK, you can also lock Settings and prevent such tricks and it works... as long as you don't use Activity Launcher to call App Lock's pin reset activity... Yes, you can reset the PIN without even opening the app itself.
Now, Best App Lock was clearly made by some amateur, so let's see what pros got for us, the big ones. I checked mentioned Norton App Lock, with 4.6 rating and surprisingly not as popular, with "only" 500,000 - 1,000,000 downloads. It's a bit better, it only contains one activity, so you can't bypass it easily, because the app itself is protected with a pattern, but here's another trick - reboot device in Safe Mode and you can disable Norton's permission to draw over other apps to make it helpless as a baby. Or you can just uninstall it in SM. I didn't check anything else, because what more you can do to prevent such workaround, than Norton already did?
If someone is aware of a way to disable power menu, or at least the ability to disable Safe Mode on unrooted Android please share. Until then I call all the App Lock apps the biggest scam in mobile security.
Click to expand...
Click to collapse
Reviews or star ratings are not always very reliable, just use as a rough guide .... (In my opinion SOME of those Chinese apps seem to be amongst the worst offenders)
https://techcrunch.com/2014/05/27/f...unes-but-google-play-has-the-worst-offenders/
optimumpro said:
The first step to real security is removing all Googleapps and Google account. There is no other way around this. Next, don't install any app that is not open source. Also, don't use any recovery. And finally, either epoxy your entire usb port, if you have let's say a magnetic charging port or cut all usb port pins except for 2 for charging. In addition, you should open the phone and epoxy usb port and contacts from inside, so that it can't be replaced. Or even better: epoxy your entire motherboard. That would take care of UART socket or any other way of entering CPU/GPU/RAM from inside. Encrypt your phone. After that, your phone couldn't be penetrated (other than through the air/baseband, which is a whole different level of sophistication). If someone targets you over the baseband, throw your phone and run for your freedom...
Seriously, in the above scenario, no one can have access to your data: no fastboot, no adb, no recovery. They wouldn't be able to replace kernel, recovery, system or use any OEM official flashing method... . I welcome any suggestion to hack such a device...
Click to expand...
Click to collapse
Well you forgot SD card, unless you encrypt that as well, which for a user who uses the card for transferring files across different devices is not such a bright idea.
using epoxy could slow down the hack, and seriously give more trouble to the user than the hacker.
that being said your idea of securing the data is somewhat clear but really a secured device? cause epoxy can be penetrated as well, lock screen can also be bypassed, even without Google and a recovery.
it might take more time than hacking an average device, but still it can be done and most probably the hacker would be the same owner. cause he forgot the damn password and is looking to get back the data.
the more we try to secure, the more we make our lives tough.
billysam said:
Well you forgot SD card, unless you encrypt that as well, which for a user who uses the card for transferring files across different devices is not such a bright idea.
using epoxy could slow down the hack, and seriously give more trouble to the user than the hacker.
that being said your idea of securing the data is somewhat clear but really a secured device? cause epoxy can be penetrated as well, lock screen can also be bypassed, even without Google and a recovery.
it might take more time than hacking an average device, but still it can be done and most probably the hacker would be the same owner. cause he forgot the d
amn password and is looking to get back the data.
the more we try to secure, the more we make our lives tough.
Click to expand...
Click to collapse
Epoxy: Knowing how small and fragile phone motherboards are, I think you will most likely damage the board while trying to penetrate epoxy... Maybe you shouldn't epoxy the usb port on the ouside, but cut the data pins and epoxy on the inside to not give a hint to an attacker. Anyway, I wish an attacker fun time trying to remove epoxy...
The point of encryption is to protect data when the phone is off. So, it makes sense that for someone without a password, the phone turns into a brick. And if you tend to forget the password, then write it down somewhere other than the phone...
Mobile security is a myth. At best it is a door knit lock. Will keep honest People honest but won't stop someone from. Really trying and doing it.
I see lots of talk from people about security and yet these same people use Facebook which has enough holes in it that anyone could hack someone else pc. I use it all the time to mess with people. The looks on their faces are priceless.

Finally Proof My Andoid OS Hacked

I've known for 2 years I've been hacked. Everyone I know thinks I'm crazy because for 2 years I've been convinced that my phone was being controlled remotely even though I've changed devices, profiles, and deleted more apps than I can count. Finally yesterday I dicovered Total Virus Scan and it found this. I've had at least 50 antivirus apps with no success and I was not sure if maybe I wasn't a going crazy. I even would stop using my phone for a month or more at a time because that was the only time I had issues. Whoever is behind this has taught me everything I know about android and hacking by directing me in a way that is hard to explain. I'd just see what they wanted me to do by a random page that would pop up, or sentence highlighted, or other discreet cues. If I have not had 100% accuracy on certain issues I've been informed about by following these cues I would be certain I was crazy but there has been like 50 personal issues I've been informed about by following these cues and not a single time has it been we wrong. Unfortunately I let it consume me for about a year and almost ruined my life because of it and what I've learned has seriously altered my life. Yesterday Total Virus Scan found this Keylogger, 2 Trojan, RAT in OS. How do I remove these from my OS andcatch who is behind this? Attached is screenshot of the 4 issues found. Also on SD Maid it said my device wasn't rooted but had a built-in superuser app. Can't find the screenshot I had of that but had a url of toybox. A bunch of numbers then said [email protected] something. Any help will be much appreciated. Thank you in advance.
Could you try to create a backup of those apps and upload somewhere? Maybe it is possible to check it
Try to uninstall those apps with an app uninstaller
If you are unable to uninstall those apps they might be deeply installed? Ive been under the same situation 4-5years ago
Maybe a firmware reflash would do the job but everything will get deleted so try to backup everything
DrunkTrooper said:
Could you try to create a backup of those apps and upload somewhere? Maybe it is possible to check it
Try to uninstall those apps with an app uninstaller
If you are unable to uninstall those apps they might be deeply installed? Ive been under the same situation 4-5years ago
Maybe a firmware reflash would do the job but everything will get deleted so try to backup everything
Click to expand...
Click to collapse
It's not the apps. From what I've read one of the Trojans, the one in Google framework, is a dropper and reproduces and hides them in legit clean apps. That is why antivirus software doesn't pick them up. I've done at least 100 scan's with every malware finder I can find and this is the first time I have gotten a hit on anything but I know for a fact it's been there for at least 2 years. Everything I know about android whoever this person is taught me. It's almost as if they are a friend because they've directed me to learning about someone close to me who was doing me wrong, taught me everything I know about android and hacking, it's crazy man. I can't explain how they communicate with me all I can say is I will just see it and know. Something highlighted briefly, a random page popping up that directly coorilates with what is happening in my life, but also have tried getting money out of me and removed pictures of my wife from my device. I want to find out if it's someone I know before I remove it. If so, I'm thinking criminal charges and anything else I can do to mess with their life like they have mine. They truly destroyed my life for about 18 months and just now getting everything back together. I don't really talk about it anymore because everyone thought I went crazy but still privately search for the cause and who wmis behind it and yesterday I finally found it. Showed my mother and step son and even with these screenshots they still say I'm crazy and seeing things. Just glad I finally have proof. I can't explain what it's like to have EVERYONE around you saying you are crazy and seeing things that aren't there and knowing you aren't. It really sucks and I wouldn't wish what I've experienced the last couple years on my worst enemy.
EJay80 said:
I've known for 2 years I've been hacked. Everyone I know thinks I'm crazy because for 2 years I've been convinced that my phone was being controlled remotely even though I've changed devices, profiles, and deleted more apps than I can count. Finally yesterday I dicovered Total Virus Scan and it found this. I've had at least 50 antivirus apps with no success and I was not sure if maybe I wasn't a going crazy. I even would stop using my phone for a month or more at a time because that was the only time I had issues. Whoever is behind this has taught me everything I know about android and hacking by directing me in a way that is hard to explain. I'd just see what they wanted me to do by a random page that would pop up, or sentence highlighted, or other discreet cues. If I have not had 100% accuracy on certain issues I've been informed about by following these cues I would be certain I was crazy but there has been like 50 personal issues I've been informed about by following these cues and not a single time has it been we wrong. Unfortunately I let it consume me for about a year and almost ruined my life because of it and what I've learned has seriously altered my life. Yesterday Total Virus Scan found this Keylogger, 2 Trojan, RAT in OS. How do I remove these from my OS andcatch who is behind this? Attached is screenshot of the 4 issues found. Also on SD Maid it said my device wasn't rooted but had a built-in superuser app. Can't find the screenshot I had of that but had a url of toybox. A bunch of numbers then said [email protected] something. Any help will be much appreciated. Thank you in advance.
Click to expand...
Click to collapse
You need to utube Beef, it's a exploit that takes over your browser that's started with script embedded in a web page, text, messenger msg, etx. You may confuse it with malware because the attackers will gain the same info if not more by using social engineering.
remove all google accounts from settings, perform a factory reset, create new google account and check Total Virus Scan again.
You can use same google account just don’t restore data
Arealhooman said:
You can use same google account just don’t restore data
Click to expand...
Click to collapse
I don't recommend this as google account is device administrator, anyone knowing that password can remotely install apps

App to errase the phone in case of theft

I am looking for an Android security app that helps erase the device after several erroneous attempts to unlock the phone like iPhone does.
It will be helpfull In case of theft for exemple.
If anyone knows one.
Thanks in advance
[email protected] said:
I am looking for an Android security app that helps erase the device after several erroneous attempts to unlock the phone like iPhone does.
It will be helpfull In case of theft for exemple.
If anyone knows one.
Thanks in advance
Click to expand...
Click to collapse
Welcome to XDA.
Which phone? That's generally built into Androids and part of Google Find my Device.
My thoughts on FRP and Find my Device etc... I hate them. More ways to potentially lose access, data and time.
Unless you mismanage yourself and the phone you're the one most likely to get locked out. Happens constantly to people here. Physical security is the only real security.
Treat your phone like your wallet. On the street the phone should be stashed, don't flash it or ever let strangers use it. Your ears/eyes/mind need to be in the mundane real world. It can go from a boring place to a gut wrenching snap where you need to react appropriately in seconds or less... just like that. You get one shot, no replays. Results are binding.
Thank you for tour response,
Yah i know, it's just an option for protecting from thieves and curious onlookers if i ever lose my phone (it's happened to me last month).
You're welcome. Sorry to hear about that. Modify your behavior if possible to prevent it from happening again.
Critical data could be kept on a cloud account. That way it's off the device but still accessible. Make sure that's backup redundantly on multiple local drives that can't all be accessed>breached/infected etc all at the same time. Time stagger the backups across multiple drives. Hdds can reliably store data for years, recopy the data every 2-5 years.
I don't like cloud storage except for Gmail but it's an option that might work well for you.
Hi,
In fact, I do it even if i don't like cloud storage either, but it's necessary, i have multiple copy of my work in differente étirage and all sttaf...
I just thought that was a good idea to have an option like that.

Categories

Resources