Skip to main content

Your smartphone is hackers' next big target

By Parmy Olson, Special to CNN
August 26, 2013 -- Updated 1733 GMT (0133 HKT)
STORY HIGHLIGHTS
  • Mobile devices are the next battleground for data and privacy, Parmy Olson writes
  • Pumping phones with information makes them increasingly attractive target for hackers
  • If people value their privacy, they'll invest in services that encrypt their data

Editor's note: Parmy Olson is a journalist for Forbes magazine, covering mobile technology. She is the author of "We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency."

(CNN) -- In the world of cyber security there are some well-known designations for anyone that considers him or herself to be a hacker, the term being so broad in scope now.

One can be a "white-hat" hacker or a "black hat," the former being someone who uses their programming prowess to protect digital data, and the latter someone who seeks to subvert and steal it for their own malicious reasons. Fall into the middle and you're a "grey hat."

Parmy Olson
Parmy Olson

The recent revelations about the NSA in the United States have made these labels much fuzzier, since government and NSA hackers should be white hat. Yet a recent report in the Washington Post, citing top-secret documents and an internal audit, showed the NSA had broken privacy rules thousands of times as it conducted its widespread surveillance.

Of course, navigating the ethics of data privacy is a complicated business since there's just so much of it -- 90% of the world's data has been generated in the last two years, according to IBM.

Your cell phone: Easy to hack
How dangerous is mobile malware?

A very likely consequence of the NSA revelations from former cyber security contractor Edward Snowden, is that people will increasingly not care who the hacker trawling through their data is -- whether it's an ethically-conflicted government contractor like Snowden, or someone more unscrupulous trying to sell their digital address book to spammers.

They just want their data to be un-hackable.

Read more: SIM card hack inspires quick fix by carriers

Over the years, we've read about how easy it appears to be to hack a website, server, or a device if you just have the know-how and the inclination.

The subversive digital community Anonymous showed this in 2011, when clusters of young people within its network were able to temporarily paralyze websites of major corporations and steal data, often without the background of real programming knowledge.

In more than one case these volunteers used a free program they downloaded from the Web, which automated a data theft for them.

For those in the cyber security industry, such big attacks were an "I told you so" moment, proving how insecure our personal data was when it was stored in online databases by even large companies and institutions.

Read more: Hacker says phone app could hijack plane

The question of how we can find a good privacy balance in a networked world leads us to the paradox of mobile devices, the next battleground for data and privacy.

Smartphones are essentially mini computers and as a result can offer both our best hope for private digital communication, and greater vulnerability.

First the hope.

Smartphones are particularly vulnerable in emerging markets like China, where people download apps from third party sites because Google Play is banned by Beijing.
Parmy Olson

It's been made clear in the last few months that email is no longer considered a safe and secure way to send information to someone.

The founder of secure email service Lavabit, who counted Ed Snowden as a user, recently suspended his business in the face of a government investigation. The vendors of another secure email service, called Silent Circle, shut down their email service soon after, and cited fundamental security flaws inherent in email.

Phil Zimmermann, the co-founder of Silent Circle and inventor of a popular encryption standard for email called Pretty Good Privacy (PGP) even said at the time that email was just not secure anymore. In one way, thanks to using standard Internet protocols, it never has been. Now instead of using email, Zimmermann increasingly uses mobile messaging services of the kind offered by his company.

The general public can take a leaf out of Zimmermann's book. Mobile messaging apps like WhatsApp and Wickr look better mainstream options for secure digital communication.

Researchers: We can hack an iPhone through the charger

WhatsApp avoids advertisers like the plague and relies on subscription payments, while Wickr encrypts messages and deletes them after a set amount of time -- like a burning candle wick.

On the other hand, mobile phones are just another attack vector for grey and black hat hackers, with potentially richer information than what's obtainable from a desktop computer: location data, access to your contacts address book, photos and real time audio through your microphone.

Smartphones are particularly vulnerable in emerging markets like China, where more people use Android phones than in the U.S. and Western Europe, and download apps from third party sites because Google Play is banned by Beijing. The problem here is that it's becoming easier to inject malware into fake apps, for unsuspecting Android users to download.

See how hackers can control your house
Hackers watch child over camera monitor
Don't get hacked on vacation

In the last few months, security researchers have found a remote access tool in the wild called AndroRAT, which coupled with a new software tool called a binder, makes it surprisingly easy to inject malicious code into a fake version of a popular, paid-for app or game, package it together and upload it to a third-party site at a discounted rate or for free.

Once the app has been downloaded, the hacker can remotely steal the victim's contacts data, turn on their camera or turn on their mic and record conversations. Researchers say the tool is most attractive to spammers who want to steal contact data and premium text messages.

Read more: Are you in danger of 'drive-by' hacking?

What's disturbing is that using the tool does not require a sophisticated level of programming knowledge, echoing the desktop tools that were used by supporters of Anonymous to attack online databases.

Far more tame, but still disturbing for many privacy advocates, is the amount of data that mobile app developers are able to funnel out to advertising networks after you've downloaded one of their free apps -- and this applies to anyone that uses an iPhone or Android phone in the developed world.

History repeats itself. So long as we continue to rely on small, rectangular slabs for computers and carry them everywhere, pumping them with all manner of personal and professional information, they'll increasingly become a target for hackers white, grey or black.

If people value their privacy, they'll vote with their wallets and invest in services that encrypt their data and keep their communications private -- and a few they might ditch their phones altogether.

The opinions expressed in this commentary are solely those of Parmy Olson.

ADVERTISEMENT
Part of complete coverage on
August 19, 2014 -- Updated 2203 GMT (0603 HKT)
It used to be billy clubs, fire hoses and snarling German shepherds. Now it's armored personnel carriers and flash-bang grenades, writes Kara Dansky.
August 20, 2014 -- Updated 1727 GMT (0127 HKT)
Maria Haberfeld: People who are unfamiliar with police work can reasonably ask, why was an unarmed man shot so many times, and why was deadly force used at all?
August 18, 2014 -- Updated 2152 GMT (0552 HKT)
Ruben Navarrette notes that this fall, minority students will outnumber white students at America's public schools.
August 19, 2014 -- Updated 2121 GMT (0521 HKT)
Humans have driven to extinction four marine mammal species in modern times. As you read this, we are on the brink of losing the fifth, write three experts.
August 19, 2014 -- Updated 1158 GMT (1958 HKT)
It's been ten days since Michael Brown was killed, and his family is still waiting for information from investigators about what happened to their young man, writes Mel Robbins
August 20, 2014 -- Updated 1723 GMT (0123 HKT)
Sally Kohn says the Ferguson protests reflect broader patterns of racial injustice across the country, from chronic police violence and abuse against black men to the persistent economic and social exclusion of communities of color.
August 18, 2014 -- Updated 1242 GMT (2042 HKT)
The former U.K. prime minister and current U.N. envoy says there are 500 days left to fulfill the Millennium Goals' promise to children.
August 18, 2014 -- Updated 1310 GMT (2110 HKT)
Julian Zelizer says the left mistrusts Clinton but there are ways she can win support from liberals in 2016
August 20, 2014 -- Updated 1738 GMT (0138 HKT)
Peter Bergen says the terror group is a huge threat in Iraq but only a potential one in the U.S.
August 16, 2014 -- Updated 1734 GMT (0134 HKT)
Mark O'Mara says the way cops, media, politicians and protesters have behaved since Michael Brown's shooting shows not all the right people have learned the right lessons
August 17, 2014 -- Updated 1523 GMT (2323 HKT)
Retired Lt. Gen. Mark Hertling says the American military advisers in Iraq are sizing up what needs to be done and recommending accordingly
August 15, 2014 -- Updated 1941 GMT (0341 HKT)
Marc Lamont Hill says the President's comments on the Michael Brown shooting ignored its racial implications
August 15, 2014 -- Updated 2146 GMT (0546 HKT)
Joe Stork says the catastrophe in northern Iraq continues, even though many religious minorities have fled to safety: ISIS forces -- intent on purging them -- still control the area where they lived
August 14, 2014 -- Updated 2226 GMT (0626 HKT)
Tim Lynch says Pentagon's policy of doling out military weapons to police forces is misguided and dangerous.
August 15, 2014 -- Updated 1315 GMT (2115 HKT)
S.E. Cupp says millennials want big ideas and rapid change; she talks to one of their number who serves in Congress
August 14, 2014 -- Updated 2357 GMT (0757 HKT)
Dorothy Brown says the power structure is dominated by whites in a town that is 68% black. Elected officials who sat by silently as chaos erupted after Michael Brown shooting should be voted out of office
August 14, 2014 -- Updated 1149 GMT (1949 HKT)
Bill Schmitz says the media and other adults should never explain suicide as a means of escaping pain. Robin Williams' tragic death offers a chance to educate about prevention
August 15, 2014 -- Updated 1505 GMT (2305 HKT)
Nafees Syed says President Obama should renew the quest to eliminate bias in the criminal justice system
August 14, 2014 -- Updated 2024 GMT (0424 HKT)
Eric Liu says what's unfolded in the Missouri town is a shocking violation of American constitutional rights and should be a wake-up call to all
August 13, 2014 -- Updated 1922 GMT (0322 HKT)
Neal Gabler says Lauren Bacall, a talent in her own right, will be defined by her marriage with the great actor Humphrey Bogart
August 15, 2014 -- Updated 1056 GMT (1856 HKT)
Bob Butler says the arrest of two journalists covering the Ferguson story is alarming
August 13, 2014 -- Updated 2035 GMT (0435 HKT)
Mark O'Mara says we all need to work together to make sure the tension between police and African-Americans doesn't result in more tragedies
August 18, 2014 -- Updated 2006 GMT (0406 HKT)
Pepper Schwartz asks why young women are so entranced with Kardashian, who's putting together a 352-page book of selfies
August 13, 2014 -- Updated 2308 GMT (0708 HKT)
Michael Friedman says depression does not discriminate, cannot be bargained with and shows no mercy.
August 12, 2014 -- Updated 1525 GMT (2325 HKT)
LZ Granderson says we must not surrender to apathy about the injustice faced by African Americans
ADVERTISEMENT