Abstract

The purpose of this article is to present the highlights of cell phone attacks, along with adiscussion of how the actors and software operate. For many people, mobile devices are anintegral part of daily life, which is used for contacting, searching for information or managingfinances. Storing sensitive information in the memory of phones increases the interest ofcybercriminals in this sphere, thus the use of spyware. The paper first presents highlights from thetimeline of the use of malware to attack cell phones. Then the history of the Hacking Teamcompany was introduced, along with the spyware tool developed. The Dark Caracal campaign andthe use of Pegasus software in the EU were also presented. With the increase in the amount ofsensitive data processed via cell phones, there is a need to verify the security level of devices andthe effectiveness of security features.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call