Abstract

Modern mobile phones access the Internet and perform a wide range of functions and, therefore, there is a diversity of possible types of attack by malware or other forms of malicious communications that can be launched against a mobile device. Malicious bug installed on the phone enables an attacker to control the infected mobile device remotely. In particular, perform the commands sent from a server of the cyber-criminal, install different applications, and change the settings in the phone's browser. The victim can be signed up for a paid service by having a message sent from his or her number, the victim's personal data (i.e., contacts, messages, call logs, etc.) can be obtained and given to spammers, the victim's location can be obtained as well. Moreover, there is a possibility of involving the owner of the phone in fraudulent scheme without his knowledge. This paper deals with the possible attacks that the mobile phone user may suffer if the device is controlled by the intruder through the bug.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call