The use of mobile terminals today is closely linked to our daily personal and professional life. As a result, mobile devices become a prime target for malicious actors who create sophisticated malicious applications (malware in English).
These players develop applications that can be installed and run on victims’ terminals without arousing the slightest suspicion.
Today there is a multitude of mobile malware that targets our smartphones and tablets on both Android and iOS. These malwares have various objectives: the unwanted display of advertisements via adware, the recovery of banking data via Trojans or even the search for personal information of an employee or strategic information of a company. Spyware has become a powerful stealth tool that infects mobile devices and allows data recovery without the knowledge of its owner.
Spyware spies on you and uses all the data stored and logged on your devices. In this sense, they are able to extract data like SMS, contact details, call history or be able to remotely activate microphone and video to surreptitiously capture audio, video and photos. . Worse, some malware already installed facilitates the remote installation of other complementary malware which then “stuffs” your terminals with spyware.
This phenomenon can affect all users and spares no smartphone and tablet manufacturer or any mobile operating system. The malware yesterday PC went mobile. It is now widely used on mobile devices, and unfortunately still remains underestimated in terms of its scope and impacts. The hacking of the phone suffered by Jeff Bezos, the boss of Amazon, reveals that complex technical devices are capable of infecting consumer platforms such as WhatsApp today through communication, for example, of infected videos.
The malware used for this hack is called Pegasus. It is difficult to detect for non-experts in cybersecurity because the terminal does not present any “distinctive sign of infection”, namely no overheating and no abnormal battery overconsumption. It is estimated that Pegasus allowed over several months to extract more than 4.6 Gb of personal data from Jeff Bezos’ iPhone.
Since the revelation of this hack, many users are entitled to ask questions about the security of their phone:
- Am I hacked?
- Am I protected?
- Is my phone / tablet (s) hosting malware?
- What are the vectors of infection for my terminal?
- What level of risk am I subject to?
Companies, which have fleets of corporate terminals or which favor BYOD, must also ensure that their employees’ terminals are not gateways used by malicious actors to retrieve operational and strategic data on their businesses like app development agency in Australia.
Today, effective solutions like Lookout exist. Lookout is a historical player specializing in cybersecurity on mobile devices. Its team of cybersecurity researchers has been at the forefront of detecting Pegasus malware since 2016.
Since then, Lookout has continued to work on a daily basis to secure your devices thanks to its technology watch unit and its software solutions capable of predicting and stopping mobile attacks. Lookout is a proactive solution capable of detecting malicious devices before they pose a risk to the business or the general public, thanks to a single database fed daily by more than 170 million assessment ‘mobile devices.
The Lookout solution:
- Detects and protects terminals against malicious code on mobile devices,
- Integrates with the main market editors (EMM, SIEM, EDR and IDP),
- Respects the privacy of users and the GDPR (privacy by design),
- World famous, Lookout is marketed by our teams and partners.