Espionage Technology

In the context of events like MWC 2016, security experts warn participants in relation to the risk of Cyber espionage attacks using malware for mobile devices. Numerous groups of Cyber-espionage investigation in recent years used sophisticated mobile malware capable of infecting a wide range of mobile devices and to steal all sorts of valuable information.

hacking-and-information-flow-in-modern-era-wallpaper
The Russians might have conducted the first cyber attack against a power station
Events like MWC 2016 attract and a large number of cyber criminals, who considers public events a good opportunity to gather information to assist in malware attacks with the predefined target. According to statistics provided by Kaspersky Lab, at least five of Cyber espionage campaign uncovered in recent years have used malware tools able to infect mobile devices.

Sometimes these are programs created and spread in a given campaign, as is the case of the Red October, Cloud Atlas or Sofacy. In other cases, malicious actors tend to use so-called malware: a special set of attack tools sold by commercial organizations as Hacking Team (RCS), Gamma International (FinSpy) or others.

Standard encryption methods, insufficient

Many organizations believe that the standard method of encryption PGP is sufficient to protect messages sent by email, mobile devices, but it is not always the case. In order to avoid a situation in which actors bad intentioned find information about their targets, many conversations with touchy subject taking place now on mobile devices that use secure encryption applications and end-to-end, almost without metadata or metadata which are basically impersonal.

“This trend has made Cyber spies on to develop new weapons able to eavesdrop on the subjects and the digital life and in real life. Once the malware is installed on mobile devices, they can spy on all secure messages and can turn without being detected, the most sensitive conversations, even those carried out in relation to the front, “said Dmitry Bestuzhev, security expert at the Global Research and Analysis Team, Kaspersky Lab. However, there are certain measures that can be taken to protect private messages from hackers.

Always use a VPN connection to connect to the Internet. This makes it difficult to intercept data traffic on the network and reduces vulnerability to malicious programs that can be sent directly in a legitimate application downloaded from the Internet. Also, it is not recommended that you charge your mobile devices using a USB connected to the computer, because they can be infected with malicious software installed on your PC. It is best to charge your mobile phone directly from the mains, using an AC adapter.

Espionage

You can use an anti-malware program on mobile devices. It looks like the future of these solutions lies in the same technology already deployed for the security on the desktop: Default Deny and Whitelisting. Protect your devices with a password, not a PIN. If the PIN is discovered, attackers can gain access to cyber criminals in the real environment, the mobile device and can install malware without your knowledge. You can learn more about online threats here.
The information stolen with the help of such tools, such as data about your competitors, have immense value for Cyber spies. Many organizations believe that the standard method of PGP encryption is sufficient to protect messages sent by email, mobile devices, but it is not always the case.

Always use a VPN connection to connect to the Internet. This makes it difficult to intercept data traffic on the network and reduces vulnerability to malicious programs that can be sent directly in a legitimate application downloaded from the Internet.
Will not upload mobile devices using a USB connected to the computer, because they can be infected with malicious software installed on your PC. It is best to charge your mobile phone directly from the outlet using an AC adapter.
Use an anti-malware program on mobile devices. It has to be the best. It seems that the future of these solutions is the same technology already deployed for the security on the desktop: Default Deny and Whitelisting.