Mobile Trojan Spies On User’s Environment

Most people worry about traditional viruses and Trojans – the malware that could infect their computer and steal data or use the system’s resources to attack other computers. But new research shows that people should, perhaps, worry more about their ever-present mobile phones and the devices’ ability to record their lives.

Researchers at the University of Indiana at Bloomington and the Crane Division of the Naval Surface Warfare Centre (NSWC) created a program to use a phone’s camera to take surreptitious pictures of its surroundings, weed out poor photos, and send the remaining stills back to be used to construct a 3D model of the environment. Called PlaceRaider, the project shows that virtual thieves and spies could identify and steal information from a remote location, the researchers said in a paper posted online on 26 September.

‘Sensor malware’

The attack underscores that smartphones are more than just computers. They are also sensors, with cameras, accelerometers, and microphones. Attackers using “sensor malware” could use those additional capabilities to gather information not available to run-of-the-mill computer malware.

“From the attackers’ perspective, they can significantly increase their capabilities by using these programs and devices,” said Apu Kapadia, an assistant professor in informatics and computing at Indiana University, Bloomington, and one of the authors of the paper. “Not only do they have access to your digital data on your device, they can listen to your environment; they can look at your environment; and they can feel the environment through the accelerometer.”

In the paper, the researchers used PlaceRaider to take opportunistic pictures of the phone’s current environment and then used the photos and motion information from the accelerometer to create 3D models of the environments. Digital thieves and attackers can use these models to identify objects of interest within the environment and steal information on computer monitors, financial documents, or other information lying around.

Students using the 3D model were better able to detect coarse features of the environment, such as the number of doors, chairs, desks and windows. While test subjects looking at the photos identified many objects of interest – such as bar codes, checks, or a whiteboard – they had to sift through more than a thousand photos, rather than looking at a simply organised 3D image.

“We posit that (the 3D reconstruction) will perform much better for supporting navigation and virtual theft in larger space or multiple rooms,” the researchers stated in the paper.

Defence is difficult

This is not the first time that researchers have tried to expand the reach of malware on mobile devices. In October 2011, researchers from the Georgia Institute of Technology showed that the accelerometer of a phone sitting on a desk could accurately guess the words typed on a nearby keyboard. The same year, Kapadia and a team of researchers from the University of Indiana and the City University of Hong Kong demonstrated an attack that could listen to phone conversations and grab sensitive details, such as credit-card numbers.

Defending against such attacks is difficult. Many of the sensor features that attackers will likely abuse are also highly useful for smartphone owners, says Kapadia. Permission changes, especially for the accelerometer, could help slightly. Forcing the camera to make a shutter sound may also help. In addition, people should start thinking about leaving their devices behind in certain circumstances.

“Don’t take your phone into your bathroom or your bedroom,” he said. “Be careful about the environment that you are giving it access to.”

Yet, convincing consumers to leave their personal device behind will be difficult, he said, adding that he often leaves his phone by his bedside, because he uses it as an alarm clock.

Test your Microsoft knowledge! Take our quiz.

Robert Lemos

Robert Lemos covers cyber security for TechWeekEurope and eWeek

Recent Posts

Apple, Google Mobile Ecosystems Should Be Investigated, CMA Told

CMA receives 'provisional recommendation' from independent inquiry that Apple,Google mobile ecosystem needs investigation

4 hours ago

Australia Rejects Elon Musk Claim About Social Media Ban For Under-16s

Government minister flatly rejects Elon Musk's “unsurprising” allegation that Australian government seeks control of Internet…

7 hours ago

Northvolt Files For Bankruptcy Protection In US

Northvolt files for Chapter 11 bankruptcy protection in the United States, and CEO and co-founder…

9 hours ago

UK’s CMA Readies Cloud Sector “Behavioural” Remedies – Report

Targetting AWS, Microsoft? British competition regulator soon to announce “behavioural” remedies for cloud sector

1 day ago

Former Policy Boss At X, Nick Pickles, Joins Sam Altman Venture

Move to Elon Musk rival. Former senior executive at X joins Sam Altman's venture formerly…

1 day ago

Bitcoin Rises Above $96,000 Amid Trump Optimism

Bitcoin price rises towards $100,000, amid investor optimism of friendlier US regulatory landscape under Donald…

1 day ago