Think twice before downloading mobile phone apps, say cyber experts

January 14, 2017 01:00 am | Updated 08:04 am IST - BENGALURU:

It has come to light that pirated phone applications are now being used to hack into personal details, including photographs and bank credentials, of mobile phone users. With the help of malware implanted in them, hackers are accessing mobile wallets and banking applications on people’s mobile phones.

This has become a cause for concern as online transactions have increased in the wake of demonetisation, and the number of such malware entering mobile phones are also on the rise, experts have said. The victims are also led to malware implanting websites through links sent through WhatsApp messages.

Pavan Duggal, Supreme Court advocate specialising in cyber law, said that the number of cases pertaining to mobile wallets being comprised in Bengaluru itself has gone up. “In the wake of demonetisation, breaches in cyber security have increased,” he said.

How it works

Mobile users should be aware that the malware, including ransomware, keylogger and coat-trailing trojans, can be transmitted through the applications. “These malwares infiltrate the mobile phones and computers too,” said N. Vijayshankar, cyber security expert. They point out that there are three methods in which a phone or laptop can get compromised by a malware – via an application-led attack, through browsers or through Internet networks like free Wi-Fi.

“Once a malware such as ransomware is implanted in the phone, it either locks the phone or encrypts the data. Important data like photos, bank details and other information can be stolen,” said Kapil Awasthi, security evangelist, Checkpoint, India, a cyber-security company.

With the increase in digital payment mechanisms, ransomware operators can be expected to launch more attacks. “Earlier, laptops used to be the targets for malware. Now, even mobile phones are targets. In the last eight months, we have seen desktops, which are behind layers of security in an organisation, also being attacked by ransomware,” he said.

Once locked or encrypted, the hackers demand a ransom. “Most often the payment has to be through bitcoins. However, the ransom is most often an amount that is affordable by the victim,” added Mr. Awasthi.

Meanwhile, the key logger malware captures the key strokes and in this manner steals the credentials. The accompanying trojan on the other hand enters a particular site, like that of a bank, when the victim logs in and then transfers the money into different accounts.

Laws needed

Mr. Duggal added that there is a need to have a proper legal framework to assist victims who lose money to cyber criminals. “There should be dedicated cyber security laws as India is already on the way to a cashless economy,” he said.

0 / 0
Sign in to unlock member-only benefits!
  • Access 10 free stories every month
  • Save stories to read later
  • Access to comment on every story
  • Sign-up/manage your newsletter subscriptions with a single click
  • Get notified by email for early access to discounts & offers on our products
Sign in

Comments

Comments have to be in English, and in full sentences. They cannot be abusive or personal. Please abide by our community guidelines for posting your comments.

We have migrated to a new commenting platform. If you are already a registered user of The Hindu and logged in, you may continue to engage with our articles. If you do not have an account please register and login to post comments. Users can access their older comments by logging into their accounts on Vuukle.