“Trust not the horse, O Trojans. Be it what it may, I fear the Greeks when they offer gifts” _Virgil. Many of us have heard about the Greek mythology “Trojan horse” where a wooden horse was made for hiding soldier to enter the city of troy during war. No one thought that this small gesture of gift can be end up losing the war.
Picture by Moonlock
Moreover, in 20th century that Trojan horse referred to the various spyware application which are used to steal personal data. Spywares applications affect not only the PC or desktop, but they also proven significant risks to mobile devices. Those spywares can access your personal data, listen your conversations or track your location; in one word, they become your shadow.
Definition of Spyware and their duties
Spyware is a type of uncertified software installed on your devices without permission and sends your personal data to the central server. Initially, it intrudes on your devices and start spying on your activities. It can gather data through keystrokes, capturing screenshots or video recordings.
Types of spyware
Spyware can come in various form depending on its tasks. For example:
- Adware: This type of spyware uses to do unwanted advertisements on the device. It tracks your online activity and depends on it this spyware encourages people to enter an unauthorized link by showing them wining a price. For example: if one person like to do shopping, adware may show them wining a voucher of shopping.
- Stalkerware: From the name we can guess its task which is stalking you. Stakerware can monitor what you are doing on the device, access your camera and microphones, taking screenshots of your activity.
- Government-grade spyware: It’s a spyware that was made up to tackle the terrorism and crime. However, it eventually be misused to spy on journalist, politicians, lawyers or anyone. Through government-grade spyware, attackers can intercept your phone calls, messages, location and private information.
- Trojans: Trojans spyware enter to your devices through unauthorized email, malicious files or spoofed websites. Once it enters in your device, it starts stealing and spying on your personal data.
- Rootkit: It’s a special form of spyware that allows hackers to access the device remotely. The primary goal of this spyware is to steal PII (Personally Identifiable Information) and take control the center of a system. Another alarming thing about rootkit is, it can hide itself from antivirus software.
Typical warning signs of a spyware
There are multiple signs that shows your device might affected by spyware.
Firstly, strange behavior of your mobile set like battery drain, overheating, automatic GPS location, camera and mic activation, random reboots or unexplained crashes is a strong indication that your handset has been compromised.
Secondly, mysterious use of mobile data is another warning sign, which indicate that background remote connections may be active.
Thirdly, experiencing unfamiliar noises during phone calls or getting unusual messages is another sign that your device has some functioning spyware.
Fourthly, observing unfamiliar apps or files on your phone is another major warning of having spyware.
Real life scenario of spyware attacks
Pegasus
In 2021 the Israel based “NSO Group’s Pegasus spyware” was discovered on the mobile set of some influential personals like journalist, politicians and media persons. All of them were the customer of NSO Group.
Ghost RAT
In the same were a free android game emulator, “NoxPlayer” got affected by “Trojan Horse” spyware which was accomplished a way manage user’s device.
PhoneSpy
Again, security experts reveal that 1000 android devices in South Korea got breached by a spyware which used to control the device and sends personal data.
Picture by Pixel
Removing spyware from devices
- Using malware scan software and removal tool: The easiest way to remove spyware is using malware detecting software and removal tool. Antivirus vendors like Avast, Bitdefender has some dedicated mobile application to detect and remove spyware. However, it’s not best solution for all scenario.
- Manually check device administration and delete suspicious apps: In mobile security settings, anyone can if any apps have unauthorized permissions and detect the apps you didn’t installed on your device. Check for those apps manually and delete any unauthorized apps or permissions.
- Reboot in safe mood: Sometimes you can anticipate unfamiliar third-party software from operating system. For android users, they can just long pressing power off button and turn the safe mood on.
- Handset operating system update: When your phone updates its new version of operating system, it comes under more data security element which able to find out the spyware apps and delete automatically.
- Factory reset: It’s a very promising way to get rid of spyware files. For android users, this option can be found under Settings > General Management > Reset > Factory Data Reset. Again, for iOS, go to Settings > General > Transfer or Reset phone.
Lastly, mobile phone is one of the most commonly used items in this evolving world. People like to operate their daily necessary work from various mobile apps including the financial apps, home security app, social media app and many more. All those apps contain very sensitive data which must not be disclosed to any outsiders. For that reason, it is high time to create awareness for using those daily apps and create perception for spyware app.
Reference:
- Britannica, T. Editors of Encyclopaedia (2024, April 11). Trojan horse. Encyclopedia Britannica. https://www.britannica.com/topic/Trojan-horse
- D’Andrea, A. (2024, August 28). Types of spyware. Keeper Security Blog – Cybersecurity News & Product Updates. https://www.keepersecurity.com/blog/2024/08/28/types-of-spyware/
- Osborne, C. (2024, May 30). How to find and remove spyware from your phone. ZDNET. https://www.zdnet.com/article/windows-security-how-to-protect-your-home-and-small-business-pcs/
- Roberts, D. (2024, March 6). What is spyware?. Moonlock. https://moonlock.com/spyware?ci=20676254109&utm_source=google&utm_medium=cpc&utm_campaign=Search_DSA_US_en&utm_term=&adgroupid=156585865661&adpos=&ck=&targetid=dsa-558176266507&match=&gnetwork=g&creative=693208117184&placement=&placecat=&accname=Moonlock&gad_source=1&gclid=Cj0KCQjwpP63BhDYARIsAOQkATakXbcX2LhCKR7r5zzVJBFBeTL5RphCLa0xuFFiXqjRs324NlzE9xsaAozKEALw_wcB
Great post Shuvo, very interesting read about spyware. It was very good to see the different types and what they are for. I think Adware for example is probably ubiquitous at this point. I would be surprised if there wasn’t at least one on all our phones. I am not entirely sure how I feel about Adware though. On one hand its stealing my data, but on the other hand its using it to recommend products that I probably want. In a recent article by security.org [1], they talk about how the biggest issue with adware is that they sell you data to third party sites. Its one thing for amazon to know I need a new laptop, but am not sure random a bot farms in Russia does.
1. https://www.security.org/antivirus/adware/#:~:text=Adware%20is%20bad%20because%20it,and%20potentially%20crash%20your%20browser.