Hackers are watching you this holiday season, so be as mindful of your phone as of your cash and credit cards.
In general, your phone and data are safe. Attacks from sophisticated hackers, though, could make your phone vulnerable, according to Michigan State University research.
This is particularly noteworthy this time of year, as more people use numerous public Wi-Fi networks as they travel and shop online.
Wi-fi calling carries risks
If you make calls via Wi-Fi—regardless of the carrier—your phone could be hacked or your privacy could be leaked.
Wi-Fi calling services allow users to use cellular network voice and text services over private or public Wi-Fi networks. To protect Wi-Fi calling users, all Wi-Fi calling packets are encrypted.
Moreover, if an attack such as denial of service is detected, operational Wi-Fi calling service providers quickly switch back to their safer cellular networks using WiFi2Cellular-Switch.
“Savvy hackers, however, can suppress the WiFi2Cellular-Switch mechanism,” says Guan-Hua Tu, a computer scientist and engineer. “They can then launch a variety of attacks, such as disabling voice and text services on your phone or inferring your activities and device information.”
These aren’t limited to a single phone, either. Attacks can affect multiple phones. A hacker can leverage ARP, or Address Resolution Protocol, spoofing attack tools, such as EtterCap, to intercept all the Wi-Fi calling packets on a local network.
To keep your phone safe from an ARP spoofing attack, Tu recommends enabling the virtual private network on your phone while using public Wi-Fi.
This extra step of turning on VPN can protect your phone from these attacks. When Wi-Fi calling packets are mixed in with other internet services, such as accessing email, it camouflages your phone from being targeted, Tu says.
“You also can install ARP Guard as an additional precaution,” he says. “ARP Guard will issue an alert if your phone is under an ARP spoofing attack.”
Fingerprint sensors aren’t perfect
Contrary to common belief, fingerprint sensors are not the impenetrable fortress for security. They are a good measure, but they can be circumvented.
Fingerprints are unique, but since phone sensors are small, only partial prints are used to unlock phones. Unfortunately, partiality equates to commonality.
“When only a small portion of a fingerprint is used for authentication, there is a loss of distinctiveness,” says Arun Ross, computer scientist and engineer.
“Based on our research on partial prints, we coined a new term ‘MasterPrints.’ These are partial fingerprint impressions that fortuitously match many other fingerprints, akin to a master key that opens many locks.”
MasterPrints can be produced as actual artifacts, or spoofs, to unlock phones and other secured devices. If the vulnerability is not addressed effectively, ways to exploit it will become more refined, Ross adds.
Smartphone manufacturers can address this potential Achilles’ heel by improving the resolution of the sensors, which will only get smaller—and scan even smaller portions of fingerprints—in future devices.
They also can outfit these devices with anti-spoofing technology to deflect the use of fingerprint spoofs. Smartphone users can increase their security by using a multi-factor authentication scheme, such as fingerprint plus a passcode.
Written by Layne Cameron.
Source: Michigan State University.