HOW HACKERS MIGHT GAIN ACCESS TO YOUR ANDROID SMART PHONE (BE MINDFUL OF PERMISSIONS YOU GIVE TO APPS)

HOW HACKERS MIGHT GAIN ACCESS TO YOUR ANDROID SMART PHONE (BE MINDFUL OF PERMISSIONS YOU GIVE TO APPS)

Today smart phones have taken over computers, thus opening opportunities for android developers.

Most times when we download a new app, we fail to take note of the permissions such app is requesting to access during installation….
😞😞😞😱 That can give u a nasty rat bite in the ass.
Apart from malware, ransomware, viruses and spyware. There are still a lot of parasitic apps that hide within so called FREE Apps that are aimed at monitoring/gathering information about you.

How do you fall victim?

Most times these apps take advantage of Social engineering to buy your heart. Once you install… You’ve got a rat problem.
 Reasons why we should take note of permissions requested by andriod apps during installation on our mobile device. 

1. Programmers can bind a malicious APK with any other Game or useful App just to seduce you into installing.

– After you ignorantly install the app, you have given out access to remotely:

– Explore your Files with full access.
–  Read/Write Messages.
–  Make a call, record a call and browse call logs.
– Read and write contact list.
– Capture photos and videos.
– Listen to your live conversation through mic/record mic sound live.
– Check browser history.
– Get GPS Location.
–  Check installed apps.
–  Get phone’s information (IMEI, WIFI MAC, PHONE CARRIER).

Apps like Driodjack and SpyNote are lightweight Android remote administration tools (RAT) to hack into a smartphone device remotely. It gives the hacker, the power to establish control over the victim’s Android devices with an easy to use GUI and all the features they need to monitor them, Build a custom APK or bind the payload to an already existing APK such as a game or social media app. 
Please be careful to check the apps you install properly.
e.g There is no reason why a game app should request permission to access call logs, contacts, messages, browser etc.
That should signal you a suspicious red flag

NOTE:
This post is only intended to help smartphone user overcome the tricks hackers could use to gain access to their smartphones.

Worths-Alive

Leave a Reply