Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Researchers Demonstrate 3D Spy Trojan for Mobile Phones

    By
    Robert Lemos
    -
    September 28, 2012
    Share
    Facebook
    Twitter
    Linkedin

      Most people worry about traditional viruses and Trojans—the malware that could infect their computer and steal data or use the system’s resources to attack other computers. Yet new research shows that people should, perhaps, worry more about their ever-present mobile phones and the devices’ ability to record their lives.

      Researchers at the University of Indiana at Bloomington and the Crane Division of the Naval Surface Warfare Center (NSWC) created a program to use a phone’s camera to take surreptitious pictures of its surroundings, weed out poor photos, and send the remaining stills back to be used to construct a 3D model of the environment. Called PlaceRaider, the project shows that virtual thieves and spies could identify and steal information from a remote location, the researchers said in a paper posted online on Sept. 26.

      The attack underscores that smartphones are more than just computers. They are also sensors, with cameras, accelerometers and microphones. Attackers using “sensor malware” could use those additional capabilities to gather information not available to run-of-the-mill computer malware.

      “From the attackers’ perspective, they can significantly increase their capabilities by using these programs and devices,” said Apu Kapadia, an assistant professor in informatics and computing at Indiana University, Bloomington, and one of the authors of the paper. “Not only do they have access to your digital data on your device, they can listen to your environment; they can look at your environment; and they can feel the environment through the accelerometer.”

      In the paper, the researchers used PlaceRaider to take opportunistic pictures of the phone’s current environment and then used the photos and motion information from the accelerometer to create 3D models of the environments. Digital thieves and attackers can use these models to identify objects of interest within the environment and steal information on computer monitors, financial documents or other information lying around.

      Students using the 3D model were better able to detect coarse features of the environment, such as the number of doors, chairs, desks and windows. While test subjects looking at the photos identified many objects of interest—such as bar codes, checks, or a whiteboard—they had to sift through more than a thousand photos, rather than looking at a simply organized 3D image.

      “We posit that (the 3D reconstruction) will perform much better for supporting navigation and virtual theft in larger space or multiple rooms,” the researchers stated in the paper.

      This is not the first time that researchers have tried to expand the reach of malware on mobile devices. In October 2011, researchers from the Georgia Institute of Technology showed that the accelerometer of a phone sitting on a desk could accurately guess the words typed on a nearby keyboard. The same year, Kapadia and a team of researchers from the University of Indiana and the City University of Hong Kong demonstrated an attack that could listen to phone conversations and grab sensitive details, such as credit-card numbers.

      Defending against such attacks is difficult. Many of the sensor features that attackers will likely abuse are also highly useful for smartphone owners, says Kapadia. Permission changes, especially for the accelerometer, could help slightly. Forcing the camera to make a shutter sound may also help. In addition, people should start thinking about leaving their devices behind in certain circumstances.

      “Don’t take your phone into your bathroom or your bedroom,” he said. “Be careful about the environment that you are giving it access to.”

      Yet, convincing consumers to leave their personal device behind will be difficult, he said, adding that he often leaves his phone by his bedside, because he uses it as an alarm clock.

      Robert Lemos
      Robert Lemos is an award-winning freelance journalist who has covered information security, cybercrime and technology's impact on society for almost two decades. A former research engineer, he's written for Ars Technica, CNET, eWEEK, MIT Technology Review, Threatpost and ZDNet. He won the prestigious Sigma Delta Chi award from the Society of Professional Journalists in 2003 for his coverage of the Blaster worm and its impact, and the SANS Institute's Top Cybersecurity Journalists in 2010 and 2014.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×