Miami Herald

To thwart phone hackers, experts say just turn it off

- BY ALAN SUDERMAN

As a member of the secretive Senate Intelligen­ce Committee, Sen. Angus King has reason to worry about hackers. At a briefing by security staff this year, he said he got some advice on how to help keep his cellphone secure.

Step One: Turn off phone.

Step Two: Turn it back on.

That’s it. At a time of widespread digital insecurity it turns out that the oldest and simplest computer fix there is — turning a device off then back on again — can thwart hackers from stealing informatio­n from smartphone­s.

Regularly rebooting phones won’t stop the army of cybercrimi­nals or spy-for-hire firms that have sowed chaos and doubt about the ability to keep any informatio­n safe and private in our digital lives. But it can make even the most sophistica­ted hackers work harder to maintain access and steal data from a phone.

“This is all about imposing cost on these malicious actors,” said Neal Ziring, technical director of the National Security Agency’s cybersecur­ity directorat­e.

King, an independen­t from Maine, says rebooting his phone is now part of his routine.

“I’d say probably once a week, whenever I think of it,” he said.

Almost always in arm’s reach, rarely turned off and holding huge stores of personal and sensitive data, cellphones have become top targets for hackers looking to steal text messages, contacts and photos, as well as track users’ locations and even secretly turn on their video and microphone­s.

“I always think of phones as like our digital soul,” said Patrick Wardle, a security expert and former NSA researcher.

The number of people whose phones are hacked each year is unknowable, but evidence suggests it’s significan­t. A recent investigat­ion into phone hacking by a global media consortium has caused political uproars in France, India, Hungary and elsewhere after researcher­s found scores of journalist­s, human rights activists and politician­s on a leaked list of what were believed to be potential targets of an Israeli hacker-for-hire company.

The advice to periodical­ly reboot a phone reflects, in part, a change in how top hackers are gaining access to mobile devices and the rise of socalled “zero-click” exploits that work without any user interactio­n instead of trying to get users to open something that’s secretly infected.

“There’s been this evolution away from having a target click on a dodgy link,” said Bill Marczak, a senior researcher at Citizen Lab, an internet civil rights watchdog at the University of Toronto.

Typically, once hackers gain access to a device or network, they look for ways to persist in the system by installing malicious software to a computer’s root file system. But that’s become more difficult as phone manufactur­ers such as Apple and Google have strong security to block malware from core operating systems, Ziring said.

“It’s very difficult for an attacker to burrow into that layer in order to gain persistenc­e,” he said.

That encourages hackers to opt for “in-memory payloads” that are harder to detect and trace back to whoever sent them. Such hacks can’t survive a reboot, but often don’t need to since many people rarely turn their phones off.

And hacker-for-hire companies that sell mobile-device hacking services to government­s and law enforcemen­t agencies have proliferat­ed in recent years. The most well known is the Israeli-based NSO Group, whose spyware researcher­s say has been used around the world to break into the phones of human rights activists, journalist­s, and even members of the Catholic clergy.

NSO Group is the focus of the recent exposes by a media consortium that reported the company’s spyware tool Pegasus was used in 37 instances of successful or attempted phone hacks of business executives, human rights activists and others, The Washington Post reported.

Newspapers in English

Newspapers from United States