blog posts

If Your Phone Opens By Itself, It Is Probably Hacked; What Do We Do?

If Your Phone Opens By Itself, It Is Probably Hacked; What Do We Do?

With The Help Of A Method Called Ghosttouch, Hackers Can Simulate Touch Gestures By Sending Signals And Take Control Of Your Phone By Hacking Them!

According to experts’ latest findings, some hackers can remotely hack users’ phones and take control of them without installing any malware!

NordVPN researchers have recently found a new method for hacking smartphones, in which electromagnetic signals are sent to the device; this way, some movement gestures, such as swiping, tapping, etc., are simulated.

This method, called GhostTouch, was discovered for the first time by scientists from China’s Zhejiang University and Germany’s Darmstadt University of Technology.

New GhostTouch hack lurking on your phone!

Hack phone

Recently, many reports have been published about hackers using the GhostTouch method and accessing critical information such as passwords, bank information, etc.

Hackers have also been able to install malware on the phone in this way.

Of course, it should be noted that to use the GhostTouch hacking method, the attacker’s device must be relatively close to the victim’s phone. Nevertheless, considering the pattern of users’ consumption in public spaces, researchers do not consider this issue to be a significant obstacle for hackers!

One of Nord VPN’s researchers said:

Unfortunately, public places such as libraries, cafes, or conference lobbies are the most critical places where hackers can hack the touch screen of smartphones!

This situation worsens when the phone screen faces the floor or table; Because, in this situation, hackers can send signals with the help of their transmitter device and hack the device remotely.

In this situation, the user may never notice that his phone has been hacked!

NordVPN also claims that the GhostTouch method can work from a distance of up to forty meters.

Hackers must hide the transmitter devices under the table and send the relevant signals to do this. If the communication between the transmitter device and the phone is established, the distance between them will not matter, and the device can be hacked from any distance!

Nine smartphone models, including iPhone SE 2020, Samsung Galaxy S20 FE 5G, Redmi 8, and Nokia 7.2, have been hacked using the GhostTouch method!

Hack phone

Of course, this hack is not so subtle and precise; Because even if the process is successful, users will notice that various methods are being carried out on their phone, and they can quickly prevent damage to the device by turning it off or taking other measures!

Also, on the other hand, GhostTouch isn’t that mainstream yet! According to NordVPN, currently, by searching for the term “phone unlocks itself” in Google, about 209 million results will be displayed.

Naturally, not all of these results are related to the GhostTouch hack. However, some of them refer to this method.

The best way to prevent the phone from being hacked by the GhostTouch method is to use more layers of security such as PIN code, pattern, or fingerprint sensor to enter the phone!