Skip to main content [aditude-amp id="stickyleaderboard" targeting='{"env":"staging","page_type":"article","post_id":787191,"post_type":"story","post_chan":"none","tags":null,"ai":false,"category":"none","all_categories":"security,","session":"B"}']

Spy phones: How everyday hackers can turn your devices against you

Kevin McNamee

Kevin McNamee, director, Kindsight

Image Credit: Meghan Kelly/VentureBeat

LAS VEGAS — You downloaded an app from a third-party marketplace you don’t trust. Sure, the app might function like it’s supposed to, but it might have just turned your phone into a stealthy spy machine.

You’ve heard not to download apps from third-party stores, but what’s malware really going to do, anyway? Steal your device information? That’s not that bad. Except for when your phone starts silently taking pictures of you, recording your conversations, downloading your contact list, and sending maps of your location to hackers.

[aditude-amp id="flyingcarpet" targeting='{"env":"staging","page_type":"article","post_id":787191,"post_type":"story","post_chan":"none","tags":null,"ai":false,"category":"none","all_categories":"security,","session":"B"}']

No, this isn’t a nation state attack. This malicious app called DroidWhisperer was built by Kindsight security researcher Kevin McNamee, and for those in the industry, it seems fairly easy to do make such malware. He modeled the app after Angry Birds and submitted to a third-party app store. Once someone downloads the app, it connects the entire phone over the Internet to a command-and-control server.

What the hacker sees is both scary and impressively simple. A small dashboard shows different devices connected to the C&C through the app. He can click on a target phone and data such as the phone number, e-mail address, contact list, unique identifier, and carrier pop up immediately.

AI Weekly

The must-read newsletter for AI and Big Data industry written by Khari Johnson, Kyle Wiggers, and Seth Colaner.

Included with VentureBeat Insider and VentureBeat VIP memberships.

At the top of the dashboard there are different action buttons to take a picture, record video and audio, and send text messages and push notifications (think of the scary scene in Ghost when Patrick Swayze possesses a computer and writes “murder murder murder” on the screen).

“We’re using the standard APIs that Android provides,” said McNamee at the Black Hat conference. “It makes the perfect platform for spying.”

And stealthy it is. In order to hide his actions, McNamee first built-in the capability to turn down the phone’s volume so you don’t hear the phone performing different actions, such as the click of a camera. When it comes to taking pictures and video, the iPhone always shows a preview of this content. So he told the phone to display this information as only one pixel — too tiny for anyone to notice.

The app itself also functions just like Angry Birds, so no one would suspect its real purpose. He did this by downloading the legitimate Angry Birds and looking at the “APK” file, or the application package file, which houses all the information about the app. He then took apart the Angry Birds app, keeping all the parts, but slipping in his own code where appropriate and then putting it back together.

“It is a very powerful sort of cyber-surveillance device, the phone,” said McNamee. “Android is a very flexible platform to work with … I believe the same thing can be done with iOS.”

VentureBeat's mission is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. Learn More