It’s most likely you’re reading these very words from your mobile phone. If you are then you’re among the 25 to 40 million smartphone users in Nigeria. While we’re all grateful for the technology that enables us to accomplish a lot and stay connected right from the palm of our hands, some of us aren’t concerned about the security of our mobile devices. if you’re in the category of those who don’t take mobile phone security seriously, here’s something you should consider. Nigeria is the 6th country in the world with the highest mobile malware encounter rate for quarter 3 in 2020.
Even with the stats above, You might still be wondering, “what’s the big deal?” “Why should I be worried if my device gets infected with mobile malware?” “What’s the worst that can happen, after all, I’m no VIP or celebrity.” Even though you’re not the heir to the British royal throne or have a million dollars in your name, your mobile device is still valuable to the makers of mobile malware. Here are a few reasons cybercriminals find your mobile phone valuable.
Contacts and Call Logs
The primary function of a mobile phone, phone contacts, and call logs are priceless to the mobile phone owner. It can therefore be a pivot for a malicious hacker who has gotten hold of these data via mobile malware. The hacker could easily spread malware to your contacts through phishing links sent via messages impersonating you.
Photos, Videos and Recordings
A certain type of mobile malware, called Remote Access Trojans (RATs) can give a cybercriminal complete control of a compromised device. With such control, the cybercriminal can access your photos, videos and recording then send them to another device for storage. These could be made public or if embarrassing, could be used for blackmail.
Social Media Accounts
One of the appeals of a smartphone is the use of social media applications such as Facebook, Twitter, and Instagram. These mobile apps are the preferred gateway to the social media world. A phone compromised via mobile malware can give easy access to the social media accounts on these applications. This can be very damaging for the owner as cybercriminals can use access to the social media accounts to do the following:
- Lockout the original owner by changing the password
- Post damaging contents on the owner’s social media profile thereby damaging the owner’s reputation
- Carry out impersonation and could use this privilege to request money from friends/followers of the original owner or to further spread malware.
E- Wallet, Bank App
Ultimately, mobile banking apps have given users access to their money allowing them to process their payments or even receive funds and also carry out various transactions while saving time. According to Investopedia, an E-Wallet is “a virtual wallet that stores payment card information on a mobile device.”
So think of these tools like a remote control for your money, in the wrong hands, it could be misused. Cybercriminals can use your E-Wallet or Bank apps to do the following;
- Siphoning off money
- Gain access to your debit/credit card details to make unsolicited transactions
- Gain access to your transaction history
- Use your account to receive stolen money
Chat & Messaging Applications
WhatsApp and Telegram are two examples of chat applications that are frequently used for communication. They also offer access to our inner circle as they are often used to communicate with family and friends. A compromised phone can give cyber criminals access to install more malware that can fully compromise these messaging apps and copy personal data contained in them. This personal information can be sold or used to create a social engineering attack.
Files, SMS, & Location
Files and SMS on a phone are a rich source of personal information. Apart from stealing these, there’s a type of malware called ransomware that now has a mobile variant that can lock a device, before demanding payment to return stolen data to the user or unlock the device. Also, Cybercrime goes beyond banking transactions and stealing data. Cybercrime could venture into common crimes like murder, kidnapping, and rape. Cybercriminals could exploit the location (GPS) on a user’s mobile phone to have knowledge of frequently visited places, usual routes taken to an office and/or home, and even know your real-time location to perpetrate these crimes and snoop on the phone.
How to Protect your Mobile Phone
- Enable Phone Lock (PIN, Pattern, Face ID, Fingerprint, Password) A common threat is getting your device stolen, which could give a thief or a hacker complete access to your personal information.
- Regularly Update your mobile Apps
- Never ignore Security or Software Updates
- Avoid connecting to public WiFi
- Don’t root your phone
- Encrypt your data
- Install an Anti-virus
- Only download apps from verified app stores
- Beware of downloads
- Turn off Bluetooth & Wi-Fi when not in use
- Visit secure websites or browse verified websites
Contributors:
Oluwabunmi Adeyemo
Oluwaseun Adio