Blogs -5 Ways Hackers Attack Mobile Devices and Applications

5 Ways Hackers Attack Mobile Devices and Applications


June 12, 2018

author

Beth Kindig

Lead Tech Analyst

Hackers go about achieving their goals with reverse engineering software to find vulnerabilities they can exploit, data they can extract, or ways to modify the software to do something it was never intended to do. The primary consequences of applications getting hacked include financial loss, destroyed brand reputation, exposure to liability, and regulatory risk.

Over 7 billion identities have been stolen in data breaches over the last eight years equal to one data breach for every person on the planet. 

Why do Hackers Attack Mobile Devices and Applications?

In order to understand threats, we must understand what hackers are trying to achieve. Hackers will mount different kinds of attacks to achieve different kinds of goals. And so, defending against hackers in the context of application security may involve defending against many different kinds of attacks on your mobile device.

Hackers might be interested in bypassing business logic. For example, they might want to bypass controls that let them cheat at a video game or violate the terms of a software license. Of more serious concern is the potential for hackers to bypass controls in safety critical systems. It is not inconceivable that lives could be at risk if a hacker were able to hack a medical device, connected car or some component of critical infrastructure, such as a wind farm, a coal or nuclear power plant, a power grid, or a water treatment facility.

According to a recent study, automobiles today run systems that have more than 100 million lines of code. Those applications often contain valuable intellectual property, which hackers would rather steal than develop. For example, they might be a competitor or a nation state with inferior technology attempting to improve their own products in order to compete more effectively.

Hackers might also be interested in obtaining valuable pieces of data that are managed within the application, such as music or video, financial data, or privacy sensitive health data.

While data can be protected with cryptography, this only shifts the problem from protecting the data directly to protecting the cryptographic keys. Cryptographic keys are not only used to protect data. They can also be used to create a secure identity for a device.

A device may need such a key to authenticate to a cloud service. If a hacker were able to obtain this secret, they might be able to masquerade as that device or as the owner of the device. Cryptographic keys are also used to establish secure communications. For example, HTTPS is a familiar protocol that uses SSL/TLS to secure communication to websites. If a hacker were able to obtain these keys, they could snoop on or alter supposedly secure communications.

For all of these reasons, hackers are highly motivated to steal cryptographic keys embedded in or controlled by an application.

Sometimes hackers aren’t interested in the application itself, but using the application as a digital stepping stone to try to achieve some other goal. Hackers are often interested in obtaining root access on the device the application is running on, so they can install malware or use the device as a launch pad to attack something else.

Consider the 2016 Mirai botnet that infected web enabled cameras and installed a piece of malware that launched the largest distributed denial of service attack in history against the dynamic domain name service Dyn, causing wide spread internet outages. Those 100,000 cameras were able to launch 1.2 terabytes per second of data at a major piece of the global internet infrastructure. Here the goal of the attacker was not to compromise the webcam directly, but rather to bring down the web services of many companies whose DNS was controlled by Dyn.

https://images.prismic.io/bethtechnology/0c4ed1c4-eaaf-45dc-8dea-cb9401020d10_1_4idajMUvAc-9r4di_T4JMg.png?auto=compress,format

Hacking Mobile Devices: Reverse Engineering and Tampering

Hackers employ two fundamental techniques when attacking: reverse engineering and tampering. If the hacker is trying to bypass business logic, they have to find where in the application the business logic resides. That requires reverse engineering. Then they typically must tamper with the application to bypass that logic.

If the hacker is trying to steal intellectual property, sensitive data or cryptographic keys from an application, they have to know where to look in the application. Unless those secrets are obvious, hackers need to reverse engineer the application to find them.

https://images.prismic.io/bethtechnology/b7bc9cbe-61f1-4643-95b9-37ca7fac4e5d_1_W-J4RtdfrHYDIzPbZNAeAw.png?auto=compress,format

If the hacker is trying to create a stepping stone attack, they often use the workflow shown in Figure 1:

  • First, they find some vulnerability in the application, which again requires reverse engineering;
  • Then, they craft an exploit that takes advantage of that vulnerability;
  • Finally, they attack by launching the exploit to the application.

In a remote attack like the popular SQL injection attack, this may involve sending the message to the application over the internet. But if they have physical access to the device, which with mobile and IoT based systems can be as easy as a trip to the store, then they can directly tamper with the device.

head bg

More To Explore

Newsletter

TSMC semiconductor manufacturing facility (fab) with the company logo on the building.

The Future of AI Stocks? TSMC Commentary Suggests AI Megatrend

TSMC is one of the least sensational management teams in the AI stocks space, yet management explicitly called AI a multi-year “megatrend” in their most recent earnings call, with demand now being pul

January 29, 2026
2026 Big Tech AI strategy comparison: Apple, Amazon, Google, Meta, and Microsoft transitioning to AI infrastructure monetization.

The $530 Billion AI Question: Which Big Tech Stock is Winning?

Big Tech is expected to invest $530 billion for building AI infrastructure in 2026, while the path to near-term monetization remains a question mark. As investor scrutiny around capital expenditure in

January 22, 2026
A futuristic city designed like a glowing circuit board, with the Palantir logo at the center.

Palantir Stock 2026 Forecast: Is Its High Valuation Sustainable?

Palantir’s stock has defied gravity, delivering steady performance that no other AI software stock has come close to matching (yet). For investors, the Palantir thesis is two-fold: the company must co

January 15, 2026
A high-impact graphic titled "Top 10 Tech Stocks of 2025" featuring a grid of futuristic technology icons including microchips, digital circuits, and AI data nodes.

Top 10 Tech Stocks of 2025: How the AI Trade Defied the Skeptics

The stock market in 2025 was a high-stakes tug-of-war between geopolitical tensions and the AI trade. Headlines were dominated by the DeepSeek fears, trade wars, tariffs, and persistent whispers of th

January 08, 2026
I/O Fund analyst team with a graphic promoting “The Best of I/O Fund’s Free Newsletter in 2025,” showing an upward chart and market-themed background.

Nvidia & Beyond: I/O Fund’s Best Free AI Stock Research in 2025  

We describe our newsletter as “free,” however the resources required to produce the research behind our weekly analysis are substantial. Delivering early, actionable insights consistently—and making t

December 31, 2025
A Fox Business live interview features Beth Kindig, Lead Tech Analyst at I/O Fund, discussing NVIDIA.

AI Stocks & Nvidia: I/O Fund’s 2025 Tech Media Highlights

As we close out a defining year for tech, we’re proud to share a few media moments where our theses met the mainstream. We are grateful that our readers trust us to cut through the noise - and we want

December 23, 2025
Meta logo glowing on a futuristic microchip with neon circuitry and rising stock chart, symbolizing AI growth and monetization.

The AI Revenue Leader Nobody Is Talking About—Second Only to Nvidia Stock

Meta’s stock sits at the center of the AI spending debate, as Big Tech continues to shock markets with outsized AI-driven capital expenditures. What is being overlooked is that Meta’s stock is already

December 18, 2025
Nvidia, Broadcom (AVGO), and AMD AI Accelerator Chips Comparison

Broadcom Stock: The Silent Winner in the AI Monetization Supercycle

The AI accelerator market will inevitably widen beyond Nvidia’s GPUs - the keyword is widen. More players will sell more AI systems as the market expands, and that growth supports both the clear leade

December 11, 2025
A large digital wave with Nvidia’s green accents, made of binary code and GPU textures, rising with an upward market graph.

Nvidia Stock and the AI Monetization Supercycle No One Is Pricing In

Two weeks ago, Nvidia blew the doors off with an earnings report that defies the company’s mega-cap scale. The long-awaited Blackwell and Blackwell Ultra architectures are shipping in volume, leading

December 04, 2025
Digital image of a glowing Bitcoin coin centered over a candlestick chart, representing price volatility and technical analysis in the crypto market.

I/O Fund Called the Bitcoin Selloff: What Liquidity & DXY Data Predict Next

In August, the I/O Fund warned that Bitcoin was entering a high-risk phase as global liquidity stalled, and sentiment patterns flashed caution. Since then, Bitcoin has fallen more than -35%. In this a

November 28, 2025
newsletter

Sign up for Analysis on
the Best Tech Stocks


Copyright © 2010 - 2026