Blogs -5 Ways Hackers Attack Mobile Devices and Applications

5 Ways Hackers Attack Mobile Devices and Applications


June 12, 2018

author

Beth Kindig

Lead Tech Analyst

Hackers go about achieving their goals with reverse engineering software to find vulnerabilities they can exploit, data they can extract, or ways to modify the software to do something it was never intended to do. The primary consequences of applications getting hacked include financial loss, destroyed brand reputation, exposure to liability, and regulatory risk.

Over 7 billion identities have been stolen in data breaches over the last eight years equal to one data breach for every person on the planet. 

Why do Hackers Attack Mobile Devices and Applications?

In order to understand threats, we must understand what hackers are trying to achieve. Hackers will mount different kinds of attacks to achieve different kinds of goals. And so, defending against hackers in the context of application security may involve defending against many different kinds of attacks on your mobile device.

Hackers might be interested in bypassing business logic. For example, they might want to bypass controls that let them cheat at a video game or violate the terms of a software license. Of more serious concern is the potential for hackers to bypass controls in safety critical systems. It is not inconceivable that lives could be at risk if a hacker were able to hack a medical device, connected car or some component of critical infrastructure, such as a wind farm, a coal or nuclear power plant, a power grid, or a water treatment facility.

According to a recent study, automobiles today run systems that have more than 100 million lines of code. Those applications often contain valuable intellectual property, which hackers would rather steal than develop. For example, they might be a competitor or a nation state with inferior technology attempting to improve their own products in order to compete more effectively.

Hackers might also be interested in obtaining valuable pieces of data that are managed within the application, such as music or video, financial data, or privacy sensitive health data.

While data can be protected with cryptography, this only shifts the problem from protecting the data directly to protecting the cryptographic keys. Cryptographic keys are not only used to protect data. They can also be used to create a secure identity for a device.

A device may need such a key to authenticate to a cloud service. If a hacker were able to obtain this secret, they might be able to masquerade as that device or as the owner of the device. Cryptographic keys are also used to establish secure communications. For example, HTTPS is a familiar protocol that uses SSL/TLS to secure communication to websites. If a hacker were able to obtain these keys, they could snoop on or alter supposedly secure communications.

For all of these reasons, hackers are highly motivated to steal cryptographic keys embedded in or controlled by an application.

Sometimes hackers aren’t interested in the application itself, but using the application as a digital stepping stone to try to achieve some other goal. Hackers are often interested in obtaining root access on the device the application is running on, so they can install malware or use the device as a launch pad to attack something else.

Consider the 2016 Mirai botnet that infected web enabled cameras and installed a piece of malware that launched the largest distributed denial of service attack in history against the dynamic domain name service Dyn, causing wide spread internet outages. Those 100,000 cameras were able to launch 1.2 terabytes per second of data at a major piece of the global internet infrastructure. Here the goal of the attacker was not to compromise the webcam directly, but rather to bring down the web services of many companies whose DNS was controlled by Dyn.

https://images.prismic.io/bethtechnology/0c4ed1c4-eaaf-45dc-8dea-cb9401020d10_1_4idajMUvAc-9r4di_T4JMg.png?auto=compress,format

Hacking Mobile Devices: Reverse Engineering and Tampering

Hackers employ two fundamental techniques when attacking: reverse engineering and tampering. If the hacker is trying to bypass business logic, they have to find where in the application the business logic resides. That requires reverse engineering. Then they typically must tamper with the application to bypass that logic.

If the hacker is trying to steal intellectual property, sensitive data or cryptographic keys from an application, they have to know where to look in the application. Unless those secrets are obvious, hackers need to reverse engineer the application to find them.

https://images.prismic.io/bethtechnology/b7bc9cbe-61f1-4643-95b9-37ca7fac4e5d_1_W-J4RtdfrHYDIzPbZNAeAw.png?auto=compress,format

If the hacker is trying to create a stepping stone attack, they often use the workflow shown in Figure 1:

  • First, they find some vulnerability in the application, which again requires reverse engineering;
  • Then, they craft an exploit that takes advantage of that vulnerability;
  • Finally, they attack by launching the exploit to the application.

In a remote attack like the popular SQL injection attack, this may involve sending the message to the application over the internet. But if they have physical access to the device, which with mobile and IoT based systems can be as easy as a trip to the store, then they can directly tamper with the device.

head bg

More To Explore

Newsletter

TSMC semiconductor fabrication plant showcasing advanced chip manufacturing technology.

TSM Stock and the AI Bubble: 40%+ AI Accelerator Growth Fuels the Valuation Debate

Taiwan Semiconductor (NYSE: TSM) recently announced fiscal Q3 earnings, stating its longer-term AI revenue outlook is stronger than anticipated. The company reported record Q3 revenue of $33.1 billion

October 23, 2025
A stack of Micron HBM chips with colorful data streams rising upward, representing high bandwidth and AI acceleration. 

Micron Stock Up 120% YTD: What the HBM Memory Leader Plans for 2026

Micron’s stock is up 120% YTD – or 3X more YTD than AI heavyweight Nvidia. Recently, the high-bandwidth memory content that Micron supplies has increased 3.5X between GPU generations, leading to a qui

October 16, 2025
AI neural networks connecting government, healthcare, and enterprise sectors, symbolizing Palantir’s expanding data platform.

Palantir Stock Forecast 2025: Can PLTR Justify Its High Valuation?

Palantir leads the AI software pack in terms of strong earnings reports this past quarter as the company achieved significant milestones, the most impressive being US commercial revenue grew 93% YoY a

October 09, 2025
CoreWeave technology with rising stock performance

CoreWeave Stock Soars 200% Since IPO — Can It Defy the Odds?

CoreWeave saw muted price action following the latest earnings report; yet the soft price action is rare for the AI darling. The company went public in March and has stood out as the premier IPO among

October 02, 2025
Meta logo on center smartphone with other Mag 7 tech company logos on surrounding phones.

Meta Stock Emerges as a Strong Mag 7 AI Leader

The AI frenzy has investors fixated on revenue growth as proof of returns on AI spending that can be as high as $100 billion per year, depending on the company. Yet, Meta is proving that a stronger si

September 25, 2025
Nvidia logo illuminated inside a modern data center, representing AI growth and Nvidia stock outlook

Updated Nvidia Stock Price Target - AI “Bubble” Narrative Ignores Re-Acceleration in Big Tech Capex 

In the analysis below, my firm crunched the hard data on Q2 capex numbers and what is coming down the pipe for Q3. If you are an AI investor like we are, this is an analysis you will not want to miss

September 18, 2025
Oracle logo glowing above a digital platform with circuit patterns, symbolizing technology and AI growth.

Oracle Soars After Earnings – Is ORCL Stock Still a Buy?

The market is clearly excited about this report, and for good reason. Remaining performance obligations (RPO) grew 359% YoY with cloud RPO growing “nearly 500%” on top of 83% growth last year. Another

September 11, 2025
a futuristic crystal ball displaying Nvidia with digital circuit patterns and stock market graphics.

Nvidia Stock Forecast: The Path to $6 Trillion

Two years ago, the April 2023 quarter delivered a historic 18% beat, followed by an even bigger 30% beat in July 2023. Compare that to the most recent quarter ending July 2025 — just a 4% beat, the sm

September 05, 2025
A close-up, low-angle shot of a physical Bitcoin coin surrounded by a glowing, intricate circuit board.

Bitcoin Bull Market Guide: When to Hold, Trim, or Re-Enter (Webinar) 

Our track record including a more recent 600% move in Bitcoin is not the product of hype but of a systematic framework—one built on technical analysis, on-chain metrics, and a close watch on global li

August 28, 2025
A smartphone with the Reddit app open, from which a rising stock chart graph is emerging.

Reddit Stock Blows the Doors Off - Can it Last?

Reddit’s stock has surged 62% in one month, easily placing the company’s earnings report as one of the best to come out of the tech sector this quarter. The world’s leading forum site has only 416 mil

August 20, 2025
newsletter

Sign up for Analysis on
the Best Tech Stocks


Copyright © 2010 - 2025