Blogs -5 Ways Hackers Attack Mobile Devices and Applications

5 Ways Hackers Attack Mobile Devices and Applications

June 12, 2018


Beth Kindig

Lead Tech Analyst

Hackers go about achieving their goals with reverse engineering software to find vulnerabilities they can exploit, data they can extract, or ways to modify the software to do something it was never intended to do. The primary consequences of applications getting hacked include financial loss, destroyed brand reputation, exposure to liability, and regulatory risk.

Over 7 billion identities have been stolen in data breaches over the last eight years equal to one data breach for every person on the planet. 

Why do Hackers Attack Mobile Devices and Applications?

In order to understand threats, we must understand what hackers are trying to achieve. Hackers will mount different kinds of attacks to achieve different kinds of goals. And so, defending against hackers in the context of application security may involve defending against many different kinds of attacks on your mobile device.

Hackers might be interested in bypassing business logic. For example, they might want to bypass controls that let them cheat at a video game or violate the terms of a software license. Of more serious concern is the potential for hackers to bypass controls in safety critical systems. It is not inconceivable that lives could be at risk if a hacker were able to hack a medical device, connected car or some component of critical infrastructure, such as a wind farm, a coal or nuclear power plant, a power grid, or a water treatment facility.

According to a recent study, automobiles today run systems that have more than 100 million lines of code. Those applications often contain valuable intellectual property, which hackers would rather steal than develop. For example, they might be a competitor or a nation state with inferior technology attempting to improve their own products in order to compete more effectively.

Hackers might also be interested in obtaining valuable pieces of data that are managed within the application, such as music or video, financial data, or privacy sensitive health data.

While data can be protected with cryptography, this only shifts the problem from protecting the data directly to protecting the cryptographic keys. Cryptographic keys are not only used to protect data. They can also be used to create a secure identity for a device.

A device may need such a key to authenticate to a cloud service. If a hacker were able to obtain this secret, they might be able to masquerade as that device or as the owner of the device. Cryptographic keys are also used to establish secure communications. For example, HTTPS is a familiar protocol that uses SSL/TLS to secure communication to websites. If a hacker were able to obtain these keys, they could snoop on or alter supposedly secure communications.

For all of these reasons, hackers are highly motivated to steal cryptographic keys embedded in or controlled by an application.

Sometimes hackers aren’t interested in the application itself, but using the application as a digital stepping stone to try to achieve some other goal. Hackers are often interested in obtaining root access on the device the application is running on, so they can install malware or use the device as a launch pad to attack something else.

Consider the 2016 Mirai botnet that infected web enabled cameras and installed a piece of malware that launched the largest distributed denial of service attack in history against the dynamic domain name service Dyn, causing wide spread internet outages. Those 100,000 cameras were able to launch 1.2 terabytes per second of data at a major piece of the global internet infrastructure. Here the goal of the attacker was not to compromise the webcam directly, but rather to bring down the web services of many companies whose DNS was controlled by Dyn.,format

Hacking Mobile Devices: Reverse Engineering and Tampering

Hackers employ two fundamental techniques when attacking: reverse engineering and tampering. If the hacker is trying to bypass business logic, they have to find where in the application the business logic resides. That requires reverse engineering. Then they typically must tamper with the application to bypass that logic.

If the hacker is trying to steal intellectual property, sensitive data or cryptographic keys from an application, they have to know where to look in the application. Unless those secrets are obvious, hackers need to reverse engineer the application to find them.,format

If the hacker is trying to create a stepping stone attack, they often use the workflow shown in Figure 1:

  • First, they find some vulnerability in the application, which again requires reverse engineering;
  • Then, they craft an exploit that takes advantage of that vulnerability;
  • Finally, they attack by launching the exploit to the application.

In a remote attack like the popular SQL injection attack, this may involve sending the message to the application over the internet. But if they have physical access to the device, which with mobile and IoT based systems can be as easy as a trip to the store, then they can directly tamper with the device.

Gains of up to 403% from our Free Newsletter.

Here are sample stock gains from the I/O Fund’s newsletter --- produced weekly and all for free!

+344% on Nvidia

+403% on Bitcoin

+218% on Roku

*as of March 15, 2022

Our newsletter provides an edge in the world’s most valuable industry – technology. Due to the enormous gains from this particular industry, we think it’s essential that every stock investor have a credible source who specializes in tech. Subscribe for Free Weekly Analysis on the Best Tech Stocks.

If you are a more serious investor, we have a premium service that offers lower entries and real-time trade alerts. Sample returns on the premium site include 324% on Zoom, 601% on Nvidia, 445% on Bitcoin, and 4-digits on an alt-coin. The I/O Fund is audited annually to prove it’s one of the best performing Funds on the market with returns that beat Wall Street funds. 


More To Explore


Where the Market is Headed Next

Where the Market is Headed Next

When the market was selling tech last year, the I/O Fund was buying AI leaders. For example, from September 2021 through January of 2023, we initiated 9 buy alerts for NVDA below $210. The last two al

June 08, 2023,format

Apple Bets On The Emerging Markets Growth Story

The smartphone market continues to be hit hard in q1, with prices down 20% and shipments down 13%, according to Canalys. Despite double digit decline across the industry, Apple delivered marginal grow

June 05, 2023
Nvidia Will "Still" Surpass Apple's Valuation

Nvidia Will “Still” Surpass Apple’s Valuation

My coverage on Nvidia as an AI leader began in 2018 (yes, really – five years ago). Since then, I’ve covered the AI microtrend for this specific stock 27 times on my research site, which is the equiva

May 29, 2023
FAAMG Stocks Trading At Precarious Valuations

FAAMG Stocks Trading At Precarious Valuations

The mega-cap stocks that are known as FAAMG reported earnings recently. These names are driving the market higher, especially Microsoft and Apple. In fact, the percentage of Microsoft and Apple’s comb

May 15, 2023
Apple PC Screen

Apple’s Stock In Focus: More Profitable Than Banks

Investors looking for the “next big thing” will point toward companies like Stripe, Sofi or Square as the leading fintech stocks. Meanwhile, the next big thing to disrupt the financial sector may be s

May 04, 2023
Netflix Remote Control

This Stock Price For Netflix Is A “Buy” For 2023

In April of 2022, Netflix surprised the markets by reporting its first subscriber loss in nearly 10 years. The stock tumbled 35% the following day, as investors panicked. Famed hedge fund manager, Bil

May 03, 2023
Where the I/O Fund Holds Cash When Banks Keeps Failing

Where the I/O Fund Holds Cash When Banks Keeps Failing

Amidst the growing skepticism in our banking sector, we thought it would be helpful to introduce an alternative way to both protect and diversify one’s assets. The information below discusses a method

April 20, 2023
Tesla Building

Tesla Stock: What You Need To Know About Q1 Earnings

Two months ago, we wrote that after realizing gains of 31%, it was time to take a time out on Tesla at the $208.31 price when our firm stated: “Right now, our technical analysis is at odds with our fu

April 16, 2023
Bitcoin Vs Banks: Here's Where the Price Goes Next

Bitcoin Vs Banks: Here's Where the Price Goes Next

The recent decoupling of Bitcoin from equities, we believe, is the start of a new uptrend that appears to be inversely correlated to the financial sector. The financial media would have us believe tha

April 05, 2023
Official Press Release: I/O Fund's Cumulative Returns Double the Nasdaq Following a Tough 2022

Official Press Release: I/O Fund’s Cumulative Returns Double the Nasdaq Following a Tough 2022

Actively managed portfolio and research site announces its largest cumulative lead over institutional all-tech portfolios. The I/O Fund defies a challenging market, outperforming peers and providing i

March 30, 2023

Sign up for Analysis on
the Best Tech Stocks
The I/O Fund specializes in tech growth stocks and offers in-depth research for Premium Members. Investors get access to a transparent portfolio of 30 positions, a private forum, webinars, and real-time trade notifications. Sign up for Premium.

We are on social networks

Copyright © 2010 - 2023
Get Free Weekly Analysis on the Best Tech Stocks