3 security risks from Android motion sensors and how to stay safe

A surprising discovery of the security flaw is the smartphone motion sensor embedded in their hardware.

Even if you are very careful about security when using phones and other devices, there are risks that you do not realize. Security researchers regularly find new threats that allow malicious agents to access a user's personal data.

An unexpected discovery of security holes from motion sensors in smartphones embedded in their hardware. These sensors are designed to detect when the phone is moving and in use. But they can be misused.

The app collects sounds from your motion sensor

3 security risks from Android motion sensors and how to stay safe
Application that collects sounds from your motion sensor

Security researchers have recently demonstrated a scary flaw in Android phones. This attack, called Spearphone, could collect data from speakers. Therefore, it has the ability to eavesdrop on conversations when the phone is placed nearby. It uses the accelerometer motion sensor, to measure acceleration, tilt or rotation of the device. Location apps like Google Maps use the accelerometer to determine your location.

Spearphone works by turning this component into a microphone. The accelerometer is placed on the same plane as the phone speaker, allowing it to capture echoes generated by the speech. When someone uses their phone in speaker activation mode or interacts with a smartphone assistant like Google Assistant , the accelerometer can record the echo of the voice. The attacker can then forward the logs to their server.

Through arXiv, researchers discovered the flaw that demonstrated how it works by creating a malicious Android application. They then tested the app on devices including LG G3, Samsung Galaxy S6 and Samsung Galaxy Note 4. It can record speech using the accelerometer, send audio recordings to. servers that researchers control. Then automatically analyze the record by machine learning software.

Using the data collected in this way, the researchers were able to determine the speaker's gender in 90% of cases and accurately identify the speaker 80% of the time.

The app uses motion sensor data to avoid being detected

According to a report by Trend Micro, a group of different security researchers have discovered two Android apps that do this. These are Currency Converter and BatterySaverMobi , which appear as useful tools to convert currencies and track your phone's battery. But in reality, they contain a banking malware called Anubis , which steals credit card data and online banking credentials.

These applications took advantage of motion sensors to evade detection. When security researchers search for malware, they often run tests on a virtual operating system stored on a computer. This means that the motion sensors do not sense any movement during the test, but when users install an application on their mobile phone, they usually hold their phone with them. Obviously, this creates a lot of movement that the sensor receives.

Malicious applications check for vibration using motion sensors. If motion is not detected, they understand that the application is being tested and do not deploy any malicious code. Therefore, security researchers will not find anything suspicious. But when a user installs an application and one of the above and starts moving around, it will turn on malware and may start stealing your data.

The app uses motion sensor data to get your fingerprints

3 security risks from Android motion sensors and how to stay safe
The application uses motion sensor data to get your fingerprints

Another security issue you've probably heard of is browser fingerprinting. That's when data from your computer and browser is used to identify and track yourself. For example, it may work by viewing the different browser extensions you have installed and the fonts you use on your computer. This data can be used to build a unique picture of users and follow them on the Internet.

Both iOS and Android devices can face security risks from using motion sensors. Using a technique called SensorID, it can create fingerprints using the gyroscope and magnetometer sensor data from your phone. These sensors are calibrated in a unique way for each user, meaning they can rely on them to identify you. If apps or websites have access to a user's motion sensor, they can track when they use the Internet.

This technique works even when you take security precautions, such as using a VPN or using another browser. More frightening, it still exists after users perform a factory reset on the phone. The reason is that the calibration fingerprint of your motion sensor never changes. According to the researchers, this is a fast attack, taking less than 1 second to create fingerprints.

How to protect yourself from applications that misuse motion sensor data

These attacks are very hard to counter. However, there are some steps you can take to protect yourself from the security risks of abusing motion sensors on your phone.

See the necessary permissions before installing a new application

3 security risks from Android motion sensors and how to stay safe
Always view permissions before installing applications

First, be careful when granting permission to an application. When you install a new app from Google Play , it asks the user for permission to use various functions on the phone. For example the camera application will require access to the mobile camera.

Many users agree to allow permissions without even realizing and this is at a very high risk of security risks. Next time you install a new app or game on your phone, check what permissions it requires. If it requires permission to use your phone's motion sensor, ask yourself what it needs that permission for. If there is no good reason for an application to need access to it, do not install it.

Protect your phone speaker

Secondly, if you are really worried about the motion sensor being abused to eavesdrop on your conversations, users can perform many direct actions such as adding anti-vibration material around the phone speakers to prevents the motion sensor from capturing the echo. Also, avoid leaving the phone on a flat, hard surface like a table when using the speaker. This will prevent the accelerometer from obtaining sound information.

Always update the operating system for the phone

To protect against fingerprint security risks, it is best to ensure the phone operating system is always up to date, as this issue has been resolved in operating systems such as iOS 12.2 . Google has also been aware of the problem and is working hard to update the Android system to protect users.

Always be vigilant and protect your information by using your smartphone intelligently. Hope this article will be helpful to help you use your phone safer and more secure!

Sign up and earn $1000 a day ⋙

Leave a Comment

10 devices that can be plugged into the smartphone charging port

10 devices that can be plugged into the smartphone charging port

Most of us treat our smartphone's charging port as if its sole job is to keep the battery alive. But that little port is much more powerful than it gives it credit for.

Instructions for adjusting Android phone screen brightness

Instructions for adjusting Android phone screen brightness

Changing the brightness of your Android phone screen is a simple way to help you choose the screen brightness that suits your surroundings, avoiding the phone screen being too bright or too dark, affecting your health, especially your eyes.

How to easily read smartphone specifications

How to easily read smartphone specifications

If you're on the hunt for a new smartphone, the first thing you'll naturally look at is the specs sheet. It's packed with clues about performance, battery life, and display quality.

How to insert emoji into photos on iPhone extremely simple

How to insert emoji into photos on iPhone extremely simple

To be able to insert emoji into photos on iPhone, we will need a few small tricks, according to the instructions below.

Which free VPN is best for iPhone and iPad?

Which free VPN is best for iPhone and iPad?

VPNs have a number of advantages, such as protecting your online identity and allowing you to access content in other countries. You may even experience faster connection speeds.

Why are Pixel phones worth the money?

Why are Pixel phones worth the money?

Years ago, some people decided to buy the first Pixel phone without thinking twice about whether it was worth the price. Time has proven that they are definitely worth every penny.

Are you using the full potential of the buttons on your Android phone?

Are you using the full potential of the buttons on your Android phone?

The buttons on your Android phone aren't just for adjusting the volume or waking up the screen. With a few simple tweaks, they can become shortcuts for taking a quick photo, skipping songs, launching apps, or even activating emergency features.

6 Hidden Files That Are Wasting a Lot of Space on Android

6 Hidden Files That Are Wasting a Lot of Space on Android

The biggest space hogs on your Android phone aren't always the things you can see. If your storage is filling up faster than usual, hidden files you never touch could be the culprit.

How to fix Android not connecting to Windows via ADB

How to fix Android not connecting to Windows via ADB

ADB not working or detecting your device on Windows? If Android can't connect via Android Debug Bridge (ADB), fixing this error requires just 3 basic steps.

Instructions for downloading Star Wars emoji for iPhone

Instructions for downloading Star Wars emoji for iPhone

There are many apps that help you add emoji to use on your iPhone, such as the Star Wars app. Users will have a lot of Star Wars-themed emoji to use for messages, or any content you want to use on your iPhone.

What is the orange and green dot in the corner of the iPhone screen?

What is the orange and green dot in the corner of the iPhone screen?

Starting with iOS 14, users will see a green or orange dot appear near the signal bar on the iPhone screen when opening certain applications. This is one of the new user privacy protection features added by Apple.

How to copy photos and videos from the Files app to the Photos library on iPhone, iPad

How to copy photos and videos from the Files app to the Photos library on iPhone, iPad

There is nothing complicated about how to do it.

How to check if Android device is rooted or not?

How to check if Android device is rooted or not?

Root Checker is an application that checks whether Android devices, from smartphones to tablets, have been rooted or not? Or whether the rooting process has been successful and worked effectively?

6 Smart Circle to Search Tricks You Should Remember

6 Smart Circle to Search Tricks You Should Remember

While you may already know and use Circle to Search for many things, let's explore some clever use cases.

How to use DroidCam to turn your phone into a webcam for your computer

How to use DroidCam to turn your phone into a webcam for your computer

The following article will guide you on how to use Droidcam on your computer and phone as well as some suggestions for having a perfect video call!