Our smartphones contain several important information from banking details to personal details, photos, etc. In this way, mobile phones have become a constant target for cybercriminals who try to steal consumer information in various ways. While we’re already familiar with Android malware, have you ever heard of “hardware trojans”?
These are trojans introduced to smartphones by developing trojan software or by sending text messages with links. How to find out if there is a hardware Trojan on your device.
How do I find a hardware Trojan?
Hardware Trojans are very difficult to detect because their work is so hidden. However, a team of researchers from the University of Missouri created a test called PDNPulse to find out if a device contains a “hardware trojan”. This test is based on a printed circuit board power consumption measurement
In testing, the researchers found that the power consumption of devices with a “hard trojan” was higher than the same device without a “hardware trojan”. This method can also be used to detect “Trojan horses” in the software layer.
The power consumption of the device increases due to the presence of third-party software in the system, and therefore leads to shorter standby times. But the accuracy of this method has not been confirmed.
How to prevent this Trojan horse?
Very nice! With a few simple tips, you can prevent your device from being exposed to this hardware Trojan. The first thing to do is not to share your power bank with other people.
However, if you need to do this for an urgent reason, make sure you use a regular commercial bank to supply the big brands. Do not use a power bank of unknown origin and brand.
Second, when using shared power banks and other third-party devices, pay attention to your device’s commands and permissions. If you see a prompt like “Trust this device” on your phone, be aware that third-party devices may be able to access your phone if you select “Yes”.
Third, as an Android phone user, you should never try to open “Developer Mode” as it may make your device more vulnerable to attacks.