8 Signs Your Mobile Device May Be Compromised Without Your Knowledge

Are You Holding Hands With A Zombie?

Mobile Apps, Uncategorized Comments (0)

If you’ve ever experienced a distributed denial of service (DDoS) attack, click fraud, phishing, malware installation, or spam emails, it is likely these unwanted intrusions came from a computer known as a “zombie machine.”

Not sure if these apply to you? Download our new ebook on the 15 most dangerous threats to mobile security.

Zombie machines are ordinary networked computers that have been infected with malicious software that causes them to spew material to any computer online that’s not well-protected by the latest trusted security software. A collection of zombie machines, controlled at one source, is known as a “botnet.” Usually, owners of “zombie” computers don’t even know that their computer has been infected. Botnets provide a cover for those online who are genuinely out to harm you.

Many people don’t think of their phones as computers, so they don’t worry too much about whether their device is infected. But an “iPhone 6 has 58 times the speed and 64 times the storage of the 1989 CRAY-2 supercomputer,” so it is time to stop thinking of your mobile phone as anything less than a powerful computer.

According to Check Point’s ZoneAlarm blog, signs that any computer, including mobile phones and tablets, are being used as a zombie machine include:

  1. Slow performance
  2. Unexplained error messages
  3. Frequent crashes
  4. Unrecognized words
  5. Long-time to start-up or shut down
  6. The unexpected loss of storage space
  7. Web browser closes unexpectedly
  8. Access to security websites is blocked

In researching this blog post, I went looking for articles and apps on the detection of mobile zombie machines and came up with little. There are two apps in Google Play that may be useful. The first is Virus Tracker, which checks its database of over 2 billion records to see whether your IP address is listed in known botnets. The second is Device Monitor, which “warns about connections to end-points that are reported within malware/central-clearing-house databases.” ComputerWeekly.com lists four behavior patterns – signature-based, anomaly-based DNS-based, and mining-based–that may be used for botnet detection on any computing devices. The post suggests some additional detection software that may be useful.

If you think that your computer/mobile device has been compromised and is now a zombie machine, immediately scan it with several anti-virus and anti-malware programs. A second program may pick up a virus or malware that the first one missed. Then, run a rootkit detection program and set your firewall to the highest security level. If that doesn’t work, you may have to wipe your hard drive and start with fresh copies of your operating system and apps.

Maintaining security is an ongoing task that includes being vigilant, not opening attachments/links you don’t know or trust. Also, we recommend using the most up-to-date security software. The computing industry needs to design and develop better methods for botnet detection and removal of zombie software.

At Float, we are here to help. Request a demo of our new Security Assistant app, and contact us if you need further help in mobile security.

Follow Float
The following two tabs change content below.
Gary Woodill is a senior analyst with Float, as well as CEO of i5 Research. Gary conducts research and market analyses, as well as assessments and forecasting for emerging technologies. Gary is the co-editor of "Mastering Mobile Learning," author of “The Mobile Learning Edge,” and the co-author of “Training and Collaboration with Virtual Worlds.” He also presents at conferences and is the author of numerous articles and research reports on emerging learning technologies. Gary holds a doctor of education degree from the University of Toronto.

» Mobile Apps, Uncategorized » 8 Signs Your Mobile Device...
On September 14, 2016
By
, , , , , ,

Leave a Reply

Your email address will not be published. Required fields are marked *

« »