8 Signs Your Mobile Device May Be Compromised Without Your Knowledge

Are You Holding Hands With A Zombie?

Mobile Apps, Uncategorized Comments (0)

If you’ve ever experienced a distributed denial of service (DDoS) attack, click fraud, phishing, malware installation, or spam emails, it is likely these unwanted intrusions came from a computer on the internet known as a “zombie machine.”

Not sure if these apply to you? Download our new ebook on the 15 most dangerous threats to mobile security.

Zombie machines are ordinary networked computers that have been infected with malicious software that causes them to spew material to any computer online that’s not well-protected by the latest trusted security software. A collection of zombie machines, controlled at one source, is known as a “botnet.” Usually owners of “zombie” computers don’t even know that their computer has been infected. Botnets provide a cover for those online who are truly out to harm you.

Interestingly, many people don’t think of their mobile phones as a computer, and therefore don’t worry too much about whether their device has been turned into a zombie machine. But an “iPhone 6 has 58 times the speed and 64 times the storage of the 1989 CRAY-2 supercomputer,” so it is time to stop thinking of your mobile phone as anything less than a powerful computer.

According to Check Point’s ZoneAlarm blog, signs that any computer, including mobile phones and tablets, are being used as a zombie machine include:

  1. Slow performance
  2. Unexplained error messages
  3. Frequent crashes
  4. Unrecognized messages
  5. Long time to start up or shut down
  6. Unexpected loss of storage space
  7. Web browser closes unexpectedly
  8. Access to security websites is blocked

In doing the research for this blog post, I went looking for articles and apps on the detection of mobile zombie machines, and came up with very little. There are two apps in Google Play that may be useful: Virus Tracker, which checks its database of more than 2 billion records to see whether your IP address is listed in known botnets, and Device Monitor, which “warns about connections to end-points that are reported within malware/central-clearing-house databases.” ComputerWeekly.com lists four behavior patterns – signature-based, anomaly-based, DNS-based and mining-based – that may be used for botnet detection on any computing devices. The post suggests some additional detection software that may be useful.

If you think that your computer/mobile device has been compromised and is now a zombie machine, you should immediately scan it with several different anti-virus and anti-malware programs. A second program may pick up a virus or malware that the first one missed. Then, run a rootkit detection program, and set your firewall to the highest security level. If that doesn’t work, you may have to wipe your hard drive and start with fresh copies of your operating system and apps.

Maintaining security is an ongoing task that includes being vigilant, not opening attachments and links that you don’t know or trust, and using the most-up-to-date security software. As well, the computing industry needs to design and develop better methods for botnet detection and removal of zombie software.

At Float, we are here to help. Request a demo of our new Security Assistant app, and contact us if you need further assistance in the area of mobile security.

Follow Float
The following two tabs change content below.
Gary Woodill is a senior analyst with Float, as well as CEO of i5 Research. Gary conducts research and market analyses, as well as assessments and forecasting for emerging technologies. Gary is the co-editor of "Mastering Mobile Learning," author of “The Mobile Learning Edge,” and the co-author of “Training and Collaboration with Virtual Worlds.” He also presents at conferences and is the author of numerous articles and research reports on emerging learning technologies. Gary holds a doctor of education degree from the University of Toronto.

» Mobile Apps, Uncategorized » 8 Signs Your Mobile Device...
On September 14, 2016
, , , , , ,

Leave a Reply

Your email address will not be published. Required fields are marked *

« »