Mobile Hacking Incident

Spread the love

Our mobile is our most valuable possession, probably more valuable than our purse! If there was such a situation, the girl should have dialled the number herself and preferably put it in speaker mode.


A young lady, fresher from a famous Management Institute, visited my office recently in connection with a business opportunity for her company. Like good Business Development Executives, she had already done the homework of knowing about me from LinkedIn and other social media pages. She was aware about my blogs and on a personal note she wanted an advice on the ordeals that she was subjected to recently.


The Mobile Hacking Incident that she explained is very alarming but common. All of us can face situation such as stalking, banking fraud, cheating etc. if we are casual towards handing of our mobile devices.


The incident

The girl was travelling to her home for a Holi break by Shatabdi Express. The person sitting next to her was a young gentleman of about 30years of age, traveling to the same destination. The girl was busy listening to music using earphone and spent most of her time either napping or reading novel. During the travel the boy initiated talk many times, but with brief responses, the girl avoided. Most of the time the boy was busy on his laptop.


As they were about to reach their destination, the boy became little uneasy with his phone. He looked worried and turned towards the girl. Appearing to be in hurry, the boy said that he didn’t realise that his mobile got discharged and will take some time to charge. He had to talk to his father about his arrival and requested for her mobile to make a call to his father who was supposed to receive him at the station. The girl obliged.


The girl then got busy packing her bag. The boy seemed to be dialling some number and after trying a couple of times he finally spoke to someone. With thanks and sense of gratitude, the boy returned the mobile to her. They reached their destination.


The Ordeal after the Mobile Hacking Incident

Later in the day the girl finds a WhatsApp message from the boy with a wish to meet. The girl, unhappy with the surprise message, blocked the WhatsApp number. After few hours she gets an SMS with a request to unblock WhatApp and a proposal to meet. The girl ignored. She then gets a WhatApp message from another number with a couple of her photographs stored in her mobile. The boy appreciated her look and dress. The girl was frightened. This time she ignored. There were some incoming calls also, which the girl didn’t take.


Next day, the girl went to the local market with her mother. She was astonished to see the boy entering the store and waving at her. Quite upset, the girl asked her mother to return home immediately. She hurriedly removed the SIM from her mobile and started using her mother’s mobile.


The next day was even more frightening. She got a message on Facebook. Wondering how the boy could get her Facebook profile, she just ignored the message again.


Just a day before she met me, she was again terrified to find the boy near her office approaching her. She hurriedly went inside her office premises and shared the ordeal with her friend. When she checked her private email account later in the day, she had a mail from this boy. He was just pleading for a meeting as he ‘had developed too much liking for her’.


On advice of the friend, she decided to lodge a police complaint against the unknown person. She was not very sure about the effectiveness of this step and associated inconveniences that she could face.


The next day when she visited me, she was still carrying the same mobile but with SIM borrowed from her friend and was still getting the WhatsApp messages. Of course, she was not responding.


What Really Happened in the Mobile Hacking Incident?

It appears that while the boy was pretending to be dialling a number, he actually used the mobile Internet to connect to his laptop/server to pull a Trojan into the mobile.


With a Trojan successfully installed into the mobile, the boy was able to capture all text messages, call details, Facebook profile, email addresses, media files including photographs and video stored in the mobile. He also has access to her locations as she had kept the GPS and location enabled in her mobile.


In a nutshell, the boy knew almost everything about her, including her family, friends, hobby, movements etc.


So many stalking incidents in recent days correlate with this incident as to how the stalker knows where the victim is!


Protection from Mobile Hacking Incidents

Most of us possess a mobile and are always connected to the Internet. We ignore the fact that the mobile has become our identity. It has our precious private data such as calls made, messages sent, photographs clicked and saved. With control on this device everything including our movements can be tracked.


The following precautions can save us from such ordeals –

  • Don’t Let your precious mobile go in unknown hands – This is the first lesson from the above incident. Our mobile is our most valuable possession, probably more valuable than our purse! If there was such a situation, the girl should have dialled the number herself and preferably put it in speaker mode. After all he wanted to speak to his father. In any case a one-time NO is less difficult than later sufferings.
  • Enable Screen Lock – Don’t use a PIN code for locking the screen. That’s the easiest one to breach, someone just has to be peeking while you unlock your phone. Using a complicated pattern is a better choice. While choosing this option, deactivate the option that makes it visible when you enter it. However, this protection has no effect if the SIM is removed and used in other phone. For this additional protection, you should consider setting PIN to SIM also.
  • Turn off automatic Bluetooth connectivity – Bluetooth on your mobile phone may be useful in the car or at home, where it’s safe to communicate with your other electronic devices. But if you are in a public place and the Bluetooth connectivity is left open, anyone sitting within the range of Bluetooth can pick up that signal and gain access to your phone.
  • Mind your App -Free Apps are popular amongst youngsters. Please understand that the developers have spent time and money to develop them. They don’t offer it free to you. Instead they force you to allow them to access your data while you install it. They actually sell it to data brokers or hackers.
  • Avoid Using Public Wi-Fi – Though Public Wi-Fi is free and saves you from exceeding your data limits, it is highly insecure. A good way to secure your information on public Wi-Fi is to use a virtual private network, or VPN that encrypt the data that enters and leaves your Wi-Fi connected device, encoding your sensitive information.
  • Deactivate Your Internet Exposure – If you get trapped, two quick actions that you must take – Lodge a complaint with Cyber Crime Dept. of police and deactivate all your Internet exposure for at least 3 months. This includes stoppage of use of the SIM and the mobile device. Use another device with different SIM. n

Related posts

Leave a Comment