Help desk! NSA has simple step to beat phone hackers from stealing your info - turn it off and turn it back on

  • The NSA suggests rebooting your phone weekly as a defense against hackers
  • It's not foolproof, but it makes them work harder to gain and maintain access
  • The agency also suggests not taking your phone everywhere, preventing hackers from spying via its camera and microphone
  • Cyberattacks have evolved from phishing with rogue links to zero-click exploits that don't require victims to do anything
  • Zero-click attacks can't survive a reboot, but so few people turn their phones off 

One of the best things you can do to protect your smartphone from hackers is also one of the easiest, according to the National Security Agency: Turn it off and then turn it back on again.     

Regularly rebooting your phone won't completely stop cybercriminals or spy-for-hire firms from accessing your private data, the agency says.

However, it can make them work harder to maintain access and steal data from your phone.

'This is all about imposing cost on these malicious actors,' Neal Ziring, technical director of the NSA's cybersecurity directorate, told the Associated Press.

Last year, the NSA issued a 'best practices' guide for mobile device security and recommended rebooting your phone weekly as a defense against hacking.

In guidelines released in 2020, the National Security Agency advised rebooting your phone at least once a week could help deter hackers

In guidelines released in 2020, the National Security Agency advised rebooting your phone at least once a week could help deter hackers

Maine Sen. Angus King, a member of the Senate Intelligence Committee, said rebooting his phone is now a regular part of his routine.

'I'd say probably once a week, whenever I think of it,' said King, an independent.

 Our phones are almost always in arm's reach, rarely turned off and hold huge stores of personal and sensitive data.

'I always think of phones as like our digital soul,' said Patrick Wardle, a security expert and former NSA researcher. 

The new wave of zero-click spyware doesn't even need  victims to click on links or pick up a call to garner access to texts, photos, contacts, GPS and more

The new wave of zero-click spyware doesn't even need  victims to click on links or pick up a call to garner access to texts, photos, contacts, GPS and more 

They've become top targets for hackers looking to snatching sensitive text messages, contact info and photos, to tracking users' locations and even secretly turning on their video and microphones.

The NSA's guide also has advice if you want to ensure hackers aren't spying on you via on your phone's camera or microphone: Don't take it with you everywhere. 

HOW DOES PEGASUS WORK?

Pegasus is a powerful piece of 'malware' - malicious computer software - developed by private Israeli security firm NSO Group.

This particular form of malware,  known as 'spyware', is designed to gather data without the owner's knowledge and forward it on to a third party.

While most spyware is limited in scope, Pegasus appears much more powerful—allowing its controller near-unlimited access to and control over an infected device, including contact lists, emails, and texts, along with stored photos, videos and audio files.

Pegasus can also be used to take control of the phone's camera or microphone to record video and audio, and can access GPS data to check where the phone's owner has been.

And it can also be used to record any new incoming or outgoing phone calls. 

In 2019, WhatsApp revealed that 1,400 people had been infected by NSO Group software using a so-called 'zero day' fault - a previously unknown error - in the call function of the app.

Users were infected when a call was placed via WhatsApp to their phones, whether they answered it or not.

More recently NSO has begun exploiting vulnerabilities in Apple's iMessage software, giving it backdoor access to hundreds of millions of iPhones. 

Apple says it is continually updating its software to prevent such attacks, though human rights group Amnesty says it has uncovered successful attacks on even the most up-to-date iOS systems.  

Advertisement

A recent investigation into phone hacking by a global media consortium has caused political uproars in France, India, Hungary and elsewhere.

Researchers found scores of journalists, human rights activists and politicians on a leaked list of what were believed to be potential targets of an Israeli hacker-for-hire company, NSO Group.

The advice to periodically reboot a phone reflects, in part, a change in how top hackers are gaining access to mobile devices and the rise of so-called 'zero-click' exploits that work without any user interaction.

'There's been this evolution away from having a target click on a dodgy link,' said Bill Marczak, a senior researcher at Citizen Lab, an internet civil-rights watchdog at the University of Toronto.

Typically, once hackers gain access to a device or network, they look for ways to persist in the system by installing malicious software to a computer's root file system. 

But that's become more difficult as phone manufacturers such as Apple and Google have beefed up security to block malware from core operating systems, Ziring said.

'It's very difficult for an attacker to burrow into that layer in order to gain persistence,' he added.

That encourages hackers to opt for 'in-memory payloads' that are harder to detect and trace back to whoever sent them. 

Such hacks can't survive a reboot, but often don't need to since many people rarely turn their phones off.

'Adversaries came to the realization they don't need to persist,' Wardle said. 'If they could do a one-time pull and exfiltrate all your chat messages and your contact and your passwords, it's almost game over anyways, right?'

A robust market currently exists for hacking tools that can break into phones. Some companies, like Zerodium and Crowdfence, publicly offer millions of dollars for zero-click exploits. 

Even iPhones, touted for their improved security, are not immune: In a damning report, Amnesty International and Paris-based Forbidden Stories claimed they found zero-click attacks running on a journalist's fully updated iPhone 12 using iOS 14.6, Apple's most recent upgrade. 

Additionally, hacker-for-hire companies that sell mobile-device hacking services to governments and law enforcement agencies have proliferated in recent years. 

Experts say Israeli-based NSO Group's zero-click Pegasus spyware, reputedly intended for law-enforcement agencies  and vetted government agencies,' has been used to hack the phones of human rights activists, journalists, Catholic clergy and others

Experts say Israeli-based NSO Group's zero-click Pegasus spyware, reputedly intended for law-enforcement agencies  and vetted government agencies,' has been used to hack the phones of human rights activists, journalists, Catholic clergy and others

The best-known is the Israeli-based NSO Group, whose spyware researchers say has been used around the world to break into the phones of human rights activists, journalists and Catholic clergy. 

NSO Group is the focus of the recent exposés by a media consortium that reported the company's spyware tool Pegasus was used in 37 instances of successful or attempted phone hacks of journalists, business executives, human rights activists and others, according to The Washington Post. 

The company is also being sued in the US by Facebook for allegedly targeting some 1,400 users of its encrypted messaging service WhatsApp with a zero-click exploit.

NSO Group, which said it only sells its spyware to 'vetted government agencies' for use against terrorists and major criminals, did not respond to a request for comment.

The persistence of NSO's spyware used to be a selling point of the company: Several years ago its US-based subsidy pitched law-enforcement agencies a phone-hacking tool that would survive even a factory reset, according to documents obtained by Vice News.

But Marczak, who has tracked NSO Group's activists closely for years, said it looks like the company first starting using zero-click exploits that forgo persistence around 2019.

He said victims in the WhatsApp case would see an incoming call for a few rings before the spyware was installed. 

In 2020, Marczak and Citizen Lab exposed another zero-click hack attributed to NSO Group that targeted several journalists at Al Jazeera using Apple's iMessage texting service.

'There was nothing that any of the targets reported seeing on their screen. So that one was both completely invisible as well as not requiring any user interaction,' Marczak said.

With such a powerful tool at their disposal, Marczak said, rebooting your phone won't do much to stop determined hackers—they could simply send another zero-click.

'It's sort of just a different model, it's persistence through reinfection,' he said.

The comments below have not been moderated.

The views expressed in the contents above are those of our users and do not necessarily reflect the views of MailOnline.

We are no longer accepting comments on this article.