Here's a curious situation: you think you're replacing a display with a new one on your smartphone, and meanwhile you give the hacker and thief a gateway to your world. New research sheds light on this ingenious process.
Smartphones can often crashes in such a way that a spider appears on the device screen. It is possible that the smartphone is experiencing unfortunate contact with some element that we interfere with. Similar situations can be a lot, and everything depends on various factors. If the problem is not serious, many users will often coexist with this spider on the smartphone screen. Worse, if the display is damaged and the phone needs a good repair. Usually, replacing this unit with a new and original one costs quite a bit, and many times for the price you would buy a new smartphone from previous generations. That's why it's often a replacement for a non-original display , but at a much lower price. Replacing the display at an unauthorized point may end up getting us even worse. Why? According to Israeli researchers from Ben-Gurion University of the Negev, this is how we can give the gateway to thieves and other unwanted persons to transfer data from the device to the software drivers in the operating system. All you need to do is add the chip. This, in turn, will allow you to install malicious applications on your smartphone , change your typed URLs, create redirects, or collect keylogger data. As if this was not enough, a properly prepared solution could even take control of the camera and take pictures of the user and then email them. Moreover, this situation can happen when the user thinks that the smartphone is off. The problem can be serious because crafting the right components costs less than $ 10. The dangerous elements responsible for taking control of your smartphone can also be difficult to detect because they look identical to the original components. Below is a demonstration of the possibility of this "Trojan horse" on the Huawei Nexus 6P smartphone or LG G Pad 7.0. However, researchers are warning that similar actions can be carried out on iOS devices. Https://www.youtube.com/watch?list=PLDSVgkKZ-SgLaBDdQzR_xXOJlgLj4xusq&v=83VMVrcEOCM Source: Yossi Oren , Ben-Gurion University of the Negev