Ghosttouch Opens Doors to Your Privacy with Ghostly Touch

Scientists from the University of Zhezziang in China and Darmstadt Technical University in Germany have recently discovered a scheme that could allow an attacker to imitate commands for sensory displays using electromagnetic signals. The scheme, called Ghosttouch, allows an attacker to unlock a victim’s smartphone and gain access to confidential information such as passwords and banking applications, and even install malware.

It should be noted, however, that Ghosttouch has certain restrictions. The attacker’s equipment for the implementation of the attack should be at a distance of up to 40mm from the victim’s smartphone. However, a potential attacker can bypass this restriction by placing the device on the back of a table, in a library, cafe, or conference room, where people usually lay out their smartphones.

It is currently confirmed that nine models of smartphones, including the iPhone SE (2020), Samsung Galaxy S20 Fe 5G, Redmi 8, and Nokia 7.2, are vulnerable to Ghosttouch. Though it’s important to note that such an attack does not go unnoticed, as the victim will see their smartphone unlock on its own. Therefore, the best way to protect against such an attack is to use a PIN code, graphic key, or biometric data.

The discovery of Ghosttouch highlights the importance of being mindful of one’s smartphone usage and utilizing security measures to protect personal and confidential information. As technology continues to advance, it’s necessary to stay informed and vigilant against potential threats.

/Reports, release notes, official announcements.