What is screen hacking, and can you protect yourself? | NordVPN (2024)

Contents

  • What is screen hacking?
  • What is a ghost touch?
  • How does screen hacking work?
  • How to know if your screen has been hacked
  • How to protect yourself against screen hacking

What is screen hacking?

In a screen hacking attack, hackers use electromagnetic interference (EMI) to inject false touch points into a touchscreen remotely, without anyone needing to touch it.

It’s a new attack type, which researchers have called the first active contactless attack against capacitive touchscreens.

What is a ghost touch?

A ghost touch refers to your device registering swipes and taps without you actually touching your screen. A common misconception is that this is something an attacker does. Not true. More often than not, ghost touches are a result of a device’s software issues or hardware, such as a cracked screen.

How does screen hacking work?

In simple terms, attackers use electromagnetic interference (EMI) to make your smartphone perform various actions without anyone needing to touch it.

The most common places for touchscreen hacking are public places like libraries, cafes, or conference lobbies, where people place their smartphones face-down on the table. The attackers prepare special equipment under the table to launch a remote attack.

According to academics from Zhejiang University and the Technical University of Darmstadt, the attack uses “electromagnetic interference (EMI) to inject fake touch points into a touchscreen without the need to physically touch it.”

The attack works from a distance of up to 40 mm and takes advantage of capacitive touchscreen sensitivity to EMI. Attackers can inject electromagnetic signals into the electrodes that are built into the touchscreen to register them as touch events.

These events can be a tap, a swipe, or a more sophisticated press and hold. Here are some of the actions attackers may be able to perform once they’ve hacked into your touchscreen device:

  • Take control of your keyboard.
  • Start typing into your browser.
  • Open malicious programs or websites.
  • Change privacy settings.
  • Connect to malicious Wi-Fi.
  • Install viruses or tracking programs.
  • Watch videos with malicious pop-up ads.
  • Access your data or details.
  • Visit a page or site containing a virus.
  • Access social media websites (e.g., Facebook).
  • Click on spam links.
  • Answer or make calls.

The attack works on nine smartphone models, including Android and Apple devices.

How to know if your screen has been hacked

If your screen has been hacked, it will start operating by itself. If you suspect your phone has been hacked, it’s important to react immediately to prevent further damage. Here’s how you can tell if someone has gained control of your screen remotely:

  • Your phone is answering calls on your behalf. If your phone is ringing and suddenly answers the call without you doing anything, this could mean someone else is controlling your touchscreen.
  • Your phone unlocks itself. Touchscreen hackers can induce behaviors such as swiping and tapping. If your phone unlocks itself, it may indicate someone is controlling it remotely.
  • Your phone starts to operate by itself. Touchscreen hackers can manipulate your touchscreen remotely. If you see your phone opening a URL, opening files, visiting sites, or typing in the search field without your input, someone has likely hacked into your touchscreen.
  • You’ve noticed some unusual Bluetooth or Wi-Fi connections. Attackers may try to establish a malicious connection to perform man-in-the-middle attacks or manipulate the phone with a Bluetooth mouse.

How to protect yourself against screen hacking

You can protect yourself against touchscreen attacks in several ways, from adding more security to your phone to being more vigilant in public places. Here are some tips on how to avoid a touchscreen attack:

Strong locks

In addition to secure passwords, enable advanced measures like facial recognition, fingerprints, or a PIN for high-risk actions (like money transfers). Doing so will ensure that you can prevent significant financial losses even if you fall victim to touchscreen hacking.

Use 2FA

Two-factor authentication (2FA) provides a secondary layer of security. Even if someone could get into your device, 2FA would limit the potential damage because the attacker would have a hard time getting into your accounts.

Public places

Be mindful of your smartphone when enjoying a cup of coffee or attending a business conference. It’s not unusual to leave your phones lying face-down on the table, but it gives hackers the perfect opportunity to use their EMI hacking system to attack. Instead of putting your phone on the table, you’d better keep it out of sight.

Keep software up to date

Updates provide essential security functions that could reduce the likelihood of an attack. They manage vulnerabilities and may even contain an additional feature specifically developed to protect your phone against such attacks. Regularly check if your phone’s operating system has any updates.

Use NordVPN’s Threat Protection Pro

Threat Protection Pro is an advanced security feature that blocks malware, trackers, and ads. Using Threat Protection Pro or Threat Protection on your phone will help prevent hackers from opening harmful links online.

Touchscreen hacking is a relatively new type of targeted attack. It’s important to raise awareness to alert and encourage people to enhance their smartphone security.

While using a VPN won’t always prevent hacking attacks, it will encrypt your connection, enhancing your overall digital security and privacy. NordVPN also offers several advanced security features for staying safe online that can help prevent or reduce the likelihood of many types of cyberattacks.

Online security starts with a click.

Stay safe with the world’s leading VPN

Get NordVPN

Learn more

Conclusion

Screen hacking is a dangerous attack that can give hackers almost complete control of your device. But it requires specific circ*mstances like sitting down at a table where hackers have installed an EMI device and placing your smartphone 4 cm (1.5 in.) from it. But it’s a poignant reminder that cybersecurity is always changing, with new attacks, such as screen hacking, continuously emerging. That’s why using various security measures, using a VPN on public networks, and staying aware of your surroundings is always important.

What is screen hacking, and can you protect yourself? | NordVPN (2024)

FAQs

Can you protect yourself from being hacked how? ›

Use a password safe

You can do away with the easy-to-guess and/or weak passwords you once used, for fear of forgetting and locking yourself out of your account. In return, you can set up a complicated password to make things hard for hackers and store the same in a password safe for encryption and further safety.

Can a hacker see me through my phone screen? ›

Mobile spyware is malware that allows hackers to steal information and watch anything within view of your phone camera. It can also enable them to access your microphone, location, calendar, and contacts. This makes it possible for hackers to record your videos and calls.

How do hackers protect themselves? ›

Two-factor authentication is often used to keep hackers from accessing your personal information. But for hackers, using their real contact information is too risky. Hackers use burner phones, multiple dummy email addresses, and truly encrypted messaging services like Signal to maintain privacy.

What is hacking and protection against it? ›

A commonly used hacking definition is the act of compromising digital devices and networks through unauthorized access to an account or computer system. Hacking is not always a malicious act, but it is most commonly associated with illegal activity and data theft by cyber criminals.

How can I know if I am hacked? ›

A hacked phone will show signs of malicious activity. Your contacts may get messages that you didn't send, unexpected apps may pop up on your device, you could spot new logins to your accounts, or even experience a significant decrease in your phone's speed.

What is the first thing you do when you get hacked? ›

Immediately change all your passwords on any accounts you think might have been affected. If you use the same password across several accounts, make sure they're unique from now on. Regularly changing your passwords is also a good habit to get into.

What is the code to check if your phone is being monitored? ›

##4636## or ##197328640## ➡️ To Check Unknown Connections (Android) If you're concerned someone has installed malware or spyware on your Android phone, these codes open up a screen that lists all running processes and services.

Can you tell if your phone is being monitored? ›

Strange noises or interference during phone calls, as well as a battery that is depleting more quickly than usual, are some of the signs that show that your phone might be monitored.

How to tell if someone is watching your screen? ›

How To Detect Remote Computer Access (5 Steps)
  1. Look for blatant signs of active intrusion.
  2. Inspect all recent activity on your device.
  3. Check for remote access programs.
  4. Review your firewall settings.
  5. Run an antivirus scan.

What do hackers target most? ›

What do hackers tend to look for?
  • Social Security numbers.
  • Date of birth.
  • Email addresses.
  • Financial information.
  • Phone numbers.
  • Passwords.
  • Credit card info.
  • Crypto wallets.

What is the best protection against hackers? ›

17 Ways To Prevent Hacking and Protect Yourself From Hackers
  • Use strong and unique passwords.
  • Store your passwords in a password manager.
  • Enable two-factor authentication (2FA)
  • Use an authenticator app for 2FA.
  • Make sure you have a secure backup email and phone number.
  • Learn to spot the warning signs of a phishing scam.
Nov 27, 2023

What are 5 ways you can avoid being hacked? ›

5 Ways to Avoid the Risk of Being Hacked
  • Use strong passwords. You're at a greater risk of being hacked if you use basic passwords for your important accounts. ...
  • Enable two-factor authentication. ...
  • Avoid linking accounts. ...
  • Train your team. ...
  • Never leave your laptop or mobile phone unattended. ...
  • Conclusion.

What devices are most vulnerable to hacking? ›

Most hackers attack IoT products to access more valuable devices and implant malware or ransomware. A few of the most vulnerable devices include: Cameras: Internet Protocol (IP) cameras, baby monitors, and security systems are constantly exposed to the internet, increasing their security risks.

How risky is hacking? ›

A successful hack can compromise usernames, passwords, financial information, private communications, photos, location data, and more. Hackers can impersonate you and commit identity fraud. They may access and delete your files, or encrypt your data and hold it for ransom.

How do hackers get passwords? ›

Hackers get hold of username-password pairs from previous data breaches and test them on various platforms. Unfortunately, many people use the same passwords across many accounts. Hackers can access multiple accounts using the same stolen credentials if one account is compromised.

What are the 4 steps we all must take to avoid getting hacked? ›

Protecting Online Accounts
  • Delete suspicious emails. It is best to delete spam or dubious-looking emails without opening them. ...
  • Use secure devices. ...
  • Create strong passwords. ...
  • Use multifactor authentication on your accounts. ...
  • Sign up for account alerts.

How do hackers get access to your account? ›

One of the most common attacks, phishing, occurs when a hacker pretends to be a legitimate entity, such as your bank and requests sensitive information, such as your password. They may even use a spoofed site, which is a fake login page that looks like the real one, to collect your credentials.

Top Articles
Latest Posts
Article information

Author: Greg Kuvalis

Last Updated:

Views: 6237

Rating: 4.4 / 5 (55 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Greg Kuvalis

Birthday: 1996-12-20

Address: 53157 Trantow Inlet, Townemouth, FL 92564-0267

Phone: +68218650356656

Job: IT Representative

Hobby: Knitting, Amateur radio, Skiing, Running, Mountain biking, Slacklining, Electronics

Introduction: My name is Greg Kuvalis, I am a witty, spotless, beautiful, charming, delightful, thankful, beautiful person who loves writing and wants to share my knowledge and understanding with you.