Hackear teléfonos inteligentes de forma remota ahora es posible según un estudio
¿Qué tan terrible sería si alguien a tu alrededor obtiene acceso a tu teléfono inteligente y comienza a usarlo como si fuera suyo? Podrían hacer llamadas, enviar mensajes de texto, navegar por Internet y hacer mucho más sin ni siquiera quitárselo.
Ver también: Cómo localizar la ubicación de alguien usando su número de móvil
Sabemos que puede que no le parezca algo prácticamente posible, pero si los resultados de la reciente estudiar realizados por investigadores franceses, los piratas informáticos pueden utilizar software como Siri o Google Now en su teléfono inteligente para acceder a él.
Nuevo truco que permite controlar los teléfonos inteligentes de otros
De hecho, estos investigadores han descubierto un truco de este tipo, y todo su estudio se basa en cómo funciona. Lo que lograron encontrar es que si hay un pirata informático a su alrededor que desea obtener acceso a su teléfono inteligente, es posible que pueda hacerlo transmitiendo comandos de radio. Para su sorpresa, ni siquiera necesitan pronunciar una palabra para dar instrucciones a software como Siri y Google Now, y aún podrán usarlos.
¿Qué se necesita para que el truco funcione?
Sin embargo, probablemente también valga la pena señalar que El hacker debe estar a menos de 16 pies de donde se encuentra, como si estuviera más lejos, es posible que el hack no pueda llegar a su teléfono inteligente, lo que significa que los comandos que transmiten no podrían controlar dicho software.
Además, hay otra cosa que los piratas informáticos necesitan para controlar su teléfono inteligente, que es que sus auriculares (con micrófono habilitado) estén conectados a su conector.
¿Cómo funciona todo?
Hablando francamente, parece un proceso bastante interesante la forma en que funciona este truco. Básicamente, usa solo dos cosas:
- iPhone o un teléfono Android con auriculares (deben estar habilitados para micrófono) conectados a la toma y un transmisor de radio.
- Los piratas informáticos utilizan el transmisor de radio para enviar silenciosamente comandos de voz a Siri o Google ahora, dependiendo de si es un iPhone o un dispositivo Android.
- Si usted es dentro de 16 pies del hacker, los auriculares probablemente funcionarán como antenas de radio, permitiendo que los comandos de voz controlen las aplicaciones usando su micrófono.
Esto se puede hacer simplemente porque el teléfono inteligente que puede estar usando comienza a creer que los comandos realmente provienen de usted, ya que el micrófono se está utilizando para dar estos comandos.
Cosas a las que los hackers pueden acceder
Hay muchas cosas a las que los piratas informáticos pueden acceder en su teléfono inteligente usando este truco, algunas de las cuales ya se han mencionado anteriormente. Sin embargo, echemos un vistazo a algunas de las funciones más importantes de su teléfono inteligente que pueden usar y explotar:
- Haciendo llamadas
- Envío de mensajes de texto
- Navegar por Internet, incluidos sitios dañinos y de malware
- Llamar a su propio número, lo que les permite escucharte a escondidas
- Envíe spam a sus contactos de Facebook, Twitter o correo electrónico
Los investigadores franceses también señalaron que, aunque estas pueden no ser razones lo suficientemente tentadoras para que alguien piratee su teléfono inteligente, a menos que, por supuesto, lo conozcan personalmente, en realidad hay algo por lo que incluso los extraños podrían querer piratear su teléfono inteligente. Esto se debe a que incluso pueden llamar a un número de pago usándolo, lo que puede generarles bastante dinero cada vez que lo hacen.
Demostración en video
Video de demostración de thehackernews.com
Muy bueno
Keep up the amazing work! Your method has saved me countless hours of frustration.
Fantastic job on this method! It’s incredibly insightful and helpful.
Wow, this method is incredible, thank you so much for posting it.
This method is seriously game-changing, thank you for sharing it.
Your method’s step-by-step instructions make it easy to apply even in high-pressure situations. I’m so grateful for this!
I’m so thankful for this life-changing method, thank you for posting it.
I’m so grateful to have come across this method, thank you for posting it.
Your method has helped me achieve results that I never thought were possible. Thank you!
The method has completely shifted my perspective, thank you.
The method has totally changed my perspective, thank you.
Thank you so much for the method, it works perfectly!
I appreciate the thoroughness and clarity of your approach. This method is excellent!
This method has completely transformed the way I do things, thank you.
This method has completely transformed my approach to problem-solving. Thank you for sharing your expertise!
Your method has helped me achieve results that I never thought were possible. Thank you!
I’m so thankful for this method, it’s seriously making a huge difference in my life.
Your method is not only effective, but also inspiring. It’s made me realize that there’s always a better way to approach problems.
I’m so happy with the method, it’s working wonders for me.
I cannot express how grateful I am for your expertise. Your method is a lifesaver!
Your method provides a clear roadmap to achieving success in X. I feel confident and empowered thanks to your guidance.
There are new applications that are used for hiding chats and all other apps on phones lately. I never knew about this until I was introduced to tomcyberghost[a]gmail com and I hired him to help me check, hack, and monitor my cheating spouse’s cell phone remotely. It was with his help got to know my spouse was cheating on me with this same application to hide most of the chats on the cell phone but immediately I contacted this ethical hacker he helped me break into it and I was able to read and monitor all the day to day activities through my cell phone. I will forever be grateful to this honest and trustworthy hacker. If you are facing any infidelity problems in your relationship or marriage you can contact him. He will provide all the help you needed for you. Contact him via Email: at [email protected] Text/Call and WhatsApp at +1(404) 941- 6785 to tell him i referred you.
when it comes to hacking. He will picture the best for you who actually needs his help, be careful of whom you contact to help you, he is a special hacker which has his own ways of hacking that nobody has ever imagined in thishacking world with his spare idea he can hack anything. He is totally secured and your security comes first.Hacking a website is a job for pros like MR FRED1-Change school grade. Bank jobs, flipping cash, hacking and controlling any robot.2-Database hack. Remove criminal records. Facebook hack. 3-gmail hack 4-whatsapp hack 5-website hack 6-tracking calls 7-online hacking lectures 9-Cloning of phones10-online records changes11-Twitter hack12 calls log And lots more. Contact [email protected] and you can text,call and whatsapp him on +15177981808 or +19782951763
I was able to catch my cheating husband red handed with a lady he has been having a love affair with and this was made possible by Fred hacker that I met through a comment posted by Kimberly Jane on Reddit about his good and professional services. I started getting suspicious of my husband since he became too possessive of his phone which wasn’t the way he did prior before now. He used to be very carefree when it comes to his phone. but now he’s become obsessed and overtly possessive. I knew something was wrong somewhere which was why i did my search for a professional hacker online and contacted the hacker for help so he could penetrate his phone remotely and grant me access to his phones operating system, he got the job done perfectly without my husband knowing about it although it came quite expensive more than i thought of.i was marveled at the atrocities my husband has been committing. Apparently he is a chronic cheat and never really ended things with his ex.. contact him here. [email protected] and you can text,call and WhatSapp him on +15177981808 or +19782951763
My husband has been frequently deleting all messages for the last couple of days from his phone and he didn’t know i was peeping at him, then i asked him why he was deleting all messages from his phone but he claimed that his phone memory was full and needed more space. Immediately I went in search of a hacker who can get me deleted information and contents from my husband’s phone and luckily for me i came across this reputable ethical hacker Mr Fred, this hacker got the job done for me and provided me with results and i saw that my husband has been lying to me. He was simply deleting all pictures, call logs, chats and text messages between him and his secret lover so i wont get to see what he has been doing at my back. Thank God for reputable hackers who are ready to help. I must say am really impressed with the services i got from The hacker Detective and am here to say a very big thank you: contact him on [email protected] and you can text,call him on +15177981808 or +19782951763