S
S
Sergey2019-07-13 07:37:09
Burglary protection
Sergey, 2019-07-13 07:37:09

Got on the phone?

Hi all. Tell me who knows. A few days ago, something like this happened. My little one ran a youtube channel, there were quite a few subscribers. The account has two-factor authentication. His phone is Xiaomi redmi 5a. At some point, his phone suddenly rebooted and the phone lock from mi.com got out. At this time, I noticed from my phone that all his videos had already been deleted and the acc was taken away. Restore via google did not work unfortunately. The question is how did they get into his phone and how to protect himself for the future? Tell me who knows. Thanks

Answer the question

In order to leave comments, you need to log in

4 answer(s)
S
sim3x, 2019-07-13
@sim3x

A card with a phone number with 2FA is placed in an old push-button phone
This number is not known to anyone except the owner and services

A
athacker, 2019-07-15
@athacker

To compromise an Android phone, there are exploits that allow you to take control of the device without any user interaction. Enough included on the phone bt or wifi. You can read here or here . And here: https://github.com/Kogl1n/Blueborne -- ready exploit. It is for Huawei, but the difference is insignificant, it is easy to cut it for any other device.
There are a lot of attack vectors - the android is very full of holes. Versions from the 8th got better, but still, Chinese models have a bunch of pre-installed / customized software with the wildest number of vulnerabilities, and finding an exploit for a specific model, especially for such an old one as Redmi 5A, is not difficult. And yes, this penetration can be done quietly.
Again, this does not mean that the vector of penetration and hijacking of the account is precisely the phone. You did not write what "hijacked acc" means. Because in the case of Google services, you often don’t even need to steal anything, it’s enough to complain a couple of times from the left accounts about copyright infringement, and Google will close the channel. Here, for example, similar stories are described: https://habr.com/ru/post/438670/

X
xmoonlight, 2019-07-25
@xmoonlight

The question is how did they get into his phone and how to protect himself for the future?
1. Not the fact that they penetrated into the phone. 50/50
_ modules when not in use.
(or root, knowing in advance: what and how to set it up correctly)

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question