LinkedIn Tracking

Android Spyware & iPhone Spyware Detection

Android Malware - iPhone Virus Detection & iPhone Malware Detection

At NSI, our goal is to secure your privacy and your peace of mind. Nowadays, spyware and malware are easily purchased online and are a major threat to people’s and organisations’ privacy. We are specialists in zero-day attacks (attacks that have been designed not to be detected by current anti-virus tools).

CELL PHONE SPYWARE DETECTION AND S77 ATTACK – S77 INTERCEPTION

Our spyware and malware forensic specialists can detect if your device is compromised using the most advanced digital forensic equipment. We do this by analysing the device’s bit-for-bit memory and the behaviour of the device and its contents. Once a threat is identified, we are able to provide information about it. Information provided may include where your data is going, what type of data has been accessed, recover deleted data, and more.

WHAT IS SPYWARE AND HOW DOES IT AFFECT YOUR PRIVACY?

Spyware is a piece of software that allows an attacker to access all kinds of data from your device. It is installed in a variety of ways, such as an infected image or file that is sent to the device via Bluetooth, Email, or Message, or by an infected link that is sent via SMS.

SPYING APPS & SPY PHONE APP DETECTION

The Spyware would allow your camera and microphone to be remotely activated, your phone calls to be listened to and intercepted, your text messages to be read, your passwords to be viewable, and your location tracked, just to name a few. NSI consulted with Ross Coulthard of 60 Minutes on an investigation into mobile phones being compromised. See the video here.

If you suspect that your mobile phone is being used to track you with a mobile tracker or listen to your conversations or read your SMS or emails, we can help.

HOW CAN NSI HELP?

Using the latest law enforcement grade equipment we can conduct a Digital Forensic Spyware and Interception Analysis to detect malware, spyware that may be installed on your device. A mobile device that is used as a tracking or eavesdropping device is a breach of numerous laws such as the Privacy Act, Telecommunications Interception Act, and the Surveillance Devices Act.

Our Digital Forensic Spyware and Interception Analysis can provide evidence as to whether Spyware is currently active or deleted from the device. We are also able to analyse SIM cards to determine if there were any interception attempts.

If Spyware or evidence of an interception attempt is found, we are able to present you with an expert report and affidavit which can be presented in all courts and tribunals.

What is the NSI approach to detecting Spyware and Malware?

Threats are becoming more prevalent and continue to increase drastically. Our NSI innovations team continues to advance our digital forensic capabilities. Our expert digital forensic specialists can not only detect an attacker that is using spyware or malware but can also conduct a cellular interception analysis and investigation. Where others fall short in only checking for spyware, our team goes above and beyond and ensures all forms of communications into and out of a device are checked thoroughly.

Can Spyware or Malware be detected with anti-virus software?

Anti-virus and anti-malware software and apps can only identify known threats that have already been analysed. These are done by the virus signature being uploaded to their system. What happens when the threat is not known? These are called zero-day attacks. Attackers use this method as an exploit until such time the software and app manufacturers end up creating a way to detect them. Spyware or malware can ultimately infect your internal network in a corporate environment.

You must always ensure you have sufficient systems with multiple redundancies in place in case of a system being infected. NSI can assist with designing a cyber and information security architecture to ensure minimal damage is done in the event of an attack.

What is an SS7 Cellular Attack?

Signaling System 7 (SS7) is a cellular protocol used worldwide that interconnects mobile phone operators. Through the use of an IMSI Catcher or Stingray device, which are rogue or fake cellular towers, a mobile phone is able to be covertly intercepted over the air by exploiting the baseband processor on the mobile phone. When an IMSI Catcher/rogue cell tower is in operation, mobile phones within the vicinity of the rogue tower connect to it and the IMSI Catcher then does a handoff to the legitimate tower(s).

Prior to the handoff, a silent SMS or Paging Request is made which allows your device to be fully controlled, without leaving a trace on your device.

Some of the things that can be done to a phone or device that has spyware on it are:
  • View your location
  • Read SMS text messages and emails
  • Listen to phone calls
  • Read your passwords
  • View the websites you have visited
  • Gain access to documents

If you believe that your privacy has been breached by one or more of the above, contact our friendly team and let us help you get your privacy back.

Contact