Key Takeaways
- The CERT-FR recommends deactivating Wi-Fi on mobile devices when not in use to reduce the risk of cyber attacks
- Mobile devices are prime targets for cyber intelligence due to their extensive vulnerabilities across wireless interfaces, apps, operating systems, and hardware
- Users should install apps only from official stores, review permissions, keep devices updated and rebooted, use a VPN on public Wi-Fi, and disable auto-join on open networks
- The use of public Wi-Fi networks can be exploited for man-in-the-middle attacks to intercept or alter data on connected devices
- Recommended defenses include turning off Wi-Fi when not needed, disabling auto-connect, avoiding public networks, and using a VPN when necessary
Introduction to CERT-FR’s Recommendations
The CERT-FR (French Computer Emergency Response Team) has issued a warning to iPhone and Android users to fully disable Wi-Fi to reduce exposure to multiple vulnerabilities across wireless interfaces, apps, operating systems, and hardware. The agency emphasizes the importance of basic hygiene, such as installing apps only from official stores, reviewing permissions, keeping devices updated and rebooted, using a VPN on public Wi-Fi, and disabling auto-join on open networks. This warning is a response to the growing threat of cyber attacks on mobile devices, which have become prime targets for cyber intelligence due to their extensive vulnerabilities.
Vulnerabilities in Mobile Devices
Smartphones, handling vast amounts of data and multiple features, are prime targets for cyber intelligence. They have extensive vulnerabilities across wireless interfaces, apps, operating systems, and hardware. Weaknesses in protocols like Wi-Fi, Bluetooth, NFC, and cellular networks allow data interception or spyware deployment. Sophisticated zero-click exploits can compromise devices without user action, leaving minimal traces. State-sponsored actors and Private Sector Offensive Actors (PSOAs) exploit these flaws, increasing threats and complicating attribution. Mobile devices face a broad and growing attack surface from advanced offensive capabilities. According to the report "MOBILE PHONES – THREAT LANDSCAPE SINCE 2015" published by CERT-FR, "The ubiquity and systematic use of smartphones, along with the increasing number of features and data they handle, make them targets of interest for the acquisition of cyber intelligence."
Threats to Mobile Devices
The report highlights the numerous communication protocols used by mobile devices, such as cellular networks, Wi-Fi, Bluetooth, and NFC, which suffer from several weaknesses facilitating the interception of exchanged information or even the alteration of data to deploy spyware code on devices. Wi-Fi, especially public or poorly configured networks, can be exploited for man-in-the-middle attacks to intercept or alter data on connected devices. Real cases include Wi-Fi flaws used to deploy spyware, commercial interception tools, and fake access points for phishing or malware. The report emphasizes the importance of protecting mobile devices from these threats by following recommended defenses, such as turning off Wi-Fi when not needed, disabling auto-connect, avoiding public networks, and using a VPN when necessary.
Recommended Defenses
The CERT-FR report includes a set of recommendations to protect mobile devices from cyber attacks. The report advises users to deactivate Wi-Fi when it is not in use, disable automatic connection to known or open Wi-Fi networks, and avoid connecting to public Wi-Fi access points unless necessary. If public Wi-Fi must be used, the report recommends using a VPN to encrypt data and protect against interception. Additionally, the report emphasizes the importance of keeping devices updated and rebooted, installing apps only from official stores, and reviewing permissions to prevent unauthorized access to device data.
Mobile Wireless Interfaces
Mobile wireless interfaces, such as 2G-5G, Wi-Fi, Bluetooth, and NFC, let devices communicate via radio waves and have exploitable vulnerabilities. Attacks target these interfaces in three ways: passive interception to capture identifiers and data, active interception to decrypt or hijack communications, and data modification to alter exchanges and compromise devices. The report highlights the importance of protecting these interfaces from cyber attacks by following recommended defenses, such as disabling auto-connect and using a VPN when necessary.
International Cooperation
The report also mentions the Pall Mall Process, an initiative launched by France and the UK in late 2023 to curb the misuse of commercial cyber intrusion tools. The initiative promotes cooperation, threat sharing, and legal safeguards to prevent the exploitation of vulnerabilities in mobile devices. This international cooperation is essential in combating cyber threats, which are becoming increasingly sophisticated and global in nature. By working together, countries can share knowledge, best practices, and resources to protect mobile devices and prevent cyber attacks.