A team of researchers have devised an experimental Android-based Trojan called TapLogger that can manipulate the mobile onboard motion and orientation sensors to crack stored passwords. Motion and orientation sensors can also utilise the vibration sensor of a mobile device, which could then activate a Trojan to capture keyboard inputs using a malicious keylogger. TapLogger exploits accelerometer and orientation sensor data which as we know isn’t sandboxed and doesn’t enforce permission controls under the Android security model. The motion and orientation sensors are exposed to any app, regardless of permissions. This TapLogger Trojan could also be developed for iOS (iPhone) and BlackBerry (touchscreen and non-touch screen models) as these operating systems also don’t include the motion sensor in their security models. Read more...
Author
