1000words - Fotolia
You recently wrote about a security startup that aims to improve malware detection by monitoring a device's power consumption. Now I'm hearing that malware authors are using power consumption to track devices. How significant is the threat of tracking a device's power consumption, and how can that technique be used to attack a user's device?
Academic research titled "PowerSpy: Location Tracking Using Mobile Device Power Analysis" by Yan Michalevsky, Dan Boneh, Aaron Schulman, Gunaa Arumugam Veerapandian and Gabi Nakibly, describes a tracking malware attack that results in a privacy leak.
Monitoring power and other seemingly innocuous aspects of a personal device can surprisingly have privacy-related risks. The research shows it is possible to track a user's location based just on reading the power usage of a smartphone. Some parts of the phone require specific permission to access location based data -- like the GPS -- but, as described in the paper, accessing the power usage does not.
The researchers were able to use machine learning to calculate the path taken by the research subject based on the differing power consumption used to connect to nearby cell towers. The attack did require a piece of software already installed on the device, but this could easily be included as part of a malware attack or by maliciously using legitimate software included on the device.
While the risk of enterprise users being tracked in this manner is low, enterprises with high security and privacy needs should be aware of the attack. To mitigate the risk, enterprises should ensure employees only install prevetted applications on devices that are connecting to the corporate network and accessing corporate data.
Though the power consumption-tracking malware research was performed on an Android phone, iPhones are not immune to similar attacks. iPhones keep a record of the cell towers they connect to, and while this is not as sophisticated at the PowerSpy attack, similar security measures should be taken to prevent falling victim if and when the power-tracking malware attack evolves.
Ask the Expert:
Perplexed about enterprise security? Send Nick Lewis your questions today. (All questions are anonymous.)
Learn more about advanced malware and how to defend against it
Find out how the face of advanced malware detection is changing
Be careful of GPS data leakage
Dig Deeper on Malware, virus, Trojan and spyware protection and removal
Related Q&A from Nick Lewis
Enterprises have many options for email security best practices, ranging from deploying email security protocols to educating end users on the ... Continue Reading
Cyberattacks often begin with a port scan attack, which attackers use to find exploitable vulnerabilities on targeted systems. Learn how they work ... Continue Reading
Monitoring process memory is one way to combat fileless malware attacks. Here's what you can do to protect your network against these campaigns. Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.