Vietnam.vn - Nền tảng quảng bá Việt Nam

Beware of cyberattacks via smartphones.

Smartphone users often think their phones are safer than computers against cyberattacks, but that's not the case. Smartphone apps also request many permissions, including sensitive ones like access to the camera, location, and data, making malicious apps easy targets for cyberattacks.

Báo Sài Gòn Giải phóngBáo Sài Gòn Giải phóng21/05/2025

Attack every corner.

Security firm Group-IB has announced the discovery of GoldPickaxe, the first trojan (malware) targeting iOS users in Vietnam and Thailand, capable of collecting facial data, other identification documents, and intercepting SMS messages on Apple iPhones. With the appearance of GoldPickaxe, iPhones, previously considered highly secure, are no longer safe.

V4b.jpg
Hackers can easily attack phones through malicious apps or insecure connections. Photo: Hoang Hung

Meanwhile, Kaspersky security experts discovered the cyberattack campaign targeting phones by monitoring the company's Wi-Fi network traffic using Kaspersky's Unified Monitoring and Analytics Platform (KUMA). After further analysis, researchers found that the threat actor had targeted the iOS devices of dozens of company employees. Victims received a message via iMessage with a zero-click attachment. Without requiring any interaction from the victim, the message triggered a vulnerability that allowed code execution to escalate privileges and gain full control of the infected device.

Mr. Nguyen Van Thu, General Director of Cybersecurity at BKAV Technology Group, stated: Currently, there are many common forms of attacks via mobile phones such as Malware - infecting through fake applications or files downloaded from unknown sources; Phishing - sending fake messages/emails to steal personal information or accounts; Social Engineering - exploiting gullibility and lack of knowledge to gain access. Other types include exploiting operating system and application vulnerabilities: attacking outdated operating systems or outdated applications; and attacks via wireless connections: using fake Wi-Fi, Bluetooth, NFC attacks, etc.

According to a recent announcement, Kaspersky's security solutions prevented over 893 million phishing attacks in 2024, a 26% increase compared to nearly 710 million attacks in 2023. A wide range of online scams target data theft, money loss, and malware distribution, with cybercriminals frequently impersonating the websites of well-known brands such as Booking, Airbnb, TikTok, Telegram, and many other platforms on smartphones.

Surprisingly, the most common threat on mobile devices is adware, designed to display advertisements as pop-up windows, accounting for 40.8% of all threats detected by security firms. Alongside this are spyware programs embedded through various applications. Therefore, cybersecurity experts assert that mobile phones are even more vulnerable to attacks than computers, as criminals only need to prepare a psychological manipulation scenario to trick users into installing malware on their phones.

Notes for organizations and businesses

Many people don't pay enough attention to protecting data on their phones, due to complacency and the belief that phones are only for personal use and don't store important data. However, phones actually store a lot of sensitive information such as passwords, OTP codes, bank accounts, and work data.

Therefore, Mr. Vu Ngoc Son, Head of the Technology Department of the National Cybersecurity Association (NCA), shared: “During the strong digital transformation process, many internal applications have been shifted to mobile trends, so mobile phones have also become devices participating in the systems of companies and organizations. Mobile phones often store internal accounts, emails, and company/organization data… so they also become targets for hackers to turn them into springboards for attacking organizational and business systems.”

This is something that users of personal devices should pay close attention to. Phone security software is very important, so users can choose commercial software from reputable manufacturers. In addition, there is free software from non-profit organizations such as the National Cybersecurity Association, like nTrust, which helps scan and detect malware and provides anti-phishing features.

Cybersecurity experts also note that cybercriminals often exploit personal devices to spread malware, attack internal systems (email, internal apps, VPNs), and take advantage of devices that are not centrally managed to bypass corporate security... “Users should not install applications from unknown sources, enable two-factor authentication (2FA), update operating systems and applications regularly, and not access internal systems from unprotected devices. For system administrators, it is necessary to apply clear personal device security policies, deploy mobile device management systems, install mandatory security software on devices accessing corporate data, and control network access as well as encrypt data,” added Mr. Nguyen Van Thu, General Director of Cybersecurity at BKAV Technology Group.

Many technological solutions are available on the Resolution 57 Portal.

The Ministry of Science and Technology has developed and put into operation the Resolution 57 Information Portal (NQ57), through which it publishes many science and technology products and solutions, innovations, and digital transformation initiatives. The NQ57 Information Portal contributes to realizing the content of Resolution No. 57-NQ/TW dated December 22, 2024, of the Politburo on breakthroughs in the development of science and technology, innovation, and national digital transformation.

As of mid-May 2025, the NQ57 portal had received 161 product and solution proposals and 14 ideas and initiatives, and published 103 products and solutions from various units and businesses. These products and solutions were categorized into many fields such as: solutions to promote digital access; digital technology, agriculture , resources and environment; education, health, culture, society, cloud computing; transportation, postal services and logistics… From there, the Ministry of Science and Technology received and evaluated potential science and technology, innovation and digital transformation products and solutions with consultation from the National Advisory Council, aiming to select initiatives with high applicability for practical implementation.

Proposal to expand the scope of sandbox applications

The Ho Chi Minh City Center for the Fourth Industrial Revolution (HCMC C4IR) recently held a consultation session to gather feedback from business representatives and associations to support the development of breakthrough policy proposals in the fields of science and technology, innovation, and digital transformation.

Many associations and businesses have pointed out barriers in research and application of technology and proposed practical solutions and policies. Many opinions also emphasized the need to implement breakthrough policies in the field of technology sandboxes. Mr. Le Truong Duy, Director of HCMC C4IR, stated that HCMC C4IR will continue to work alongside businesses, research institutes, associations, and relevant agencies in forming an open, sustainable, and highly adaptable innovation ecosystem, contributing to the development of the knowledge economy in Ho Chi Minh City and the whole country.

BINH LAM

Source: https://www.sggp.org.vn/de-phong-tan-cong-mang-qua-smartphone-post796275.html


Comment (0)

Please leave a comment to share your feelings!

Same category

Same author

Heritage

Figure

Enterprise

News

Political System

Destination

Product

Happy Vietnam
FINISHING LINE

FINISHING LINE

MERRY CHRISTMAS

MERRY CHRISTMAS

The river of my hometown

The river of my hometown