Attackers are now using GhostTouch attacks to hack your phone

Featured image for Attackers are now using GhostTouch attacks to hack your phone

It comes as no surprise that threat actors and hackers have always used malware and phishing attacks to infiltrate devices and gain unauthorized access. However, according to new research from China’s Zhejiang University and Germany’s Technical University of Darmstadt, threat actors are now using a new technique called GhostTouch, which exploits electromagnetic signals to mimic gestures like swiping and tapping on the targeted device.

This new technique eliminates the need to install malware and allows threat actors to gain unauthorized access to smartphones, potentially compromising sensitive data, including passwords and banking applications.


As of now, nine smartphone models, including the iPhone SE (2020), Samsung Galaxy S20 FE 5G, Redmi 8, and Nokia 7.2, have been identified as vulnerable to this exploit.

Public places prone to GhostTouch attacks

While the idea of attackers remotely hacking your phone might sound alarming, it is important to note that threat actors need to be near their victims to carry out the attack. As a result, public places like libraries, cafes, or conference lobbies become the prime targets for such attacks.

Additionally, given that people keep their phones face down in quiet environments, such as the library, threat actors can take advantage of this situation by placing their hacking equipment nearby and emitting electromagnetic signals within a range of 40 mm.

However, it is important to note that these attacks are not inconspicuous. In fact, users will observe their phones seemingly operating on their own. But unfortunately, since the occurrences of glitches where the phone registers false touches are relatively common, many users may not even realize that a hacking attempt has taken place.

How to stay protected

While there is no foolproof solution to safeguard against GhostTouch attacks, users can take several steps to prevent hackers from gaining access. These include implementing robust security mechanisms like PIN codes, swipe patterns, or biometric authentication and refraining from placing their phones face down on tables.