RESEARCH ARTICLE Guess who is listening in to the board meeting: on the use of mobile device applications as roving spy bugs Zahid Anwar * and Waqas Ahmad Khan National University of Sciences and Technology, Sector H-12, Islamabad, Pakistan ABSTRACT Covert listening devicesa combination of a miniature radio transmitter and a microphonehave been used as key espi- onage instruments as early as the mid-20th century. More recently, hackers have started exploiting inherent weaknesses in current mobile platforms allowing them to remotely convert a victims smartphone device into a roving spy bug without his knowledge. The goal of this paper is to illustrate with the aid of an Android mobile platform application that permissions gained in a legitimate way can be used to evade the integrity and privacy of the mobile device and install malware that re- mains completely hidden. When the attacker makes a call to the victims phone, he is able to listen in to the victims sur- roundings transforming the mobile phone into a sophisticated covert listening device. This communication-level attack goes undetected by current detection mechanisms. An anomaly-based detection feature set is another contribution of this paper to mitigate the proposed attack. As more and more mobile devices are being rapidly integrated into enterprises with the increase in bring-your-own-device model in many organizations, without a rigorous security screening policy, this weakness tends to facilitate corporate espionage by presumably allowing as many spy bugs in the board meeting as there are attendees with mobiles. This work provides a demonstration of a dangerous espionage attack targeting smartphones whereby an attacker can, with the aid of an Android mobile platform application, make a call to the victims phone and listen in to the victims surroundings transforming the mobile phone into a sophisticated covert listening device. It also pro- poses and evaluates a defense technique to detect and mitigate the attack where existing security mechanisms fall short. Copyright © 2015 John Wiley & Sons, Ltd. KEYWORDS spy bug; covert listening; Android malware; GSM bug; spying *Correspondence Dr Zahid Anwar, National University of Sciences and Technology, Sector H-12, Islamabad, Pakistan. E-mail: zahid.anwar@seecs.edu.pk 1. INTRODUCTION Covert listening devices also known as spy bugs have tradi- tionally been specially designed hardware devices. Take, for example, the GSM Spy Bug N9 Sinosky Technology Co., Ltd, Shenzhen, Guangdong, China. [1], a 6.4-oz, 3-day standby battery powered, global system for mobile commu- nications frequency-operated audio bug available commer- cially over the counter for approximately $40. The N9s two greatest limitations are difculty of deployment at the right time and place and ease of detection via the use of wire- less frequency scanners and electromagnetic eld sweeping devices. Recently, mobile phones and associated equipment are performing the additional function of spying devices. The advantages of low cost, mobility, and deception are ob- vious. Frequency scanners are powerless against this new breed of spying devices because they, in any case, emit wire- less frequencies for their regular function. Recently, security experts hacked a Verizon femtocell sold by (Verizon Com- munications Inc., New York, NY, U.S.A) and manufactured by (Samsung, Seoul, South Korea) or mobile network ex- tender to act as an eavesdropping device. According to the report [2], a group interested in potential mergers might place a backpack with such a device in Manhattan restaurants frequented by investment bankers. In April 2013, a spy ap- plication repackaged as an Android-based mobile messaging client named Kakao Talk was sent to a prominent individual in the Tibetan political community via a social engineering attack email [3]. Once installed, the spy application was able to harvest contact information, short message service (SMS) message history, and geolocation of the victim and upload the information to a le server controlled by the hacker. The increased capabilities of smartphones have inspired interest toward the development of applications for next- generation mobile platforms. Smartphones bring the mobil- ity of traditional cell phones and the power of desktop SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2015; 8:28132825 Published online 9 February 2015 in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.1205 Copyright © 2015 John Wiley & Sons, Ltd. 2813