Beware The RATs, Before They Chew Through Your Mobile Security

Published on Dec 12, 2016
white arrow pointing left
Back to Media Centre
Drawing of a rate chewing on a wire.


New technologies are making our mobile devices more at risk than ever, necessitating risk protection for them as important as that for corporate computer systems, according to a feature article on RISKAFRICA’s website.

In the article, headlined The cellphone spy in your pocket, Hollard Broker Markets cyber insurance product manager Ryan van de Coolwijk says: “Every cellphone and tablet user in business needs to be highly aware [of this threat]. In this case, paranoia is necessary!”

Van de Coolwijk points out that the proliferation of smartphones, their ease of use, and the ways we use them for a multitude of confidential business and personal tasks, make them ripe for exploitation by criminals.

Threats include, among many others,  vulnerabilities in the device operating system; malicious software (malware), which includes apps and rogue WiFi access points; ransomware; and bank fraud. 

“The threat landscape to mobile is booming and is accelerated by easy access to online services, multitudes of new apps, and the wide adoption of mobile computing. So why would a cybercriminal attack a company network with its challenging firewalls, when they can target the phones of key individuals?

“Now, more than ever, people are using their mobile devices for online shopping, banking, social media, and working on the go. With this expanding use, vulnerabilities multiply,” says Van de Coolwijk.

A particular danger is remote access tools or RATs. Everyone from criminals and spies to vengeful former partners can purchase software that gives them access to your mobile devices – and create havoc.

“It is mind-boggling and scary. Imagine the competitive danger to people in business. Phone RATs can be used to remotely and secretly activate your speaker and record conversations happening in a confidential meeting or boardroom,” says Van de Coolwijk.

“RATs can take photos, steal sensitive data, access your stored photos or graphics, track your location, make unauthorised calls and send emails. RATs can even launch attacks against other systems or your clients and contacts … impersonating you.”

In the RISKAFRICA article, Van de Coolwijk offers advice on how companies can increase protection around their IT resources, as well as how individuals can make their mobile devices more secure – he offers 10 solid tips for making sure that the RATs and other nefarious types don’t get anywhere.

Are you following us on Twitter and LinkedIn for real-time updates?