1CYB1 Class Blog - Univeristy of Galway 2023-24

Cybersecurity thoughts in response to The Guardian article on "lending phone to help a stranger led to financial loss"

This is an attempt to derive some takeaways and suggestions related to “digital safety”, based on an incident reported by The Guardian: “‘I was in despair’: how lending a phone led to life savings being stolen”.

This could be viewed as a social engineering attack on the ground. The magnitude of this attack was further amplified by additional issues related to 'personal digital safety'.

Let's break it down:

The combination of the above three factors is what led to the crime of the malicious actor using a debit card of the victim to make purchases. The malicious actor was able to make high-value purchases because they had access to the PIN, and could use the chip card+PIN authentication method at the POS terminals. This meant that they didn't find themselves blocked by any contactless/Tap & Pay limits (currently GBP 100 in the UK).

Broadest, sweeping takeaway: do not lend your phone to be used by strangers.

Because, a smartphone in an unlocked state can mean a total free pass into a user's digital life. iPhones do not have a “Guest mode” - the device is not expected/designed to be used by anyone apart from its 'owner'. (What if it was stolen, instead? The device passcode lock would have prevented access to the Notes app, which contained the ATM pin.)

Defence-in-Depth suggestions

  1. Enable/turn on additional “locks” for individual apps, like the Notes app.

Illustration:

This would mean that, even if you lend your phone to someone in an unlocked state (for them to make a call, for instance), your sensitive notes will stay protected.

  1. Set/enable daily transaction limits on debit/credit cards. (E.g. max GBP 2000/day)

Honourable mention

Avoid bundling sensitive items like your phone, debit cards, and ID cards as a single case/object.

Keeping the phone as just a phone, and your cards (payment and ID) as a separate wallet, could lower the risk of unfavourable outcomes.

Additional takeaways/suggestions

  1. Learn to store sensitive information safely - enable lock options, enable encryption, understand encryption options and the importance of safeguarding encryption keys. This would mean that, even if you lose “possession” of your data, the data will remain “confidential”.

  2. Consider using a password manager - like Bitwarden, and learning to use it safely. Learning to use a password manager “properly” is IMPORTANT because, otherwise, it could end up being yet another single point of failure.

  1. Get familiar with emergency routines (maybe individuals should have access to “phone security emergency drills”, like fire drills):

Aravind Jose T.