Privacy, Threat Intelligence

Novel tool facilitates non-malware geolocation compromise

Smartphone with map, 3D Map pins, GPS, navigator pin checking points, 3D World Map icon, technology and application mobile smart phone with mobile, delivery tracking, transportation, generate by AI

Cybernews reports mobile devices could have their geolocation unmasked without malware injection through the use of the new Seeker tool developed by offensive mobile security researcher thewhiteh4t.

Malicious actors could use Seeker to choose templates mimicking legitimate websites, such as Google Drive, Telegram, and WhatsApp, before proceeding with social engineering schemes luring targets into entering the phishing site that seeks access permissions, a report from Mobile Hacker showed. Approving such permissions allows attackers to not only procure the precise location of mobile devices but also other device details, including operating system, browser, platform, and GPU vendor information. Attackers could also leverage the tool on devices with a Linux terminal. "This tool is a Proof of Concept and is for Educational Purposes Only. Seeker shows what data a malicious website can gather about you and your devices and why you should not click on random links and allow critical permissions such as Location, etc.," said thewhiteh4t.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds