Skip to content

Infographic: Anatomy of a hacked Android mobile device

AndroidPhotos, contact lists, banking apps, social media and email accounts all reside on our mobile devices. What if a hacker could access everything on your Android device—without you even knowing it? Sadly, it’s possible and increasingly likely.

Check out our “Anatomy of a Hacked Mobile Device” infographic to see how a hacker can profit by compromising your Android. From stolen financial account details, to premium SMS charges on your bill, and ransomware holding your device hostage, a hacked mobile device can cost you.

It’s not just your wallet you should worry about. A hacker could spy on your activity, leak out your private information, or impersonate you by posting to your social media accounts.

Plus, cybercriminals could enlist your smartphone in a botnet—a network of many hacked Androids. Android botnets, just like other botnets of compromised computers, can be used for conducting illegal activities, like attacking websites (DDoS attacks) and click fraud (sending illegitimate web traffic to online ad networks).


Secure your Android

You don’t have to be a victim if you take the right precautions. Be careful about clicking on links in your emails and when you surf the web from your device. Don’t download apps from unauthorized app stores. Always lock your phone in case it’s lost or stolen. And use an antivirus like Sophos Mobile Security for Android, which is available for free on Google Play. Here are some more tips to help you stay safe from malicious apps.

Security Threat Report 2014

Our Security Threat Report contains all the latest research from our SophosLabs experts on Android malware and other threats. Visit to read the report and access other resources including whitepapers and videos.


Leave a Reply

Your email address will not be published. Required fields are marked *

Subscribe to get the latest updates in your inbox.
Which categories are you interested in?
You’re now subscribed!