Anonymous issued a warning to the President and pointed potential hackers to a piece of software capable of cracking Trump’s smartphone.

Jasper HamilThe Sun

THE hacktivism group Anonymous has published a simple guide on how to hack Donald Trump’s phone.

Members of the masked collective published advice on how to crack into The President’s smartphone on a Twitter account with more than 1.68 million followers.

qatar airways

The Sun report some commentators believe Trump still uses the same mobile he owned before taking office, which The New York Times described as an “old, unsecured Android phone”.

If true, this leaves the most powerful man in the world vulnerable to a potentially devastating hack attack.

In a bid to highlight the dangers, Anonymous issued a warning to the President and pointed potential hackers to a piece of software which could potentially do the job of cracking Trump’s smartphone.

“A Galaxy S3 does not meet the security requirements of a teenager, let alone the purported leader of the free world,” the hacking collective wrote.

“Without exaggerating, hacking a Galaxy S3 or S4 is the sort of project I would assign as homework for my advanced undergraduate classes.”

You mean hackers want to try and get into my Android? AP Photo/Evan Vucci

You mean hackers want to try and get into my Android? AP Photo/Evan VucciSource:AP

Ads by Kiosked

The guide then when on to suggest a particular piece of malware which could infect the President’s phone as long as he could be fooled into clicking on a web link.

We have decided not to name the computer virus mentioned in the post.

“Alternatively, one could advertise malware on Brietbart and just wait for Trump to visit,” the hacktivists added.

If hackers were successful in cracking Trump’s phone, they could potentially view confidential material or even snoop on top secret conversations.

“Once they’ve infected they phone, they can look at the calendar, see what meetings a person has and then turn on the microphone during the meeting and record everything that’s said. Bryce Boland, chief technology officer with the security firm Fireeye told USA Today.

“Then the malware emails the recording to the account controlling the malware.”

This story first appeared on The Sun .

LEAVE A REPLY