Smartphone Hijacking: Smartphones offer numerous features, but they also come with their fair share of malfunctions. If your phone suddenly starts swiping screens and going online on its own, you need to be extra cautious because it might have been compromised by hackers using new techniques.
Ghost Touch – New Smartphone Hijack Technique
Adrianus Warmenhoven, an expert from the internet security company NordVPN, recently revealed to the media a new form of malicious intrusion called “Ghost Touch.” This technique exploits electromagnetic interference (EMI) to input fake touch commands on the phone screen, making it believe that it is being touched by the user when, in reality, it is controlled by hackers.
Even Placing Your Phone on a Table Can Make You a Target

The main limitation of Ghost Touch attacks is the short distance they can be launched from, restricted to within 40mm. However, according to NordVPN, the most common place for touchscreen invasions is public areas such as libraries or coffee shops. Attackers can preposition their invasion devices under the table, and when people place their phones face down on the table, the invasion can occur.
9 Phones Found Vulnerable to Exploits
Based on the information publicly disclosed by NordVPN, Ghost Touch has been proven to operate on nine smartphone models, all of which were mid-range devices released several years ago. These models include the iPhone SE (2020), Samsung Galaxy S20 FE 5G, Xiaomi Redmi 8, and Nokia 7.2, among others.
6 Signs to Watch Out if Your Phone Is at Risk
Even the highly secure iPhone is at risk due to the physical interference of Ghost Touch. To determine if your phone has been hacked, watch out for the following signs.
Without user intervention:
- Answering calls or unlocking itself without user intervention
- Opening webpages the user doesn’t recognize
- Accessing the user’s bank accounts
- Opening documents
- Playing videos
- Entering text into search boxes on its own
Hacked phones can be completely controlled through the manipulated touchscreen, allowing hackers to perform various actions. Apart from installing malicious software or accessing banking apps to steal money, hackers may also configure the phone to connect via Wi-Fi or Bluetooth to specific sites, enabling remote control.

Protecting Yourself from Touchscreen Invasions
To safeguard against being hijacked by Ghost Touch attacks, NordVPN’s security experts recommend adding additional security measures to your phone, such as setting passwords, using facial recognition, fingerprint authentication, or PIN codes.
Additionally, when taking your phone to public places, remain vigilant and avoid leaving your phone unattended to minimize the risk of invasion.
While antivirus apps cannot prevent Ghost Touch attacks, they can still interrupt the installation of some malicious software if your phone is compromised, thereby enhancing its security.