I would add some further considerations.
Let's assume that you are being actually spied through yuor phone. 😯
WHY?
By WHOM?
?
I mean, if you don't work for the military/defense, or in a financial institution at top level or in industry in research, it is likely that you can exclude
- a foreign country secret service
- financial/industrial espionage
If you are not a criminal or involved in terrorism, you can probably exclude also
- criminal police
- your own country security agencies
Please consider that if by any chance you actually have one of the roles above, most probably your phone is not a several years old K750i.
If you are not involved in politics and do not live in a "restricted freedom" country I presume you can also exclude
- political police
Which should leave a very little amount of possibilities
- your ex- (or soon to become ex-) wife
- your nosy neighborhood (the same one you don't talk to since he forgot to give you back the bike pump you lent him)
- your lover (expecially if you have more than one)
- a private investigator (which is however only the means of one of the three above)
[/listo]
It's of course up to you to judge if any of the listed possibilities (or some more not listed) are plausible, just like my previous "very unlikely" one must consider probabilities.
As I see it if the government or high level industrial spies are after you, you have no chances, in the sense that they would have used something virtually "undetectable".
If on the other hand you are being spied by a PI or one of the other "lower tech" possibilities, we are back to how likely it is that they managed to either replace the firmware of your phone or install to it a malware.
AFAIK there are not "public" apps of the kind, only the usual PoC's (Proof of Concepts) and "random" fakes/ideas/senseless blabbing specific to that phone make/model, but everything is possible in theory, only IMHO not likely in practice, and definitely there is no known vulnerability of the bluetooth interface without user allowing explicitly the connection.
jaclaz
Searchlight,
You have been given some considered advice already. My thoughts are the following
1. If you consider there is a possibility that your mobile phone has been tampered with, have you stopped using it? Remove the sim card and use it in another handset and then try and replicate the problem.
2. The suspect handset can be monitored in a controlled environment (without sim card) but with internet access if possible to see if connections are being made. I am not familiar with this handset.
3. It would be possible to create some code and embed it into an MMS message and send this to an unsuspecting individual in order to tamper with or attempt to intercept messages or calls BUT the costs and efforts associated with this would make it almost impossible for 'normal' person to achieve. This could possible be achieved by a Government or State Agency with the resources and access to the scarce skills needed. Should a Government Agency wish to do this there are simpler methods as they would just request an intercept at the mobile network carrier!
So without being able to provide the proof you seem to be seeking it is possible for this to happen but highly unlikely.
Just to add some additional candidates to those which jaclaz and jarretlr mentioned -
/hacker may do it, just like spreading a virus, and for the hell of it
/maybe partner if they are suspicious about infidelity
/maybe the person does it themselves to gain attention
/maybe someone (hacker maybe) testing the forensic community
There is also the question whether the handset was out of the possession of the owner/user for any significant time.
Symantec published a review of Bluetooth regarding security and vulnerability. Part 2 shows example for modifying obex
http//
http//
However, none of the above add any shred of evidence at all that this handset has spyware on it.
Once again I apologize for not replying on time
AND
I need to thank you all for getting into the trouble of providing me with useful advise. D
Even though I wish I could get into more details about my suspicions , unfortunately,
I can't . I don't think it would be the wise thing to do. Let me just say that the potential "source"
of my worries is quite certain and pinpointed and it doesn't have anything to do with former spouses
hackers e.t.c.
It is true I didn't mention the "mms" in my original request because I didn't want to narrow down
the problem to only one method . Heck ,I wasn't sure about it either !
i am really concerned about spreading the spyware to a third party by mms reception.
As for the technical advise, I feel truly thankful and I will do my best to pull it through.
Bye for now !
I ' ll be writing back soon
Thanks again