More than 500 Million Android Devices are Open to this New Vulnerability

0

A newly discovered hardware flaw in the Android devices is an invitation for trouble. Experts at a security research company, known as Check Point, discovered a few vulnerabilities that were given the name Quadrooter. This bug, or a flaw, is present in more than 500 million devices.

Speaking of which, this brings us to this year’s DEFCON, which was held in Las Vegas. Check Point’s chief mobile security research, Adam Donenfeld showed a few newly discoveries that had the ability to gain administrative privileges or root access on Android smartphones or tablets.

However by now you must be thinking how our devices can be affected by such a flaw. It’s simple. In order for your device to get infected, you simply need to install a malicious application. Once the application is set on your device, the hacker then has complete access to the data present in the device, along with the ability to modify core android files, as well as install new applications, delete them, execute a command to access your camera, microphone, and check what you are looking at on your screen.

Tech giant, Google has amped up their Android system with the latest patches and they are in a constant battle to make it more and more secure. However, a few major problems still exist and Quadrooter is one of them. Google aren’t the only ones fighting the battle to keep Android safe and sound. Hardware manufacturer Qualcomm, who is responsible for supplying processors to more than fifty percent of the companies that employ Android operating systems in their smartphones and tablets is fighting the same battle.

According to a blog post made by Check Point, if the group of vulnerabilities is used, these vulnerabilities can give attackers complete access to the systems files. This means an attacker can also install a backdoor into your device and infected/infiltrate the network for future hacking. They can gain access to your personal messages, voice recordings, personal videos and your personal images.

The cell phones that can have this flaw triggered are mentioned in the list below:

  • Nexus Series: Nexus 5X, Nexus 6, Nexus 6P.
  • One Plus Series:  One Plus One, One Plus Two, OnePlus Three.
  • Samsung Series: Samsung Galaxy S7, Galaxy S7 Edge.
  • Sony: Sony Xperia Z Ultra.
  • BlackBerry Series: BlackBerry Priv; Blackphone, Blackphone 2.
  • HTC Series: HTC One, HTC M9, HTC 10.
  • LG Series: LG G4, LG G5, LG V10.
  • Motorola Series: The new Moto X.

Now, since the flaw is present in the hardware or the drivers, the only way to fix it would be via an updated patch, or a specific update that can be sent as an Android update from the smartphone manufacturer – that is, once those companies get that updated patch from Qualcomm.

For now, all we can offer to you is a scanner that was created by Check Point, which is free to use – click here to install – this application will scan your device and will show you your device’s vulnerabilities. It will also show you the patches you can use against those vulnerabilities.

Lastly, according to the hardware company, they stated that they have already updated their security systems and have updated all the major flaws that led to this vulnerability. Google has already sent the updated patches in their previous update. However, one issue still remains there, and according to Google, that issue will be sent to customers in the coming update.

If you would like to know about the flaw in greater detail, please click here.

Source: Check Point


You want to support Anonymous Independent & Investigative News? Please, follow us on Twitter:


This Article (More than 500 Million Android Devices are Open to this New Vulnerability) is free and open source. You have permission to republish this article under a Creative Commons license with attribution to the author and AnonHQ.com.

CLICK HERE TO SUPPORT US VIA PATREON

Get Your Anonymous T-Shirt / Sweatshirt / Hoodie / Tanktop, Smartphone or Tablet Cover or Mug In Our Spreadshirt Shop! Click Here

 

LEAVE A REPLY

Please enter your comment!
Please enter your name here