Android phones vulnerable to remote data
wipes-polytechmate
WASHINGTON: Cellphones using
Google's Android operating system are at risk of being disabled or wiped clean
of their data, including contacts, music and photos, because of a security flaw
that was discovered several months ago but went unnoticed until now.
Opening a link to a website or a
mobile application embedded with malicious code can trigger an attack capable
of destroying the memory card in Android-equipped handsets made by Samsung,
HTC, Motorola and Sony Ericsson, rendering the devices useless, computer
security researcher Ravi Borgaonkar wrote in a blog post Friday. Another code
that can erase a user's data by performing a factory reset of the device
appears to target only the newly released and top selling Galaxy S III and
other Samsung phones, he wrote.
Borgaonkar informed Google of the
vulnerability in June, he said. A fix was issued quickly, he said, but it
wasn't publicized, leaving smartphone owners largely unaware that the problem
existed and how they could fix it.
Google
declined to comment. Android debuted in 2008 and now dominates the smartphone
market. Nearly 198 million smartphones using Android were sold in the first six
months of 2012, according to the research firm IDC. About 243 million
Android-equipped phones were sold in 2011, IDC said.
Versions
of Android that are vulnerable include Gingerbread, Ice Cream Sandwich and
Jelly Bean, according to Borgaonkar. He said the Honeycomb version of Android,
designed for tablets, needs to be tested to determine if it is at risk as well.
Samsung,
which makes most of the Android phones, said only early production models of
the Galaxy S III were affected and a software update has been issued for that
model. The company said it is conducting an internal review to determine if
other devices are affected and what, if any, action is needed. Samsung said it
is advising customers to check for software updates through the "Settings:
About device: Software update'' menu available on Samsung phones.
Borgaonkar,
a researcher at Germany's Technical University Berlin, said the bug works by
taking advantage of functions in phones that allow them to dial a telephone
number directly from a web browser. That convenience comes with risk, however.
A hacker, or anyone with ill intent, can create a website or an app with codes
that instruct the phones linking to those numbers to execute commands
automatically, such as a full factory reset.
The
phone's memory card, known as a subscriber identity module, or SIM, can be
destroyed remotely in the same way, Borgaonkar said. "Vulnerability in
Android can be exploited to kill the SIM card permanently by clicking a single
click,'' he wrote. "After the successful attack, the end user has to go to
the mobile network operator and buy a new SIM card.''
While
Borgaonkar has drawn attention to the problem, it's unclear how useful the
vulnerability would be to cybercriminals who are primarily interested in
profits or gaining a competitive advantage, said Jimmy Shah, a mobile security
researcher at McAfee. "There's no benefit to the attacker if they can't
make money off it or they can't steal your data,'' Shah said. "It's really
not that useful.''
But the technique could cause huge
headaches if it were harnessed to issue outbound phone calls, said Mikko
Hypponen, chief research officer at F-Secure, a digital security company inHelsinki, Finland. "If that would be doable, we would quickly
see real world attacks causing phones to automatically dial out to premium-rate
numbers,'' he said.
new brought you by poly tech mate
for more updates please stay tuned on our website always
bookmark and be always on your window.
have a fb like and twitter follow to stay tuned for updates of polymate
and to be a fan us
new brought you by poly tech mate
for more updates please stay tuned on our website always
bookmark and be always on your window.
have a fb like and twitter follow to stay tuned for updates of polymate
and to be a fan us
0 comments:
Post a Comment