80% of mobile phone users face browser security risks

Source: Internet
Author: User
Tags cve


IBM 's x-force Application Security Research team recently discovered the flaw. An attacker could use this arbitrary code execution vulnerability to authorize a rogue application that does not have permission to elevate its privileges, and the hacker can manipulate the device. In addition to this Android vulnerability, the researchers found several vulnerabilities in third-party Android SDKsthat could help attackers manipulate the APP.

Security guard pointed out that Android KitKat4.4 and later versions are based on the Linux 3.6 version kernel, which means that there are 80% android smartphone users worldwide, Millions of people are using smartphones with serious security vulnerabilities.

Google's letter to the technology media Ars Technica said: "Google engineers have been aware of the vulnerability and take appropriate measures, the current Linux kernel has been fixed cve-2016-5696 This vulnerability,Android system repair is also in the corner.

Industry experts pointed out that the security guard found this vulnerability, although serious, but short time difficult to cause significant harm, because the vulnerability is only suitable for a single user point-to-point targeted attacks, hackers can not attack a large number of users, the harm is limited.

But the bad news is that the vulnerability cve-2016-5696 provides hackers with a new attack surface and channel outside of the middle man attack, which eliminates the need to tamper with the Internet when hackers attack individual users, which means new threats for security professionals. In addition,the fragmentation of the Android system itself, many handset manufacturers of systems are often updated or inconsistent, especially in the Chinese market, the relatively closed Android ecosystem, which gives hackers the use of known vulnerabilities provide excellent soil.

Android Serialization Vulnerability (cve-2015-3825) exists on the Android platform itself, and the affected versions include 4.3 to 5.1, which is Jellybean,KitKat, Lollipop and android M preview 1, spread to 55% android devices.

The researchers ' paper describes a reliable PoC todemonstrate the feasibility of the attack. This PoC is capable of attacking a high-privileged system_server process, allowing the privilege to be elevated to the level of the system user, which has a relatively loose SELinux configuration, resulting in increased damage behavior.

For example, an attacker could take over any app on the victim's phone by replacing the target app's apk. This allows an attacker to perform operations as a victim. In addition, we can use the Android Keychain app to run Shell commands to steal data from all apps in the device. You can even change the SELinux policy to load a malicious kernel module on some devices.

Attack process

first, the attacker would do a seemingly non-security hazard App, after installation, the app won't request to read the device data, so the user will be relaxed.

but once installed, malware will use the vulnerability in opensslx509certificate modifies the phone's memory value and then powers it. In turn , the fake app replaces the regular app, restarts thedevice, and the attacker can collect user data after rebooting.

Once the malware is executed, it will use fake Apps instead of real apps, attackers can steal sensitive data from the app or make phishing attacks. Video, the researchers replaced the real Facebook app with a fake app called Fakebook.

security guard remind mobile phone users, visit the page is sure to polish the eyes, in case of loss.


80% of mobile phone users face browser security risks

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.