Security News Android Vulnerability Affects 2.8 Million Devices

Exterminator

Level 85
Thread author
Verified
Top Poster
Well-known
Oct 23, 2012
12,527
A new Android vulnerability, estimated to impact 2.8 million devices worldwide at its peak, has been uncovered by security ratings firm BitSight.

The vulnerability, which affects devices out of the box, involves Android devices (including BLU Studio G from Best Buy) and an over-the-air (OTA) update mechanism associated with the software company, Ragentek Group, in China. Certain mobile phones are this vulnerable to man-in-the-middle attacks, allowing adversaries to execute arbitrary commands as a privileged user—such as extracting information or remotely wiping the device—and making it possible to gain access to other systems on a corporate network and steal sensitive information.

Many of these devices sit unknowingly on enterprise corporate networks.

According to BitSight, transactions from the binary to the third-party endpoint occur over an unencrypted channel, which not only exposes user-specific information during these communications, but would allow an adversary to issue commands supported by the protocol. One of these commands allows for the execution of system commands.

“This OTA binary was distributed with a set of domains preconfigured in the software,” the company said. “Only one of these domains was registered at the time of the discovery of this issue. If an adversary had noticed this, and registered these two domains, they would’ve instantly had access to perform arbitrary attacks on almost 3,000,000 devices without the need to perform a man-in-the-middle attack.”

BitSight’s AnubisNetworks now controls these two extraneous domains to prevent such an attack from occurring in the future, it said.

Still, the impact is significant. “We have observed over 2.8 million distinct devices, across roughly 55 reported device models, which have checked into our sinkholes since we registered the extraneous domains,” the company said. “In some cases, we have not been [able] to translate the provided device model into a reference to the real-world device. Thus, there could be additional device models affected.”
 

tim one

Level 21
Verified
Honorary Member
Top Poster
Malware Hunter
Jul 31, 2014
1,086
My old Samsung S3 is not updated from years and it is a repository of vulnerability.
Normal situation because vendors are pushing the user towards the purchase of a new smartphone.
So there are two options: I keep my old S3 with its old vulnerabilities or I purchase a new smartphone with new flaws...:D:rolleyes:
 

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
Usually those vulnerabilities are already common and Google notified it to patch for latest update.

The problem goes from 3rd party manufacturer where they only deliver updates from specific fixes rather the Android overall patches.
 
  • Like
Reactions: Fritz

soccer97

Level 11
Verified
May 22, 2014
517
Hopefully they push out an update- I am 99% sure they can push out some security updates using Google Play Services in the background. I try to install Android software/firmware upgrades through Samsung SmartSwitch on my PC than OTA. You can backup and restore the contents, get a full update that it flashes (so there is less risk of a corrupted file IMHO and I am pretty sure it wipes the device instead of just patches it OTA. Another layer of reliability and security for me. Consider using it - just follow the instructions!

Samsung Smart Switch
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top