Serious Discussion Can a compromised Android device infect your PC just by sharing network access? (USB tethering internet)

gfgtkitkat34

Level 2
Thread author
Aug 14, 2024
51
Let's assume hypothetically that everything they say about Chinese mobile brands is true and all of them comes with preinstalled, remotely activated malware that can hack the mobile device when the Chinese government wants.

  1. My question is if the user uses this phone to access the internet on his computer by using a USB-C cable/USB tethering, can the people that hacked your mobile also gain control of your computer?
  2. Is this technically possible? Is the regular user going to have to worry about this?
  3. In this scenario, let's assume that the user didn't copy anything from the infected device and also didn't install any software that the Android device manufacturer recommended to install on his computer.
 
Last edited:

Bot

AI-powered Bot
Apr 21, 2016
4,770
1. It's technically possible, but highly unlikely. The malware on the phone would need to exploit a vulnerability in the tethering process or in the PC's operating system to gain control.
2. While technically possible, it's not a common threat for the average user. Most malware is designed to exploit the device it's installed on, not other devices connected to it.
3. Even without copying files or installing recommended software, the risk remains, but it's still very low.
 

gfgtkitkat34

Level 2
Thread author
Aug 14, 2024
51
1. It's technically possible, but highly unlikely. The malware on the phone would need to exploit a vulnerability in the tethering process or in the PC's operating system to gain control.
2. While technically possible, it's not a common threat for the average user. Most malware is designed to exploit the device it's installed on, not other devices connected to it.
3. Even without copying files or installing recommended software, the risk remains, but it's still very low.
Is Stuxnet worm an example for this?
 

Victor M

Level 15
Verified
Top Poster
Well-known
Oct 3, 2022
747
Well, the Chinese don't know who bought the phone, so they would have to activate the backdoor to find out. And hackers are curious beings, they will want to look into your PC as well to really know who you are and see if you deserve to be observed long term. So the risk of them taking an interest in you is low ( I don't know how important you really are, I am just assuming you are a regular nobody ) but they will have to take an initial peek nevertheless.
 

gfgtkitkat34

Level 2
Thread author
Aug 14, 2024
51
Well, the Chinese don't know who bought the phone, so they would have to activate the backdoor to find out. And hackers are curious beings, they will want to look into your PC as well to really know who you are and see if you deserve to be observed long term. So the risk of them taking an interest in you is low ( I don't know how important you really are, I am just assuming you are a regular nobody ) but they will have to take an initial peek nevertheless.
I read that there are a few technical obstacles for this kind of exploit to work, but I couldn't find more info on why hackers don't use this method more often on at least high-value targets.
 

Victor M

Level 15
Verified
Top Poster
Well-known
Oct 3, 2022
747
Don't you think they would know well in advance of the problems of connecting to a PC and come prepared ? They developed the Android backdoor; they would know how to make things work when needed.

When it comes to hacking, you have to accept the fact that there are things we don't know. Look at the Telecom hack, it took us months to discover the hack and we are still at this moment trying to find out the extent of the hack.
 
Last edited:
  • Like
Reactions: gfgtkitkat34

Vitali Ortzi

Level 30
Verified
Top Poster
Well-known
Dec 12, 2016
1,918
Don't you think they would know well in advance of the problems of connecting to a PC and come prepared ? They developed the Android backdoor; they would know how to make things work when needed.

When it comes to hacking, you have to accept the fact that there are things we don't know. Look at the Telecom hack, it took us months to discover the hack and we are still at this moment trying to find out the extent of the hack.
The Chinese still have access , backdoors until they replace all the hardware
It's insane but definitely a fault of even having backdoors and foreign hardware , software without people knowing 100% how it functions
luckily it was discovered but something like that shouldn't take luck rather having that people actually understand how to secure such sensitive infrastructure and to replace it when new security features inside chips etc are available




Anyway about this topic the first answer of the bot is accurate except if it's from an app you gave privileges to access USB file sharing the you wouldn't need to exploit any zero day vulnerability to get malware into the pc
 
  • Like
Reactions: gfgtkitkat34

gfgtkitkat34

Level 2
Thread author
Aug 14, 2024
51
The Chinese still have access , backdoors until they replace all the hardware
Finding something that isn't made in China or a device that doesn't have Chinese electronics is near impossible. I suppose the best you can do is buy things made in China but not owned by China.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top