Second Chinese Firm In a Week Found Hiding a Backdoor In Android Firmware

0
574

An anonymous reader quotes Bleeping Computer: Security researchers have discovered that third-party firmware included with over 2.8 million low-end Android smartphones allows attackers to compromise Over-the-Air (OTA) update operations and execute commands on the target’s phone with root privileges. This is the second issue of its kind that came to light this week after researchers from Kryptowire discovered a similar secret backdoor in the firmware of Chinese firm Shanghai Adups Technology Co. Ltd.. This time around, the problem affected Android firmware created by another Chinese company named Ragentek Group. It apparently affects more than 55 low-end/burner phones from BLU, Infinix Mobility, DOOGEE, LEAGOO, IKU Mobile, Beeline, and XOLO. According to the article, the binary performing the insecure updates “also includes code to hide its presence from the Android OS, along with two other binaries and their processes… Without SSL protection, this OTA system is an open backdoor for anyone looking to take control of it.” Even worse, three domains were hard-coded into the binaries, two of which were unregistered, according to the researchers. “If an adversary had noticed this, and registered these two domains, they would’ve instantly had access to perform arbitrary attacks on almost 3, 000, 000 devices without the need to perform a Man-in-the-Middle attack.” Read more of this story at Slashdot.

Read More:
Second Chinese Firm In a Week Found Hiding a Backdoor In Android Firmware

LEAVE A REPLY

Please enter your comment!
Please enter your name here

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.