Black Hat 2015 Vulnerability affects the 95% of Android devices

Black Hat 2015: Researchers discovered a σε συσκευές Android που επιτρέπει σε hackers να έχουν to a remote device without its owner ever knowing. The flaw affects about 95% of Android devices running OS versions 2.2 through 5.1, according to security firm Zimperium.Black Hat 2015

The error is due to a multimedia library (used to edit media files) called Stagefright.

Zimperium reports that too many vulnerabilities have been found in this framework. The company plans to present its research at the Black Hat 2015 conference to be held in August.Black Hat 2015

Using a person's phone number, hackers can send a multimedia file via MMS that allows them to sign in to a device. The really worrying fact is that the owner of the device will never learn it.

Hackers could theoretically send through the file while the owner of the device is sleeping, and gain access to his phone. They can then delete any evidence that the phone was compromised.

Once the exploit is completed, the hacker can remotely use a phone's microphone, steal files, read emails, and smash all personal credentials.

“Αυτά τα τρωτά σημεία είναι εξαιρετικά επικίνδυνα, επειδή δεν απαιτούν από το θύμα να προβεί σε οποιαδήποτε για να αξιοποιηθούν. Σε αντίθεση με το spear-phishing, όπου το θύμα θα πρέπει να ανοίξει ένα αρχείο PDF ή μια sent by the attacker, this vulnerability can be triggered while the victim is sleeping. Before waking up, the attacker will remove all signs that the device has been compromised and continue to access the trojaned phone," Zimperium CTO Zuk Avraham says.

Of course, after that, Google should immediately update all versions of Android, which is very difficult.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).