Android big hole, 99% of Android phones have the opportunity to become a victim of botnet




Android big hole, 99% of Android phones have the opportunity to become a victim of botnet
Android Google News Software and Applications

Material weaknesses in the Android system allow a hacker can control your phone.

According to mobile security vendor of the 4th Bluebox said they recently discovered a major weakness on Android, will allow a hacker to control your past four years offering any Android phone, to browse your data, get your password to control your phone on any of the features, including sending text messages, phone calls, or turn on the camera.

According to Chief Technology Officer Jeff Forristal Bluebox argument, this flaw could allow hackers encrypted without destroying APP visa cases, modifying the APK code, any program can be turned into a malicious Trojan, and will not cause app store, mobile abnormalities and the user can not be noticed.

▼ been cracked HTC phone screenshot.


Bluebox indicates that this loophole exists since the beginning of Android 1.6, but also can affect the launch of the past four years all Android phones, nearly 900 million devices, and according to the different types of programs, hackers could exploit this vulnerability to do anything on Android phones, including steal data or create mobile botnets.

If the device manufacturer inadvertently exploit this vulnerability arising Trojans installed in the factory to the system, then this feature will be doubled Trojans can be obtained App Android system and full access to all that it can not only read phone data on (newsletters, e-mail, files, etc.), the interception of all number and password, you can easily control any function on the phone (call, send a text message, open the camera and recording), you can even use forever connection Always on the move (it is difficult to detect) mobile network characteristics, the use of mobile phones to create an infected zombie botnet.

Bluebox technology officer said they will be 2013 U.S. Black Hat hacker conference ( USB 2013 Black Hat Talk ) reveal more information about this vulnerability information, including how to detect programs that take advantage of this loophole, and Trojans how it works.



Tags: , ,

In: Technology & Gadgets Asked By: [15464 Red Star Level]

Answer this Question

You must be Logged In to post an Answer.

Not a member yet? Sign Up Now »