Latest Androids have 'god mode' hack hole, thanks to Qualcomm

Nexus users move right along. Everyone else, read on and hope your mobe-maker fixes it


Four Qualcomm vulnerabilities grant malware writers total access to modern Android smartphones. Yes, yes, nine hundred meellion "potential" users, if you're counting.

Attackers can write malicious apps that, when installed, exploit the software flaws to gain extra privileges on Android Marshmallow and earlier versions of Google's mobile OS, allowing the code to gain control of handhelds.

The good news is that three of the four holes, disclosed at the DEF CON security conference, have been patched. A fix for the remaining flaw will land shortly.

Owners of pure Android Nexus handsets are already patched, provided they accepted the over the air updates, but those operating other models will need to hope their largely unmotivated manufacturers will cop the cost of integrating the fixes into their own custom Android ROMs.

The Nexus 5X, 6 and 6P are affected, along with the Samsung S7 and S7 Edge, HTC 10 and One M9, and Blackphone 1 and 2.

Researchers say the attack can be woven into an app that would execute without requiring users to approve Android access permission checks.

CheckPoint's flaw checker

"An attacker can exploit these vulnerabilities using a malicious app," Check Point researchers say.

"Such an app would require no special permissions to take advantage of these vulnerabilities, alleviating any suspicion users may have when installing."

The flaws affect Qualcomm chip software drivers installed at the point of manufacture, meaning updates must be pushed from the hardware company to phone vendors before it can flow to users.

"This situation highlights the inherent risks in the Android security model," the team says.

"Critical security updates must pass through the entire supply chain before they can be made available to end users."

The many millions of devices affected by various Android vulnerabilities is an often over-simplified metric; exploits usually need to be customised for different makes, models, and Android operating system versions in order for compromise to occur, and one simple app is not enough to own an entire ecosystem.

Square mobile security hacker Dino Dai Zovi told Black Hat Asia earlier this year that Android's diverse and oft un-patched ecosystem is a strength, not a weakness.

"The ecosystem is such that it makes exploitation more difficult because it needs to be designed for [each device],” Dai Zovi said at the time. “[Android] security features like verify apps, and Google Play store application checks makes it a much safer system.”

Checkpoint's attack dubbed Quadrooter could, with some skill applied, be baked into legitimate apps hosted on the Google Play store. Lazy hackers will gain less victims by circulating it as a third party apk app installation file which requires users to flick a switch to intentionally allow installation of external apps.

Users can check if their phones are vulnerable using Check Point's free app.

Qualcomm has a 65 per cent share in LTE chipsets. ®

Similar topics


Other stories you might like

  • Research finds consumer-grade IoT devices showing up... on corporate networks

    Considering the slack security of such kit, it's a perfect storm

    Increasing numbers of "non-business" Internet of Things devices are showing up inside corporate networks, Palo Alto Networks has warned, saying that smart lightbulbs and internet-connected pet feeders may not feature in organisations' threat models.

    According to Greg Day, VP and CSO EMEA of the US-based enterprise networking firm: "When you consider that the security controls in consumer IoT devices are minimal, so as not to increase the price, the lack of visibility coupled with increased remote working could lead to serious cybersecurity incidents."

    The company surveyed 1,900 IT decision-makers across 18 countries including the UK, US, Germany, the Netherlands and Australia, finding that just over three quarters (78 per cent) of them reported an increase in non-business IoT devices connected to their org's networks.

    Continue reading
  • Huawei appears to have quenched its thirst for power in favour of more efficient 5G

    Never mind the performance, man, think of the planet

    MBB Forum 2021 The "G" in 5G stands for Green, if the hours of keynotes at the Mobile Broadband Forum in Dubai are to be believed.

    Run by Huawei, the forum was a mixture of in-person event and talking heads over occasionally grainy video and kicked off with an admission by Ken Hu, rotating chairman of the Shenzhen-based electronics giant, that the adoption of 5G – with its promise of faster speeds, higher bandwidth and lower latency – was still quite low for some applications.

    Despite the dream five years ago, that the tech would link up everything, "we have not connected all things," Hu said.

    Continue reading
  • What is self-learning AI and how does it tackle ransomware?

    Darktrace: Why you need defence that operates at machine speed

    Sponsored There used to be two certainties in life - death and taxes - but thanks to online crooks around the world, there's a third: ransomware. This attack mechanism continues to gain traction because of its phenomenal success. Despite admonishments from governments, victims continue to pay up using low-friction cryptocurrency channels, emboldening criminal groups even further.

    Darktrace, the AI-powered security company that went public this spring, aims to stop the spread of ransomware by preventing its customers from becoming victims at all. To do that, they need a defence mechanism that operates at machine speed, explains its director of threat hunting Max Heinemeyer.

    According to Darktrace's 2021 Ransomware Threat Report [PDF], ransomware attacks are on the rise. It warns that businesses will experience these attacks every 11 seconds in 2021, up from 40 seconds in 2016.

    Continue reading

Biting the hand that feeds IT © 1998–2021