[Android Security 2015] New Android vulnerabilities

Posted: September 11, 2015 in IT Security News
Tags: , ,


Android SecurityNew Android Critical Vulnerabilities

1. CVE-2015-1538 Exploit for Android is Now Available for Testing Purposes

This exploit has several caveats. First, it is not a generic exploit. Zimperium Team only tested it to work on a single device model. Zimperium Team tested this exploit on a Nexus running Android 4.0.4. Also, due to variances in heap layout, this is not a 100% reliable exploit by itself.

Zimperium Team were able achieve 100% reliability when delivered through an attack vector that allowed multiple attempts. Finally, this vulnerability was one of several that was neutered by GCC 5.0’s ‘new[]’ integer overflow mitigation present on Android 5.0 and later.

See more at: https://blog.zimperium.com/…


2. Sophisticated CAPTCHA-Bypassing Android Malware Found in Google Play

New Android malware has been discovered in a series of Android applications and games in Google Play, capable of covertly subscribing users to premium-rate services, a recent report from Bitdefender reveals.

The Trojan has the ability to bypass CAPCHA authentication systems through redirecting requests to an online image-to-text recognition service called Antigate.com. The online service relies on actual individuals to recognize the CAPPCHA images and requests are returned to the malware almost immediately, allowing it to proceed with the covert subscription process.

See more at: http://www.hotforsecurity.com/blog/…


3. The first known Android lock-screen-type ransomware that sets the phone’s PIN lock

ESET, the security company that discovered the malware, says that the hack has affected hundreds of users thus far. The company explains that the only way to combat it is to perform a hard reset, restoring your phone to its factory settings. That means you would lose anything on your phone, including your photos and contacts, that you hadn’t already backed up to the cloud.

Unfortunately, malware writers have stepped up their game, and with the new Android ransom-lockers, detected by ESET as Android/Lockerpin.A, users have no effective way of regaining access to their device without root privileges or without some other form of security management solution installed, apart from a factory reset that would also delete all their data.

See more at: http://www.welivesecurity.com/…


 

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s