Alerts left arrow right arrow   

Google Android Vulnerability Called Stagefright Could Affect 950 Million Mobile Devices

Comments  +
Google Android Vulnerability Called Stagefright Could Affect 950 Million Mobile Devices

A very dangerous vulnerability or exploit in Google’s Android operating system could allow hackers to access an Android device remotely without the user ever knowing it was compromised, may approximately affect 950 million devices worldwide according to researcher estimates. The vulnerability, which was found in the media library called Stagefright, used to process media files in the Android operating system, was discovered by researchers at Zimperium Mobile Security.

The vulnerability can be exploited by a hacker, who could send malicious code disguised as a MMS video message to a potential victim's mobile device. Once the potential victim’s mobile device receives the message, the malicious code will execute, which could allow the hacker to infect the victim’s mobile device with a malicious program called a Trojan horse. Once the mobile device is infected, the hacker will be able to take control of the victim’s mobile device remotely from anywhere around the world without the victim knowing.

Once the hacker has taken control of the victim’s mobile device, he/she will be able to access microphone, camera and other functionalities of the mobile device, which the hacker will use to spy on the victim and steal the victim’s sensitive information. He/she will then use the information to rip off the victim.

The vulnerability is extremely dangerous because it does not require that the victim take any action for his/her mobile device to get infected. Once the victim’s mobile device receives the malicious MMS video message (without opening it), it will get infected and the hacker can delete the malicious MMS message before the victim notices it.

Joshua Drake, vice president of research and exploitation at the mobile security firm Zimperium zLabs said: “This vulnerability can be triggered while you sleep. Before you wake up, the attacker will remove any signs of the device being compromised and you will continue your day as usual with an infected phone.”

Google has released a patch for the vulnerability to manufacturers, but most have not yet pushed that update to their customers.users of Android devices are urged to accept Android updates as soon as they are offered by their manufacturers or carriers.

Please share with us what you know or ask a question about this article by leaving a comment below. Also, check the comment section below for additional information, if there is any.

Remember to forward malicious or phishing email messages to us at the following email address:

Comments, Questions and Reviews

Comment(Total: 0)

Write a Comment, Review, or ask a Question or scroll down to view comments, reviews and questions made by others.

Would you recommend this article to a friend or family member?
Yes (1) No (0)   

Submit Comment Write Your Comment, Question or Review

Write your comment, question or review in the box below to share what you know or to get answers. Please revisit after an hour or more to view reponses or answers to you questions.
All comments, questions or reviews will be examined for derogatory or indecent statements, spam or malicous code, before they are posted on this website.

More for you:
Warning! JavaScript is turned off or disabled! Some features on this website will not work.