The vulnerability can be exploited by a hacker, who could send malicious code disguised as a MMS video message to a potential victim's mobile device. Once the potential victim’s mobile device receives the message, the malicious code will execute, which could allow the hacker to infect the victim’s mobile device with a malicious program called a Trojan horse. Once the mobile device is infected, the hacker will be able to take control of the victim’s mobile device remotely from anywhere around the world without the victim knowing.
Once the hacker has taken control of the victim’s mobile device, he/she will be able to access microphone, camera and other functionalities of the mobile device, which the hacker will use to spy on the victim and steal the victim’s sensitive information. He/she will then use the information to rip off the victim.
The vulnerability is extremely dangerous because it does not require that the victim take any action for his/her mobile device to get infected. Once the victim’s mobile device receives the malicious MMS video message (without opening it), it will get infected and the hacker can delete the malicious MMS message before the victim notices it.
Joshua Drake, vice president of research and exploitation at the mobile security firm Zimperium zLabs said: “This vulnerability can be triggered while you sleep. Before you wake up, the attacker will remove any signs of the device being compromised and you will continue your day as usual with an infected phone.”
Google has released a patch for the vulnerability to manufacturers, but most have not yet pushed that update to their customers.users of Android devices are urged to accept Android updates as soon as they are offered by their manufacturers or carriers.
Check the comment section below for additional information, share what you know, or ask a question about this article by leaving a comment below. And, to quickly find answers to your questions, use our search
Note: Some of the information in samples on this website may have been impersonated or spoofed.
Comments, Questions, Answers, or Reviews
To protect your privacy, please do not post or remove sensitive information in or from your comments, questions, or reviews. NB: We will use your IP address to display your approximate location to other users when you make a post. That location is not enough to find you.
Your comment, answer, or review will be set as anonymous because you are not signed in. An anonymous comment, answer, or review cannot be edited or deleted, therefore, review it carefully before posting. Sign-in.
Write Your Comment, Question, Answer, or Review