icon bookmark-bicon bookmarkicon cameraicon checkicon chevron downicon chevron lefticon chevron righticon chevron upicon closeicon v-compressicon downloadicon editicon v-expandicon fbicon fileicon filtericon flag ruicon full chevron downicon full chevron lefticon full chevron righticon full chevron upicon gpicon insicon mailicon moveicon-musicicon mutedicon nomutedicon okicon v-pauseicon v-playicon searchicon shareicon sign inicon sign upicon stepbackicon stepforicon swipe downicon tagicon tagsicon tgicon trashicon twicon vkicon yticon wticon fm
2 Oct, 2015 13:48

Infected tune: Androids can be hacked through opening song or video, experts say

Infected tune: Androids can be hacked through opening song or video, experts say

A billion Android devices across the world are vulnerable to a bug that may be exploited to infect your smartphone or tablet when you try to preview a song or video on the internet, cybersecurity experts warn.

“Meet Stagefright 2.0, a set of two vulnerabilities that manifest when processing specially crafted MP3 audio or MP4 video files,”says a report from Zimperium, a cybersecurity company specializing in mobile devices.

The first Stagefright exploit was found by Zimperium in April and was publicly announced in July this year. It involved an Android multimedia engine library known as libstagefright, which could be made to execute malicious code via an MMS message. A bug fix was rolled out two days ago after it was reported to Google by the cybersecurity company.

READ MORE: Giant security flaw makes 950 million Android phones vulnerable to texting hack

The new exploit affects the same library, but does so via a malicious MP3 or MP4 file played on a webpage. According to Zimperium, the bug is capable of affecting “almost every Android device since version 1.0 released in 2008.”

The risk lies “in the processing of metadata within the files,” say the experts so you can ‘catch the bug’ when you are playing a song or a video.

“Since the primary attack vector of MMS has been removed in newer versions of Google’s Hangouts and Messenger apps, the likely attack vector would be via the Web browser. An attacker would try to convince an unsuspecting user to visit a URL pointing at an attacker controlled Web site.”

READ MORE: Hackers can steal your fingerprint data from Android devices 

Flaws in Android devices, by far the most dominant smartphone operating system in the world, are frequently exposed.

In July, Zimperium uncovered a bug that allows devices to be hacked by simply texting them. The victims don’t even need to be tricked into downloading or opening a bad file – attackers only need to send them a text message for the malware to take hold.

In August, cybersecurity firm FireEye Inc. said that Android devices equipped with a fingerprint sensor are vulnerable to hacker attacks. They can not only bypass the biometric authentication, but even steal the fingerprint data itself, security researchers told a hacker conference.

Podcasts
0:00
28:7
0:00
28:37