The Android community needs to be alert as more than 900 million android based smartphone have got affected badly by Quadrooter flaw. Many top smartphones which are backed by Qualcomm processors have become the main prey of Quadrooter. The Quadrooter accompanies 4 different vulnerabilities. Each of these vulnerabilities helps hackers to get control on the smartphones.
If Quadrooter is being exploited, the attacker may get full control on the device and get unauthorised access to critical information may it be personal or enterprise. This access may give the attacker a power like GPS tracking, keylogging or video or audio recording, the Check Point post suggests.
Using any malicious app, a hacker can take advantage of all of 4 vulnerabilities of Quadrooter. This kind of app would not need any specific permission and thus, alleviates the suspicious users to get install the app on devices.
Quadrooter Affected Many Android Device’ Drivers:
As per the blog post in Check Point, the vulnerabilities of Quadrooter has affected the drivers of smartphones that control the communication in different components of chipset. As the drivers are often pre-installed during manufacturing level, one can get it fixed only from OEMs or from software patch issued by the carriers.
It is recommended to smartphone users by Check Point to get the latest updates of Android downloaded to their devices and do not let apk files side-loading. It also recommends to read the permission requests very cautiously during installation process of multiple apps and so on.
Android Smartphone Models Affected By Quadrooter So Far:
Many advanced smartphones have heard to be affected by the vulnerabilities of Quadrooter. These affected smartphone models include:
- Samsung Galaxy S7
- Galaxy S7 Edge
- Google Nexus 6
- Google Nexus 6P
- Google Nexus 5X
- OnePlus One
- OnePlus 2
- OnePlus 3
In May this year, it was reported that millions of smartphones which are backed by Qualcomm processor can have a glitch which hackers can exploit to have unauthorised access to smartphones.
No comments:
Post a Comment