Stories
Slash Boxes
Comments

SoylentNews is people

posted by janrinok on Friday June 19 2015, @09:02PM   Printer-friendly
from the don't-bother-calling-me-I-can-already-hear-you dept.

As many as 600 million Samsung phones may be vulnerable to attacks that allow hackers to surreptitiously monitor the camera and microphone, read incoming and outgoing text messages, and install malicious apps, a security researcher said.

The vulnerability is in the update mechanism for a Samsung-customized version of SwiftKey, available on the Samsung Galaxy S6, S5, and several other Galaxy models. When downloading updates, the Samsung devices don't encrypt the executable file, making it possible for attackers in a position to modify upstream traffic—such as those on the same Wi-Fi network—to replace the legitimate file with a malicious payload. The exploit was demonstrated Tuesday at the Blackhat security conference in London by Ryan Welton, a researcher with security firm NowSecure. A video of his exploit is here.

Thus will hackers be treated to front row seats to 600 million pockets full of lint.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by CortoMaltese on Friday June 19 2015, @09:07PM

    by CortoMaltese (5244) on Friday June 19 2015, @09:07PM (#198428) Journal

    This exploit while useful for three letter agencies and people who have an interest in spying you personally it would be hard to deploy on a wide scale, which brings me to the point that even though it will probably be patched I never liked swift key because it "phones home" with whatever you are writing (for better "writing recognition" I'm sure) and it needs an inordinate amount of permissions.

    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 4, Insightful) by c0lo on Friday June 19 2015, @09:18PM

    by c0lo (156) Subscriber Badge on Friday June 19 2015, @09:18PM (#198433) Journal

    This exploit while useful for three letter agencies and people who have an interest in spying you personally it would be hard to deploy on a wide scale

    You make it sound like "oh, don't worry, only NSA may exploit it"

    would be hard to deploy on a wide scale

    If a hacker does it by using a coffee shop free-WiFi and then steals your CC and Internet-banking details, would you be happy that it it only happens to a small number of people?

    --
    https://www.youtube.com/watch?v=aoFiw2jMy-0 https://soylentnews.org/~MichaelDavidCrawford
  • (Score: 2) by Marand on Friday June 19 2015, @10:11PM

    by Marand (1081) on Friday June 19 2015, @10:11PM (#198458) Journal

    I never liked swift key because it "phones home" with whatever you are writing (for better "writing recognition" I'm sure) and it needs an inordinate amount of permissions.

    This is why I use Multiling O Keyboard [google.com] instead. Practically no permissions used, no internet at all, and it's extremely configurable. You can completely redefine the layout and switch layouts at will, plus resize it and tweak almost anything it can do.

    The logic used for key swiping isn't perfect, but it works well enough, and I'd rather have the privacy and configurability anyway.

    • (Score: 2) by kaszz on Friday June 19 2015, @10:38PM

      by kaszz (4211) on Friday June 19 2015, @10:38PM (#198473) Journal

      But how do you get Multiling O Keyboard onto the phone if Swiftkey is supposedly "uninstallable" ..?

      (Swiftkey picture [androidcommunity.com], Multiling picture [androidpit.info])

      • (Score: 0) by Anonymous Coward on Saturday June 20 2015, @03:17PM

        by Anonymous Coward on Saturday June 20 2015, @03:17PM (#198706)

        Wait, are "Swiftkey" and "Swype" the same thing? Or was Swype replaced by Swiftkey on newer phones?