Security researchers have uncovered a vulnerability in Android smartphones that could allow an attacker to secretly take photos and record videos without any permissions being granted.
And the exploit works even if the phone is locked or the screen turned off, or even during an actual call – all without the knowledge of the user,
The researchers at Checkmarx discovered a way to circumvent the permission policy which normally provides a layer of protection for Android users from apps doing more than they should.
One of the scary aspects of this is that if a remote attacker managed to use the exploit to steal photos from your Android phone they could then examine the EXIF metadata embedded within the photos to locate your physical location.
As the researchers explained, central to the exploit was a vulnerability found in the camera apps pre-installed on millions of Android devices, known as CVE-2019-2234.
As a proof of concept demonstration, the researchers created a malicious weather app which did not request any special permissions beyond the basic storage access, and thus would be unlikely to appear suspicious or threatening to even the most cautious users.
When the app is run it creates a persistent connection back to a remote command-and-control (C&C) server, from where an attacker can send it instructions. According to the researchers, even closing the app does not terminate the connection.
But with their rogue app in place, the researchers were able to:
A video published by the research team demonstrates them successfully exploiting the security hole on Google Pixel 2 XL and Pixel 3 devices.
The researchers responsibly disclosed details of the vulnerabilities to Google, and details of the high severity flaw were not made public until both Google and Samsung had released fixes earlier this year.
However, it seems very likely that there are still Android phones out there which remain unpatched, and do not have the latest security updates installed.
tags
Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s.
View all postsSeptember 06, 2024
September 02, 2024
August 13, 2024
July 25, 2024