Nearly All Android Devices Vulnerable to Rooting Attack
A Linux flaw used to root Android phones can also be used to install malware, leaving devices such as the Samsung Galaxy S5 vulnerable.
A flaw in the Android operating system may leave many Android phones and tablets vulnerable to attack, including the Samsung Galaxy S5 and Google's own Nexus 5. It's the same flaw that was recently discovered in the Linux kernel, on which Android is based — and a just-released Android "rooting" tool that uses the flaw could make the problem even worse.
Exploiting the flaw on an Android device yields root permissions, or total control of the system. That's not itself malicious, but the exploit could also let attackers remotely download malware, copy the device owner's files and other personal data, disable the device's security apps and create a backdoor for more attacks, according to San Francisco-based security firm Lacoon Mobile Security.
MORE: 30 Best Apps for Rooted Android Phones
The Linux kernel flaw, designated CVE-2014-3153 by the information-security community, was discovered June 7 by a pseudonymous teenage hacker called Pinkie Pie. Four days later, phone hacker George Hotz, who at age 17 became the first to "unlock" an iPhone, released an Android rooting tool called TowelRoot that uses the kernel flaw.
Hotz has made his tool available for download at TowelRoot.com, and said there that the tool should work on all versions of Android made before June 3. (In an mobile developers' forum, Hotz admitted some Motorola and HTC phones seem to be immune.) In a Lacoon company blog post Monday (June 16), Lacoon vice president Ohad Bobrov warned that the bug used in TowelRoot could also be used for purposes far more nefarious than rooting one's own phone.
The Linux kernel bug affects all Linux kernels up to 3.14.5 and is present in Android 4.4 KitKat and earlier, which means most commercial Android phones are affected. To exploit the bug, attackers would need to trick device owners to install a specially crafted malicious app of the sort commonly found in "off-road" Android app markets.
To protect against this, users should only install Android applications from the Google Play Store and make sure their devices cannot accept software from "unknown sources." A good Android security app might also be able to detect this exploit code in downloaded software.
Sign up to get the BEST of Tom's Guide direct to your inbox.
Get instant access to breaking news, the hottest reviews, great deals and helpful tips.
Samsung's compartmentalization feature Samsung Knox cannot stop apps with this exploit from installing, though Knox will issue an alert, Lacoon CEO Michael Shaulov told security blog Threatpost.
Email jscharr@techmedianetwork.com or follow her @JillScharr and Google+. Follow us @TomsGuide, on Facebook and on Google+.
Jill Scharr is a creative writer and narrative designer in the videogame industry. She's currently Project Lead Writer at the games studio Harebrained Schemes, and has also worked at Bungie. Prior to that she worked as a Staff Writer for Tom's Guide, covering video games, online security, 3D printing and tech innovation among many subjects.
-
dstarr3 So, basically, this article is telling us that rooting is dangerous? More common sense than news.Reply -
coolitic 2 articles by 2 captain obvious' in a row.Reply
The poor quality of tomshardware articles continue to amaze me. -
jakjawagon To protect against this, users should only install Android applications from the Google Play Store and make sure their devices cannot accept software from "unknown sources."
There are legit Android app stores other than Google play. Amazon and Humble Bundle for example. Android users should just use the same precautions as if they were installing software on a Windows PC. Only install software from trusted sources, yes, but Google Play is far from the only trusted source. -
okibrian So, basically, this article is telling us that rooting is dangerous? More common sense than news.
They are saying malicious code could easily be embedded into software to exploit this vulnerability. That is why they are telling you to only download apps from approved app stores. You will reduce your risk that way, but the exploit still exists. -
okibrian And here's another log to add onto the fire:Reply
http://www.cnet.com/news/thousands-of-secret-keys-found-in-android-apps/
-
WINTERLORD great, do you think there will be an update to fix this? or would you need to wait till a new android version and buy a new deviceReply -
house70 Any OS can be exploited. Just like iOS is jailbroken, Android can be rooted, etc. The exploit per-se is not dangerous, just some applications; the same old common sense when deciding to allow an app to install still applies.Reply
It's amazing how every single article like this ends with the same conclusion: leave your default phone settings alone if you don't know exactly what you're doing, yet people still react as if the end of the mobile world is coming. The apocalyptic tone of the title doesn't help.