Monday, April 28, 2025
HomeAndroidDangerous Function in UC Browser Lets Hackers to Hijack Millions Of Android...

Dangerous Function in UC Browser Lets Hackers to Hijack Millions Of Android Users via MITM Attacks

Published on

SIEM as a Service

Follow Us on Google News

Potentially dangerous future in UC browser puts Hundreds of millions of Android users under high risk that allows hackers to hijack Android devices via Man-in-the-Middle Attacks.

A hidden future that uncovered in UC browsers let attackers download and run untested code in any of the Android devices and also its bypass the Google Play servers by downloading the auxiliary software modules.

UC browsers is a most papular browser in Android platform with more than 500 million downloads from the Google Play store alone, and this new dangerous future let all the downloaded users vulnerable to MITM attacks.

- Advertisement - Google News

This untrusted UC browser function completely violates the Google play store policies, and it allows to download the malicious code to Android devices.

Based on the strict Google Play Store policy, any applications downloaded from Google Play and any software components from third-party sources cannot change their own code.

In this case, researchers from Dr.Web tested the application by download the executable Linux library from the remote server (not malicious) into the browser and launched it for execution, thus, the browser successfully executes the code.

Man-in-the-Middle Attack with UC Browser

UC browser makes a request to the management server and receives the link whenever it needs to download a new plug-in.

In this case, UC browser request to the server to establishes the communication over untrusted HTTP protocol instead of encrypted HTTPS which leads to attackers directly perform a Man-in-the-MIddle Attack.

According to Dr.Web research, Attackers can replace incoming commands by pointing to the address of a malicious resource. As a result, the program downloads new modules from it, and not from the present managing server. Since UC Browser works with unsigned plugins, it will launch malicious modules without any verification.

If this MITM attack successfully obtained by the attacker, then it leads to spreading malicious plug-ins through UC Browser that can perform a wide variety of actions including to steal usernames, passwords, information on bank cards and other personal data.

This Dangerous function uncovered in both UC Browser and UC Mini, But the MITM attack will not work in the UC Browser Mini.

This serious flow already reported to Google, but still, both Browsers are available to download with this dangerous function. Users urged to un-install now until they fix this issue.

Learn: Complete Network Attacks and Security


You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

SAP NetWeaver 0-Day Flaw Actively Exploited to Deploy Webshells

SAP disclosed a critical zero-day vulnerability, identified as CVE-2025-31324, in its NetWeaver Visual Composer component. This...

Windows 11 25H2 Expected to Launch with Minor Changes

Microsoft is quietly preparing the next update to its flagship operating system, Windows 11 25H2,...

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one...

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

SAP NetWeaver 0-Day Flaw Actively Exploited to Deploy Webshells

SAP disclosed a critical zero-day vulnerability, identified as CVE-2025-31324, in its NetWeaver Visual Composer component. This...

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one...

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...