Tuesday, November 26, 2024
HomeBackdoorMillions of Smartphones are Vulnerable to inject Backdoor via open Ports

Millions of Smartphones are Vulnerable to inject Backdoor via open Ports

Published on

[jpshare]A Recent Research Revealed by University of Michigan  Research team, Open Ports Create Backdoors in Millions of Smartphones .This Vulnerability Existing in Low secured Server Software which used to Serve for Remote Clients . 

Many of Smart phones are using Open ports support  in server and mostly it serves in Traditional servers which communication endpoint for accepting incoming connections.

- Advertisement - SIEM as a Service
According to the Researchers From University of Michigan,  perform an open port usage analysis on 24K popular Android apps from Google Play ,and successfully classify 99% of the usage 5 category which including data sharing, proxy, remote execution, VoIP call,and PhoneGap by  Using OPAnalyzer tool which Developed by they own

These open port Families, if its not much Protected  most of the ports are directly enable a number of serious remote exploits .

Most popular usage, data sharing, over half of the paths can be easily triggered by any remote attacker, and in some usage categories such as proxy, over 80% of the paths are not protected.

According to the output of the OPAnalyzer  Tool, they uncover 410 vulnerable applications with 956 potential exploits in total, and manually confirm 57 vulnerable apps including popular ones with 10 to 50 million downloads on the official market, and also an app that is pre-installed on some device models.

Researchers Reported, “If one of these vulnerable open port apps is installed, your phone can be fully taken control of by attackers.”

Design Pattern of Open Port Apps:

Android application that opens a port for Accepting remote Command to push notifications on the client’s Device. The application initially makes a ServerSocket to Listen in on a TCP port.

Once a Victims associates with the port, the application peruses the remote contribution from the attachment and serves the demand.

In this illustration, the application checks whether the remote info contains the “PUSH” Command, and assuming this is the case, it begins pushing the messages contained in the remote contribution to Device notice bar.

 An app’s open ports to steal photos with on-device malware:

The incoming connection notification, which pops up a window when a new host connects to the open port and displays the IP address of the host And the request is not served until user explicitly accepts the client by clicking the “allow” button,  researchers said

Here the Demo Videos tested by the Researcher for steal photos with on-device Malware.

Steal photos via a network attack:

Victims behind NAT or using private WiFi networks, attackers sharing the same local network can use ARP scanning  to find reachable smartphone IP addresses at first, and then launch targeted port scanning to discover vulnerable open ports .

 Force to SMS to a premium service:

This video Demonstrate How Attacker Forcing victims to send a Premium rate  SMS with one Click.

These vulnerabilities can be exploited to cause highly-severe damage such as remotely stealing contacts,photos, and even security credentials, and also performing sensitive actions such as malware installation and malicious code execution, Researchers said.

Also Read:

Mass Scan Revealed More Than 30000 Windows Computers Infected by NSA backdoor DoublePulsar

A new IoT Botnet is Spreading over HTTP Port 81 and Exploit the Vulnerability in Security Cameras

Smartphone Sensors can Spying your Mobile and Reveal PINs and Passwords by Tracking your Motion

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Blue Yonder Ransomware Attack Impacts Starbucks & Multiple Supermarkets

A ransomware attack on Blue Yonder, a leading supply chain management software provider, has...

Dell Wyse Management Suite Vulnerabilities Let Attackers Exploit Affected Systems Remotely

Dell Technologies has released a security update for its Wyse Management Suite (WMS) to...

CISA Details Red Team Assessment Including TTPs & Network Defense

The Cybersecurity and Infrastructure Security Agency (CISA) recently detailed findings from a Red Team...

IBM Workload Scheduler Vulnerability Stores User Credentials in Plain Text

IBM has issued a security bulletin warning customers about a vulnerability in its Workload...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Rekoobe Backdoor In Open Directories Possibly Attacking TradingView Users

APT31, using the Rekoobe backdoor, has been observed targeting TradingView, a popular financial platform,...

Researchers Backdoored Azure Automation Account Packages And Runtime Environments

Runtime environments offer a flexible way to customize Automation Account Runbooks with specific packages....

Hackers Using Supershell Malware To Attack Linux SSH Servers

Researchers identified an attack campaign targeting poorly secured Linux SSH servers, where the attack...