Monday, June 24, 2024

Millions of Smartphones are Vulnerable to inject Backdoor via open Ports

[jpshare]A Recent Research Revealed by University of Michigan  Research team, Open Ports Create Backdoors in Millions of Smartphones .This Vulnerability Existing in Low secured Server Software which used to Serve for Remote Clients . 

Many of Smart phones are using Open ports support  in server and mostly it serves in Traditional servers which communication endpoint for accepting incoming connections.

According to the Researchers From University of Michigan,  perform an open port usage analysis on 24K popular Android apps from Google Play ,and successfully classify 99% of the usage 5 category which including data sharing, proxy, remote execution, VoIP call,and PhoneGap by  Using OPAnalyzer tool which Developed by they own

These open port Families, if its not much Protected  most of the ports are directly enable a number of serious remote exploits .

Most popular usage, data sharing, over half of the paths can be easily triggered by any remote attacker, and in some usage categories such as proxy, over 80% of the paths are not protected.

According to the output of the OPAnalyzer  Tool, they uncover 410 vulnerable applications with 956 potential exploits in total, and manually confirm 57 vulnerable apps including popular ones with 10 to 50 million downloads on the official market, and also an app that is pre-installed on some device models.

Researchers Reported, “If one of these vulnerable open port apps is installed, your phone can be fully taken control of by attackers.”

Design Pattern of Open Port Apps:

Android application that opens a port for Accepting remote Command to push notifications on the client’s Device. The application initially makes a ServerSocket to Listen in on a TCP port.

Once a Victims associates with the port, the application peruses the remote contribution from the attachment and serves the demand.

In this illustration, the application checks whether the remote info contains the “PUSH” Command, and assuming this is the case, it begins pushing the messages contained in the remote contribution to Device notice bar.

 An app’s open ports to steal photos with on-device malware:

The incoming connection notification, which pops up a window when a new host connects to the open port and displays the IP address of the host And the request is not served until user explicitly accepts the client by clicking the “allow” button,  researchers said

Here the Demo Videos tested by the Researcher for steal photos with on-device Malware.

Steal photos via a network attack:

Victims behind NAT or using private WiFi networks, attackers sharing the same local network can use ARP scanning  to find reachable smartphone IP addresses at first, and then launch targeted port scanning to discover vulnerable open ports .

 Force to SMS to a premium service:

This video Demonstrate How Attacker Forcing victims to send a Premium rate  SMS with one Click.

These vulnerabilities can be exploited to cause highly-severe damage such as remotely stealing contacts,photos, and even security credentials, and also performing sensitive actions such as malware installation and malicious code execution, Researchers said.

Also Read:

Mass Scan Revealed More Than 30000 Windows Computers Infected by NSA backdoor DoublePulsar

A new IoT Botnet is Spreading over HTTP Port 81 and Exploit the Vulnerability in Security Cameras

Smartphone Sensors can Spying your Mobile and Reveal PINs and Passwords by Tracking your Motion

Website

Latest articles

Threat Actor Claiming a 0-day in Linux LPE Via GRUB bootloader

A new threat actor has emerged, claiming a zero-day vulnerability in the Linux GRUB...

LockBit Ransomware Group Claims Hack of US Federal Reserve

The notorious LockBit ransomware group has claimed responsibility for hacking the U.S. Federal Reserve,...

Microsoft Power BI Vulnerability Let Attackers Access Organizations Sensitive Data

A vulnerability in Microsoft Power BI allows unauthorized users to access sensitive data underlying...

Consulting Companies to Pay $11 Million Failing Cybersecurity Requirements

Two consulting companies, Guidehouse Inc. and Nan McKay and Associates, have agreed to pay...

New RAT Malware SneakyChef & SugarGhost Attack Windows Systems

Talos Intelligence has uncovered a sophisticated cyber campaign attributed to the threat actor SneakyChef....

Chinese Winnti Group Intensifies Financially Motivated Attacks

Hackers are increasingly executing financially motivated attacks and all due to the lucrative potential...

PrestaShop Website Under Injection Attack Via Facebook Module

A critical vulnerability has been discovered in the "Facebook" module (pkfacebook) from Promokit.eu for...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles