Categories: BackdoorPoC

Millions of Smartphones are Vulnerable to inject Backdoor via open Ports

[jpshare]A Recent Research Revealed by University of Michigan  Research team, Open Ports Create Backdoors in Millions of Smartphones .This Vulnerability Existing in Low secured Server Software which used to Serve for Remote Clients . 

Many of Smart phones are using Open ports support  in server and mostly it serves in Traditional servers which communication endpoint for accepting incoming connections.

According to the Researchers From University of Michigan,  perform an open port usage analysis on 24K popular Android apps from Google Play ,and successfully classify 99% of the usage 5 category which including data sharing, proxy, remote execution, VoIP call,and PhoneGap by  Using OPAnalyzer tool which Developed by they own

These open port Families, if its not much Protected  most of the ports are directly enable a number of serious remote exploits .

Most popular usage, data sharing, over half of the paths can be easily triggered by any remote attacker, and in some usage categories such as proxy, over 80% of the paths are not protected.

According to the output of the OPAnalyzer  Tool, they uncover 410 vulnerable applications with 956 potential exploits in total, and manually confirm 57 vulnerable apps including popular ones with 10 to 50 million downloads on the official market, and also an app that is pre-installed on some device models.

Researchers Reported, “If one of these vulnerable open port apps is installed, your phone can be fully taken control of by attackers.”

Design Pattern of Open Port Apps:

Android application that opens a port for Accepting remote Command to push notifications on the client’s Device. The application initially makes a ServerSocket to Listen in on a TCP port.

Once a Victims associates with the port, the application peruses the remote contribution from the attachment and serves the demand.

In this illustration, the application checks whether the remote info contains the “PUSH” Command, and assuming this is the case, it begins pushing the messages contained in the remote contribution to Device notice bar.

An app’s open ports to steal photos with on-device malware:

The incoming connection notification, which pops up a window when a new host connects to the open port and displays the IP address of the host And the request is not served until user explicitly accepts the client by clicking the “allow” button,  researchers said

Here the Demo Videos tested by the Researcher for steal photos with on-device Malware.

Steal photos via a network attack:

Victims behind NAT or using private WiFi networks, attackers sharing the same local network can use ARP scanning  to find reachable smartphone IP addresses at first, and then launch targeted port scanning to discover vulnerable open ports .

Force to SMS to a premium service:

This video Demonstrate How Attacker Forcing victims to send a Premium rate  SMS with one Click.

These vulnerabilities can be exploited to cause highly-severe damage such as remotely stealing contacts,photos, and even security credentials, and also performing sensitive actions such as malware installation and malicious code execution, Researchers said.

Also Read:

Mass Scan Revealed More Than 30000 Windows Computers Infected by NSA backdoor DoublePulsar

A new IoT Botnet is Spreading over HTTP Port 81 and Exploit the Vulnerability in Security Cameras

Smartphone Sensors can Spying your Mobile and Reveal PINs and Passwords by Tracking your Motion

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Multiple Flaws With Android & Google Pixel Devices Let Attackers Elevate Privileges

Several high-severity vulnerabilities have been identified in Android and Google Pixel devices, exposing millions of…

8 minutes ago

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…

16 hours ago

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…

16 hours ago

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…

19 hours ago

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities, including…

22 hours ago

Veritas Enterprise Vault Vulnerabilities Lets Attackers Execute Arbitrary Code Remotely

Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…

23 hours ago