Sunday, July 21, 2024
EHA

OnePlus Phones comes with Pre-installed Backdoor that Provides Root Access to the Device

OnePlus users under risk again, it comes with the preinstalled backdoor that provides root access to the affected devices.Factory installed app named EngineerMode acts as backdoor at this vulnerability is exploitable only if the attacker has physical access.

Already Remote code Exploitation Found in OnePlus devices that allow hackers can run an arbitrary code on vulnerable OnePlus Mobile Phones.

Security with twitter Handle Elliot Alderson discovered the vulnerable app with OnePlus devices running their own OxygenOS.

With the Device, EngineerMode app enables a debugging mode which gives full root access to the device through ADM command or an APK from play store.

In last July significant vulnerabilities detected on OnePlus One/X/2/3/3T OxygenOS and HydrogenOS, With these vulnerabilities, attackers can achieve a MitM attack and get included in OTA(update process).

NowSecure team decompiled the original .apk and found the valid binary password hash (79a6a933dfc9b1975e444d4e8481c64c771d8ab40b7ac72f8bc1a1bca1718bef) and the hash reversible to string “angela” which allows users to get root access to the phone.

Alderson published the source code of EngineerMode and OpDeviceManager apps on Github for OnePlus Mobiles.

adb shell am start -n com.android .engineeringmode/.qualcomm.DiagEnabled –es “CODE” “PASSWORD”
, where CODE = code and PASSWORD = angela

Also, Alderson said that he is to release an app on the play store to root the OnePlus devices.

Also Read: New Banking Trojan IcedID Evade Sandboxes and Performing Web Injection Attacks

Am I Vulnerable with OnePlus Phone Backdoor

According to  NowSecure team checked with latest versions of OnePlus devices and they are Vulnerable.

OnePlus 3 (OxygenOS 4.5.1, build number ONEPLUS A3003_16_171012)
OnePlus 5 (OxygenOS 4.5.14, build number ONEPLUSA5000_23_171031)

How to Check for Preinstalled app

To check open Settings -> Apps -> Menu -> Show system apps and search EngineerMode in the app list to check.

https://twitter.com/getpeid/status/930197107255992321

Carl pei Co-founder said they are looking into the issue, hope they might remove the application in upcoming updates.

Website

Latest articles

Hackers Claiming Dettol Data Breach: 453,646 users Impacted

A significant data breach has been reported by a threat actor known as 'Hana,'...

CrowdStrike Update Triggers Widespread Windows BSOD Crashes

A recent update from cybersecurity firm CrowdStrike has caused significant disruptions for Windows users,...

Operation Spincaster Disrupts Approval Phishing Technique that Drains Victim’s Wallets

Chainalysis has launched Operation Spincaster, an initiative to disrupt approval phishing scams that have...

Octo Tempest Know for Attacking VMWare ESXi Servers Added RansomHub & Qilin to Its Arsenal

Threat actors often attack VMware ESXi servers since they accommodate many virtual machines, which...

TAG-100 Actors Using Open-Source Tools To Attack Gov & Private Orgs

Hackers exploit open-source tools to execute attacks because they are readily available, well-documented, and...

macOS Users Beware Of Weaponized Meeting App From North Korean Hackers

Meeting apps are often targeted and turned into weapons by hackers as they are...

Hackers Exploiting Legitimate RMM Tools With BugSleep Malware

Since October 2023, MuddyWater, which is an Iranian threat group linked to MOIS, has...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles