Millions of Android users vulnerable to new hacking threat

  | 
Team Clark is adamant that we will never write content influenced by or paid for by an advertiser. To support our work, we do make money from some links to companies and deals on our site. Learn more about our guarantee here.

New research has discovered that millions of Android users may be at risk due to a previously discovered vulnerability that was thought to have been fixed.

According to security research firm NorthBit, at least 275 million Android devices may be vulnerable to hackers. The group recently released a research paper explaining a new way to exploit a weakness in Stagefright, Android’s media server and multimedia library. 

Read more: Android phones can be hacked with one simple text

The new threat

According to NorthBit, if a user accessed a malicious website, the vulnerability could allow hackers to gain access to data and functions on the device. And while the original Stagefright exploit was described as the ‘worst ever discovered,’ this new one allows an attacker to hack Android smartphones in just seconds — by tricking users into clicking on a website that contains a malicious multimedia file.

Google has patched the vulnerability twice before, after originally being discovered in 2015.

NorthBit says hackers could effectively attack any device running Android versions 2.2 through 4.0, 5.0 and 5.1 — using the new exploit the group has named ‘Metaphor.’

Read more: How to fix a smartphone infected with ransomware

But while the risk arises when a user clicks on a page containing malicious multimedia, NorthBit says you don’t even have to watch the video to get hacked. 

“The vulnerability is in media parsing,” according to the research. “Which means that the victim’s device doesn’t even need to play the media.”

Parsing is when the device retrieves information about the media file.

According to the study, the attack is most effective on Google’s Nexus 5, but it also works, with some modifications, on HTC One, LG G3 and Samsung S5.

“The victim also has to linger for a time in the attack web page,” NorthBit researchers wrote. “Social engineering may increase effectiveness of this vulnerability.”

The latest version of Android, 6.0 Marshmallow, blocks this vulnerability.

Here’s a video the group put together explaining how it works:

This post was last modified on March 22, 2017 3:53 pm

Recent Posts

Should I Fire My 1% Financial Advisor To Save on Fees?

Deciding to save and invest are great habits. But once you check that box, your…

7 hours ago

Fubo Drops Popular Channels Amid Dispute with Warner Bros. Discovery

If you're considering subscribing to Fubo, you need to be comfortable missing out on some…

1 day ago

5 Things To Know About the Wells Fargo Signify Business Cash Card

Are you looking for a way to earn 2% back on every purchase you make…

1 day ago

How Dividing Your Monthly Credit Card Payment Speeds Up Your Payoff Date

You're not alone if you're running a balance on your credit cards. Collectively, Americans are…

1 day ago

5 Things You Should Re-Shop To Save Money

A big part of saving money comes down to knowing how to comparison shop. But…

2 days ago

What Are My Retirement Account Options if My Company Doesn’t Offer a 401(k)?

If you work for a big company as a full-time employee, chances are you have…

2 days ago