Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Android Devices Could Be Infected with Ransomware, No User Interaction Needed


Attackers by utilizing twin known exploits are unnoticeably planting ransomware onto early versions of Android devices whose operators chance to navigate to websites delivering malevolent ads. It's usual with Windows computers when online assaults, which abuse security flaws within Web-browsers alternatively browser plug-ins, plant malware on the systems. However, this isn't the case with Android which has stronger application security.

The Android assault involves the exploit combination which impact a minimum of 2 crucial flaws within Android ver.4.0 called Ice Cream Sandwich continuing up to ver.4.3 called Jelly Bean. Android ver.4.4 called KitKat could also become contaminated, possibly via exploitation of another combination of flaws.

Google, in one report published in April, states that Android segregates the user-base of its OS to show that users preferred Android ver.5.0 called Lollipop the most. Here, therefore, the worrying aspect is that as many as 56.9% of the entire Android devices can succumb to the particular ransomware, if their versions are the older ones. Ibtimes.com posted this, April 26, 2016.

Vulnerability, which is exploited, exists within Android library 'libxslt' and it lets attackers to take down module.so, name of one ELF binary affecting Linux, on the Android gadget. The said binary exploits the Towelroot vulnerability in Android that's as well one rooting toolkit, enabling the attacker gain the device's root privileges. With confirmed root access, one more Android APK having the ransomware script too gets downloaded via the module.so binary. The root access also lets the attacker quietly plant the ransom software devoid of asking for consent from the user.

Google's report isn't fully published as yet, though it is worrying nonetheless. Possibly Google patched the above vulnerabilities long ago, however, it released the patches merely after it attributed legacy status to Android 4.X. It is as well probable that even with patches for Android 4.X, an OEM's support for a KitKat or Ice Cream Sandwich device now has very low chances; consequently, several devices remain flawed.

It's always recommended that users upgrade their Androids to the most recent edition as the OS' newer versions have security fixes along with other enhanced safeguards.

» SPAMfighter News - 5/2/2016

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next