All the latest UK technology news, reviews and analysis


Android smartphones and tablets could be bricked by security flaw

24 Mar 2014
Google Android Malware

Security researchers have uncovered a flaw in Google's Android operating system that could theoretically be exploited by hackers to break devices so they are beyond repair.

The vulnerability was spotted by independent researcher Ibrahim Balic, who reported uncovering the flaw in blog post. Trend Micro mobile threat analyst Veo Zhang later confirmed that the flaw is exploitable.

"We believe that this vulnerability may be used by cyber criminals to do some substantial damage on Android smartphones and tablets, which include bricking a device, or rendering it unusable in any way. In this context, the device is bricked as it is trapped in an endless reboot," he wrote in a blog post.

The vulnerability reportedly means hackers could build a Trojanised application to target any Android device, including those running newer 4.0 versions and above.

Trend Micro senior threat researcher David Sancho told V3 the company is yet to see evidence that hackers are actively exploiting the flaw but said the early disclosure by Balic could have alerted criminals to the flaw.

"Trend Micro has not seen evidence of exploitation at this moment. [But] as with every new vulnerability, this is no guarantee about the future. In fact, describing a new vulnerability might cause new attempts of exploitation."

He added that the flaw is particularly dangerous as it could be used by advanced hackers for a variety of purposes, outside of basic sabotage. "A possible use would be to destroy evidence that the device has been hacked by forcing a device reinstall," he said.

The danger posed by disclosing new flaws to the general public has been a constant issue within the security community.

During an interview with V3 in February Paul Ducklin, senior security analyst at Sophos, told V3 that future patches to Windows Vista, 7 and 8 could point hackers to vulnerabilities in Windows XP once Microsoft ceases support for it on 8 April.

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Alastair Stevenson
About

Alastair has worked as a reporter covering security and mobile issues at V3 since March 2012. Before entering the field of journalism Alastair had worked in numerous industries as both a freelance copy writer and artist.

View Alastair's Google+ profile

More on Security
What do you think?
blog comments powered by Disqus
Poll

Green IT poll

How important is it to your business that a cloud provider uses renewable energy like solar or wind to power their data centres?
19%
6%
5%
1%
69%

Popular Threads

Powered by Disqus
mike-schutz-microsoft-server-and-cloud-division

Microsoft's Mike Schutz discusses the firm's cloud computing strategy [Video]

V3 interviews Microsoft general manager for Windows Server and Management, Mike Schutz, to find out why customers should adopt the Private Cloud

Updating your subscription status Loading
Newsletters

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button
hpv3may

Getting started with virtualisation

Virtualisation can help you reduce costs, improve application availability, and simplify IT
management. However, getting started can be challenging

ibmv3may

Converting big data and analytics insights into results

Successful leaders are infusing analytics throughout their organisations to drive smarter decisions, enable faster actions and optimise outcomes

Sales Engineer / Pre Sales Consultant

Sales Engineer / Pre Sales Consultant needed for a permanent...

SAP BW BI Consultant

Für einen von unseren Top Kunden in der Region Bern suchen...

EMC Storage Engineer - Law Firm - City

Austin Fraser are searching for a strong EMC Storage...

Data centre Practice Lead / Presales Technical Specialist

Data centre Practice Lead / Presales Technical Specialist...
To send to more than one email address, simply separate each address with a comma.