All the latest UK technology news, reviews and analysis


Android smartphones and tablets could be bricked by security flaw

24 Mar 2014
Google Android Malware

Security researchers have uncovered a flaw in Google's Android operating system that could theoretically be exploited by hackers to break devices so they are beyond repair.

The vulnerability was spotted by independent researcher Ibrahim Balic, who reported uncovering the flaw in blog post. Trend Micro mobile threat analyst Veo Zhang later confirmed that the flaw is exploitable.

"We believe that this vulnerability may be used by cyber criminals to do some substantial damage on Android smartphones and tablets, which include bricking a device, or rendering it unusable in any way. In this context, the device is bricked as it is trapped in an endless reboot," he wrote in a blog post.

The vulnerability reportedly means hackers could build a Trojanised application to target any Android device, including those running newer 4.0 versions and above.

Trend Micro senior threat researcher David Sancho told V3 the company is yet to see evidence that hackers are actively exploiting the flaw but said the early disclosure by Balic could have alerted criminals to the flaw.

"Trend Micro has not seen evidence of exploitation at this moment. [But] as with every new vulnerability, this is no guarantee about the future. In fact, describing a new vulnerability might cause new attempts of exploitation."

He added that the flaw is particularly dangerous as it could be used by advanced hackers for a variety of purposes, outside of basic sabotage. "A possible use would be to destroy evidence that the device has been hacked by forcing a device reinstall," he said.

The danger posed by disclosing new flaws to the general public has been a constant issue within the security community.

During an interview with V3 in February Paul Ducklin, senior security analyst at Sophos, told V3 that future patches to Windows Vista, 7 and 8 could point hackers to vulnerabilities in Windows XP once Microsoft ceases support for it on 8 April.

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Alastair Stevenson
About

Alastair has worked as a reporter covering security and mobile issues at V3 since March 2012. Before entering the field of journalism Alastair had worked in numerous industries as both a freelance copy writer and artist.

View Alastair's Google+ profile

More on Security
What do you think?
blog comments powered by Disqus
Poll

IT curriculum poll

With coding now compulsory in schools, how important are digital skills for the next generation of school leavers?
65%
8%
18%
9%

Popular Threads

Powered by Disqus
V3 Security Summit

V3 Security Summit Day 2: Botnet, skills and BYOD intelligence incoming

Keep V3 bookmarked for news updates on all the key security concerns and topics facing businesses

Updating your subscription status Loading
Newsletters

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button
hpv3may

Getting started with virtualisation

Virtualisation can help you reduce costs, improve application availability, and simplify IT
management. However, getting started can be challenging

ibmv3may

Converting big data and analytics insights into results

Successful leaders are infusing analytics throughout their organisations to drive smarter decisions, enable faster actions and optimise outcomes

2014 Financial Software Development - London - Entry Level

Do you want to write industry-leading software relied...

C# Software Web Developer (ASP.NET, JavaScript, jQuery, AJAX)

C# Software Web Developer (ASP.NET, JavaScript, jQuery...

C# ASP.NET Developer (MVC, Web API, JavaScript, TDD, IOS)

C# ASP.NET Developer (MVC, Web API, JavaScript, TDD...

JavaScript Web Developer -CoffeeScript, TypeScript, HTML5, CSS3

JavaScript Web Developer (CoffeeScript, TypeScript, HTML5...
To send to more than one email address, simply separate each address with a comma.