Hackers can break into Android devices by sending a text

Not long ago, we saw the emergence of sim swapping attacks utilizing a loophole in the two-factor authentication process. Now in the latest, researchers from Check Point have discovered vulnerabilities in certain Android-based phones including the likes of Samsung, Huawei, Sony, and LG which allows attackers to access your information.
These phone companies collectively happen to make up 50% of all Android phones according to statistics from 2018, therefore, chances are that every second Android user is now vulnerable to the attacks identified by Check Point.
The technology exploited is called Over-the-Air provisioning (OTA) which has been used commonly by cellular networks to update network settings on a user’s phone. As it requires nothing more than a tap, its ease of use is behind its popularity as a method to do so.
How it does this is through classical phishing. When the suggested settings message appears, one is naturally inclined to believe that is must be from a legitimate authority. However, there is no actual way of verifying where it originated from due to the industry-standard contained within the Open Mobile Alliance Client Provisioning (OMA CP) protocol, and this very ambiguity is what attackers exploit.
They send OTP messages claiming to be a cellular network and when an unsuspicious user accepts them, they’re basically agreeing to however the hackers want them to handle the information routing process even if the phone cannot be hacked in this way.
To list them, the settings that can be changed includes browser homepage & bookmarks, mail servers, proxy addresses and much more. On the lighter side, Android users will at least now know the reason behind their settings randomly changing.
The equipment required to construct such an attack isn’t expensive either making it attractive to a wider pool of black hat hackers. As Check Point puts it,
On the other hand, Sony has refused to fix anything citing the use of standard measures as a pretext. Moreover, Check Point’s researchers successfully tested the exploits on different phones including Huawei P10, Sony Xperia XZ Premium, LG G6, and the Samsung Galaxy S9.
It is important to note that among these brands, Samsung phones were the most vulnerable as they featured no authenticity check at all contrary to the others.
However, the fact that Huawei and Sony have left their current phones vulnerable is very alarming and if anything, it is an open invitation for their users to switch to safer alternatives. Perhaps, Apple can have a good laugh about it? or maybe not since Google hackers recently exposed how iPhones were being hacked for years using malicious websites.

Latest Jobs
-
- Outside IR 35 CONTRACT SC CLEARED Cyber Security Operations Analyst SPLUNK ES- UK REMOTE- £500 a day.
- N/A
- 500
-
6 month contract Outside IR35 Operational Cyber Security Analyst. Hands on Splunk Security Enterprise and Security clearance is required As is someone that holds SC clearance. SOC and Vulnerability management experience. Vulnerability Analysis / Management - Tenable
-
- SailPoint Consultant
- Sweden
- Upto €80,000
-
SailPoint Consultant is need for this rapidly expanding global business, The business is currently in the middle of a SailPoint Deployment, they require an experienced Consultant who is able to help them on this Journey You will be responsible for helping to configure and deploy SailPoint as well as on board applications onto the platform You will also work with the business to understand workflow and process to help align the way the business works to ensure that the business gets the most from the deployment We are looking for an experienced SailPoint consultant who has experience with both Deployment and BAU work and is interested in joining a business which is at the start of an interesting IAM Journey
-
- SOC Manager Security Operations. SIEM, Threat / Vulnerability, IR, SOC Service- Exclusive
- United Kingdom
- 90,000+
-
SOC Manager- SIEM, Threat / Vulnerability, Incident response. Exclusive Project. Management and on growth growth of Security Operations Centre capability. Managing and maturing the team, technical services line and fronting client engagements where needed. An in-depth technical background is essential, experience across SOC SIEM/ Threat Hunting (IR) tools, processes, techniques, operational is a MUST. The role will include, but not limited to; evolving the technical process, building operational capability, managing and hiring team, involved at a high level overviewing policy/playbooks, fine turning of the go-to-market collateral etc.
-
- Contact 12 month- Security Operations- Tanium Engineer / Analyst.
- United Kingdom
- Dependent on experience
-
Security Operations engineer / Analyst with Tanium for a 12 month contract. Experience configuring using, managing, supporting troubleshooting Tanium's suite of end point solutions is essential. The opportunity is due to a client expanding its international capability to a follow the sun model. To be involved in spinning up a European capability. Based in the UK. English essential and ideally being fluent in French.