A loophole which makes Android vulnerable to hackers

A ‘master key’ has been reportedly discovered by a security research firm which could potentially give cyberattackers access to almost every Android phone.

According to BBC, security research firm BlueBox has discovered the loophole which is present in every version of the Android operating system released since 2009.

The bug emerges as a result of the way Android handles cryptographic verification of the programs installed on the phone

The report said that Android uses the cryptographic signature as a way to check that an app or program is legitimate and to ensure it has not been tampered with.

Jeff ForristalBlueBox and his colleagues have found a method of tricking the way Android checks these signatures so that malicious changes to the apps go unnoticed.

Forristal said that the implications of this discovery could be ‘huge’ as it can take over the normal functioning of the phone and control any function thereof.

Security expert Dan Wallach said that in order to catch Android users, malicious hackers would have to get their booby-trapped version of a legitimate application on to the Google Play store.

According to the report, BlueBox had reported finding the bug to Google in February.

Google denied commenting on BlueBox discovery, the report added.

Via: TOI

Image Credit: AndroidTwit

 

Team TechPanda

Recent Posts

2026 Market Outlook: Navigating Macro Turbulence and Crypto’s Maturity

Overdosing on the uncertainty brought on by divisive “us vs them” agendas that are amplified…

3 hours ago

The ePlane Company unveils India’s largest integrated eVTOL prototyping & testing facility at IIT Madras Discovery Campus

The ePlane Company (Ubifly Technologies Pvt. Ltd.), India’s pioneer in electric vertical take-off and landing…

1 day ago

Funding alert: Tech startups that raked in moolah this month

The Tech Panda takes a look at recent funding events in the tech ecosystem, seeking…

1 day ago

Empowering Enterprises: How managed services accelerate agility & innovation

Businesses are no longer viewing outsourcing as a cost-saving solution for non-mission-critical functions, such as…

2 days ago

AI Launches: GPUs, Workforce management, Marketing, Cybersecurity & Supercomputing

The Tech Panda takes a look at recent launches in the superfast field of Artificial…

2 days ago

Why legacy systems are the real AI bottleneck in the mid-market

Artificial intelligence is often framed as a technology race defined by cutting-edge models, governance frameworks,…

3 days ago