A New Vulnerability Found That Puts All Android Devices In Danger

It turns out that the firewall can be bypassed by showing infected applications as system applications. Many smartphones can be in danger because of this method.

As smartphones and computers evolve, so do the security measures needed to protect devices. Although manufacturers are constantly trying to protect devices with new updates, hackers are also constantly looking for new vulnerabilities.

If you remember, in Windows 10 and 11 in the past weeks a critical vulnerability had been found. Today it is almost can endanger all Android devices It turns out that a major security vulnerability has been detected.

All applications with viruses can be signed securely

With an update to the Google Play Store last year, it regularly scanned the applications you have installed on your phone and notified users when it detected an application that could harm your phone. A similar system was made by Samsung’s security application and Xiaomi’s security application. These systems are usually application packages (APK) checking their signatures and comparing them with malicious application signatures recorded in many cyber security systems, especially Google.

However, according to the information revealed by Google’s malware engineer Lukasz Siewierski, hackers can use this malware to another application or a computer, thanks to several platforms. able to sign as system application and bypass firewall. Even worse, these applications can be real system applications with viruses embedded in them.

In order to test the updates to the applications, users generally prefer to download the beta version of the application from the platforms on the internet. Some users APKMirror While they prefer legal websites supported by Google, some users download the application from the first website they see. If you also jump headlong into the first site you see or if you are constantly downloading modded apps With this method, you may have infected your phone with a virus.

Manufacturers like Samsung and Xiaomi are at greater risk

For this method to work, hackers need the platform key of the applications. Although Google’s leaked or hacked program keys usually belong to the old versions of the applications, according to the statement made by APKMirror, companies that have recently produced rival applications to Google such as Samsung and Xiaomi. current keys of many applications were stolen.

In the research, viruses in applications with old keys can be detected by the firewalls of the devices, while malware with updated keys can be detected. unfortunately not detectable.

RELATED NEWS

You May Be Impressed: 3 Vulnerabilities Affecting Popular Samsung Phones Detected!

If you think that you are affected by this method, which turned out to be used in November, the only thing you can do is as soon as possible. format your phone will be.


source site-35