A severe security flaw in the Chrome browser allows attackers to hijack Android mobile devices on the latest operating system.
A Chinese researcher has discovered an exploit which allows attackers to hijack Android mobile devices through the Chrome browser, placing millions at risk.
Speaking at the PacSec conference held in Tokyo, Japan this month, Qihoo 360 researcher Guang Gong demonstrated how the zero-day flaw could be exploited to take over a fully updated Android device.
As reported by Security Affairs, the Chinese security expert leveraged a JavaScript v8 flaw through the Chrome browser to hijack a Google Project Fi Nexus 6 device running the latest OS, Android 6.0 Marshmallow.
PacSec team member Dragos Ruiu said in a Google+ post that the researcher was able to hijack his device fresh out of the box -- with not just the latest OS, but a swathe of fully-updated applications -- by sending the smartphone to a web server Gong had personally set up complete with a ready-made malicious page.
The Java flaw then came into action and installed an arbitrary application used to wrestle control of the device away from the user and into the attacker's hands. The user did not have to interact with the malicious page for the exploit to operate beyond visiting the site.
In the researcher's example, the arbitrary app was a BMX bike game, but theoretically this could be any third-party app which appears legitimate. Malicious apps which appear to be legitimate, acceptable software are often used mask an attacker's activities, which can include hijacking, data theft and device monitoring.
Ruiu called the attack a "one-shot exploit" which "did everything in one go instead of chaining multiple vulnerabilities," -- a serious problem for Android security which also suggests millions of devices running the Javascript engine could be affected, placing countless users at risk.
"Offline we also tested his exploit on some other phones and it looks like it works on many targets -- so I guess the three months he put into developing it delivered results," Ruiu said. "Since we don't have any lavish prizes for him, I'm bringing him to Canada next year for some skiing/snowboarding at CanSecWest."
In July, Google issued a security update which patched critical flaws in the Chrome browser, including a number of high-risk universal cross-site scripting errors.
ZDNet has reached out to Google and will update if we hear back.
Source:
http://www.zdnet.com/article/chrome...-of-smartphone-users-at-risk/#ftag=RSSbaffb68
A Chinese researcher has discovered an exploit which allows attackers to hijack Android mobile devices through the Chrome browser, placing millions at risk.
Speaking at the PacSec conference held in Tokyo, Japan this month, Qihoo 360 researcher Guang Gong demonstrated how the zero-day flaw could be exploited to take over a fully updated Android device.
As reported by Security Affairs, the Chinese security expert leveraged a JavaScript v8 flaw through the Chrome browser to hijack a Google Project Fi Nexus 6 device running the latest OS, Android 6.0 Marshmallow.
PacSec team member Dragos Ruiu said in a Google+ post that the researcher was able to hijack his device fresh out of the box -- with not just the latest OS, but a swathe of fully-updated applications -- by sending the smartphone to a web server Gong had personally set up complete with a ready-made malicious page.
The Java flaw then came into action and installed an arbitrary application used to wrestle control of the device away from the user and into the attacker's hands. The user did not have to interact with the malicious page for the exploit to operate beyond visiting the site.
In the researcher's example, the arbitrary app was a BMX bike game, but theoretically this could be any third-party app which appears legitimate. Malicious apps which appear to be legitimate, acceptable software are often used mask an attacker's activities, which can include hijacking, data theft and device monitoring.
Ruiu called the attack a "one-shot exploit" which "did everything in one go instead of chaining multiple vulnerabilities," -- a serious problem for Android security which also suggests millions of devices running the Javascript engine could be affected, placing countless users at risk.
"Offline we also tested his exploit on some other phones and it looks like it works on many targets -- so I guess the three months he put into developing it delivered results," Ruiu said. "Since we don't have any lavish prizes for him, I'm bringing him to Canada next year for some skiing/snowboarding at CanSecWest."
In July, Google issued a security update which patched critical flaws in the Chrome browser, including a number of high-risk universal cross-site scripting errors.
ZDNet has reached out to Google and will update if we hear back.
Source:
http://www.zdnet.com/article/chrome...-of-smartphone-users-at-risk/#ftag=RSSbaffb68