Just in:
Alaska Air Grounded Briefly Due to System Issue // Abu Dhabi Launches ‘Medeem’ Initiative to Promote Emirati Values in Marriage // The International Exhibition of Inventions in Geneva Reveals More than 40 Scientific and Technological Innovation Achievements from Hong Kong // Andertoons by Mark Anderson for Fri, 19 Apr 2024 // Sharjah Charity International Extends Helping Hand to Flood Victims // Gen Zs Trust User and Expert Insights on Shopee // Czar Workspace: a Modern Workspace Solutions in Dubai // Saadiyat Grove Set for Smart Transformation Through Aldar-Siemens Alliance // Tech Giant Discharges Workers Following Disruptive Protest // Keung To Trams Return! “KeungShow HKFanClub” Sponsor Free Tram Rides for All on 30 April to Celebrate Keung To’s 25th Birthday // AI Race Heats Up: Meta Unveils Powerful New Llama // Electric Cars Get Refueled, Not Charged: Obrist HyperHybrid Ready for Production // DFA Hong Kong Young Design Talent Award 2024 // KL Home Care Commits To Excellence Professional Maid Services For The Residents Of Hong Kong // On Its 100 Years Anniversary, LUX Aims to Change Feminine Identity With ‘In Her Name’ // Bitcoin Halving: Bitcoin Nears Block Reward Reduction // Hong Kong’s R&D Receives International Recognition HKPC’s “InspecSpider” Wins Prestigious “Edison Award” in Innovation Field // I’m still learning how to answer this question. In the meantime, try Google Search. // Petrochemical Storm Clouds Gather Over Saudi Arabia // Navigating Business Setup in Dubai: A Comprehensive Guide by Czar Bizserv //

Google patches severe Android boot mode vulnerability

1483951674 new locker crypto repents imagecredsymantec

new-locker-crypto-repents-imagecredsymantec.jpg

Symantec

Google has resolved a dangerous Android vulnerability which allowed attackers to reboot Nexus devices into custom boot modes, leading to spying and remote attacks.

Patched as part of Google’s January Android security bulletin, the flaw, CVE-2016-8467, grants cyberattackers the ability to use PC malware or malicious chargers to reboot a Nexus 6 or 6P device and implement a special boot configuration, or boot mode, which instructs Android to turn on various extra USB interfaces.

ADVERTISEMENT

According to IBM X-Force Application Security Research Team researchers Roee Hay and Michael Goberman, who revealed further details of the vulnerability in a blog post, the flaw gives attackers access to interfaces which offer additional control over a compromised device.

In particular, the Nexus 6 the modem diagnostics interface is of concern as accessing this platform gives attackers access to the modem, which compromises “confidentiality and integrity,” the team says.

Once an attacker has gained access to the modem they can intercept phone calls, for example. It would also be possible to sniff mobile data packets and grab information including GPS coordinates of the device for tracking, place phone calls, steal call information and either access or change nonvolatile (NV) items or the EFS partition of a device.

See also: Google patches Dirty Cow vulnerability in latest Android security update

IBM says that if Android Debug Bridge (ADB) is enabled on the device, PC malware or a malicious charger can boot the target device with the special boot mode configuration. Once connected, the user is forced to accept the PC or charger permanently, a few commands are issued, and the device is rebooted.

“Every future boot from this point forward will have the boot mode configuration enabled,” IBM says. This means the attack is persistent and no longer requires ADB to run, although it still requires USB access.”

“Therefore, the attacker only needs the victim to enable ADB once,” the researchers added. “Moreover, a lucky attacker might wait for the device to be in fastboot mode, which requires no authorization from the victim. This, however, is less likely.”

If attackers have physical access to the device, they can also reboot it into the custom boot mode manually.

These issues are less severe on the Nexus 6P due to firmware protections, however, a quirk in the device type means attackers can open ADB sessions even if the mode has been disabled.

In addition, due to the inclusion of additional USB interfaces in both device types, attackers can also access other interfaces to send or on SMS messages and potentially bypass two-factor authentication, escalate privileges, change radio settings and access a wide range of mobile device features.

Google has now patched the flaw by forbidding a locked bootloader to boot with the dangerous boot modes.

In December, researchers revealed that a new variant of Android malware called Gooligan was exploiting unpatched vulnerabilities to steal sensitive user data.

(via PCMag)

ADVERTISEMENT

ADVERTISEMENT
Just in:
Gunfire exchange near Manipur polling booth // A Bridge Between Deserts and Rainforests: UAE and Costa Rica Forge Economic Ties // Hong Kong’s R&D Receives International Recognition HKPC’s “InspecSpider” Wins Prestigious “Edison Award” in Innovation Field // Galaxy Macau Unveils the New Galaxy Kidz: An Edutainment Center for Play Time // The International Exhibition of Inventions in Geneva Reveals More than 40 Scientific and Technological Innovation Achievements from Hong Kong // Bitcoin Halving: Bitcoin Nears Block Reward Reduction // Czar Workspace: a Modern Workspace Solutions in Dubai // Electric Cars Get Refueled, Not Charged: Obrist HyperHybrid Ready for Production // Saadiyat Grove Set for Smart Transformation Through Aldar-Siemens Alliance // Sharjah Charity International Extends Helping Hand to Flood Victims // DFA Hong Kong Young Design Talent Award 2024 // Moomoo and Nasdaq Announce Global Strategic Partnership // VT Markets Releases Study on Upcoming Bitcoin Halving and Market Implications // Takeoff After Turbulence: Flydubai Restarts Operations at Dubai International Airport // Abu Dhabi Environment Agency Endorses ADNOC’s Decarbonization Push // Gen Zs Trust User and Expert Insights on Shopee // Petrochemical Storm Clouds Gather Over Saudi Arabia // On Its 100 Years Anniversary, LUX Aims to Change Feminine Identity With ‘In Her Name’ // AI Race Heats Up: Meta Unveils Powerful New Llama // Abu Dhabi Launches ‘Medeem’ Initiative to Promote Emirati Values in Marriage //