Friday, 2 December 2016

Severe AirDroid vulnerability troubles tens of millions of Android users

So far, the popular remote management utility AirDroid has attracted tens of millions of users with the lure of sharing the messages and files on their phones with their PCs, but regardless of any other thing else, you might want to think twice about firing it up today. Mobile security firm Zimperium has published a report detailing several major vulnerabilities that threaten to hijack your device. Along the line, the security issue—which still exists in the latest 4.0.1 release, according to Zimperium—is related to “insecure communication channels” that “send the same data used to authenticate the device to their statistics server.” In this regard, that means that someone on the same network could use a simple man-in-the-middle attack to intercept the user’s email address and password associated with AirDroid. In addition to this, the hacker could then download malicious updates to the app that in turn give them full control over the device. And now, Zimperium notes that they contacted Sand Studio about the vulnerability back in May and has been in communication with the company through last month’s release of version 4.0. But however, the firm warns that the vulnerability has not been patched and advises users to uninstall AirDroid until a fix is available.
Update, 11:45am: On this note, Betty Chen, chief marketing officer at Sand Studio, said that the company is “indeed working on the solution and it should be expected to start to roll out within next two weeks.” She attributed the lack of prior action to “miscommunication” between Sand Studio and Zimperium.
What it means to you: One thing here is that Android users understand that security vulnerabilities are a fact of life—just this week the Gooligan exploit was found to have breached more than a million Google accounts—but generally they originate outside of the Play Store. And more here, AirDroid is a popular utility used by as many as 50 million Android users, and the developers have an obligation to their users to keep the app as safe and secure as possible. Finally, earlier this year, the company quickly patched a similar bug exposed by Check Point, but this time around it appears that Sand Studio has known about this issue for more than six months and has done nothing to correct it. Thanks......

No comments :

Post a Comment