Gadget Gestures

Lets Gesture about Gadgets

Tuesday, April 13, 2021
Log in
  • News
  • Tablets
  • SmartPhones
  • Laptops
  • Cameras
  • Games
  • Apps/Softwares
  • iPad/iPhone
  • Latest News
    • Lenovo A10000, A30000 and A60000
    • TV Has Never Been this Smart – the New Motto of Samsung Smart TVs
    • Nokia Lumia 1020 on Sale at AT&T
    • How Can a Sniffer Help in Detecting Lost or Stolen Mobile Phones?
    • Amazon expected to launch FireTube TV box before Christmas
    • Nokia Lumia 521 Release Date,Features, Specs, Price- Will be Available through T- Mobile
    • New Mercedes-Maybach S600, Priced At 200,000 dollars
    • Intel unveils Jarvis, Edison and dual-OS processors
    • Blackberry Z10 Problems of over heating, Rebooting: Even New BB 10 OS is not Helping
    • Samsung Galaxy Note 2 Vs Samsung Galaxy Note 3 – Compare Possible Price, Design, Display, Features
    • Evernote Integration of New Google Drive Button
    • White Nexus 4 Release Date Subdue Possibilities of Verizon Nexus 4 LTE

Stagefright Exploit of Android Devices Is Back

March 21, 2016 By Micheal Baptiste Leave a Comment

An older flaw that used to exist within the Android

An older flaw that used to exist within the Android media server and multimedia library named Stagefright has resurfaced, in spite of the previous claims that it had been fixed. According to reports and a NorthBit research paper published recently, the vulnerability has never really been fixed, leading to millions of Android devices remaining at risk right now with no news of how to prevent or fix the issue.

This vulnerability would allow hackers to access data and various functions of the Android operating systems ranging from version 2.2 all the way up to 4.0, 5.0 and 5.1 through an exploit that has been dubbed ‘Metaphor’ by the authors of the research paper. The people behind it, a group of Israeli researchers that thoroughly explained how one can build and use the exploit, are attempting to raise awareness of Android users regarding the danger that may put themselves in by accessing suspicious websites.

According to them, simply visiting a hacker’s web page – without clicking on anything or downloading any malicious files – is enough to make your system vulnerable to the exploit and compromise your device. The way it works – the researchers explain – is through the very way Stagefright works. By ‘trapping’ a message or a web page, it can begin running malicious code on the device in question.

The process is thoroughly described in the published paper as having three steps that your device is subjected to before the vulnerability leads to compromising the information of the attacked device without even appearing like there’s an external factor at work within the device’s system.

When the owner of the device ends up on a hacker website, the page sends a video file to the device that ultimately crashes the Stagefright media server software, forcing it to reset its internal state when it reboots. During the restart process, a Java script takes the opportunity to send information of the device to the attacker.

The actual ‘Metaphor’ exploit only takes place afterwards; after the device’s personal information is leaked, the hacker may use it to create another video file that results in various types of malware being baked into the device when Stagefright attempts to process it. Because of how everything is run through by using the internal state related information of the particular device of the user, this code can run with full administrator privileges to leak data and observe the device without being detected by the system.

Image Source: 1

Filed Under: Apps/Softwares Tagged With: android exploit, android stagefright, metaphor exploit, stagefright exploit

As a participant in the Amazon Services LLC Associates Program, this site may earn from qualifying purchases. We may also earn commissions on purchases from other retail websites.

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 5 other subscribers

Recent Articles

GitHub stickers displaying a cat-octopus with a human face

Microsoft Acquires GitHub for $7.5 Billion’s Worth of Shares

June 5, 2018 By Mary Duncan Leave a Comment

Teenage girl browsing her smartphone while sitting at the table

Facebook Is No Longer the Top Social Media Platform Among Teenagers

June 4, 2018 By Lori David Leave a Comment

Fake news headline on a laptop screen

Facebook Is Taking Its Fight Against Misinformation to a Whole New Level

May 25, 2018 By Brandi McCants Leave a Comment

Unsolved Rubik cube on a black background

An Australian Professional Speedcuber Broke His Own Record at Solving a Rubik Cube

May 6, 2018 By Lori David Leave a Comment

Cambridge Analytica logo on a computer screen

Soon After the Facebook Scandal, Cambridge Analytica Is Going Bankrupt

May 3, 2018 By David Crozier Leave a Comment

Windows restore disk placed in a paper envelope for CDs

Renowned E-Waste Recycler Goes to Jail for Distributing Free Windows Restore Disks

April 25, 2018 By Micheal Baptiste Leave a Comment

nasa globe and emblem outside a building

NASA Announces its Investments in Future Tech Concepts Such as Biobots and Shapeshifters

April 3, 2018 By Brandi McCants Leave a Comment

YouTube app opened in browser with the logo on top of it

YouTube Increases the Number of Ads to Trick Users into Subscribing to Its Paid Streaming Platform

March 22, 2018 By Mary Duncan Leave a Comment

Facebook dislike button

Facebook Stock Falling for Second Straight Day amid Data Scandal

March 21, 2018 By Paul Leave a Comment

Permanently Delete Facebook

WhatsApp Founder to Facebook Users: ‘Delete Facebook’

March 21, 2018 By Paul Leave a Comment

Uber driverless car

Uber Driverless Car Kills Woman in Arizona

March 20, 2018 By Paul Leave a Comment

Windows 10 Update reaches 35%

Microsoft: Windows 10 Updates To Take No Longer than 30 Min

March 20, 2018 By David Crozier Leave a Comment

The Apple Watch

Apple Watch User Awakened by 3 Cops In His Bedroom after Accidental Call

March 19, 2018 By David Crozier Leave a Comment

Pokemon Go Character

Pokemon Go Player Attacks Other Player IRL for Losing Gym

March 19, 2018 By David Crozier Leave a Comment

Pages

  • About Us
  • Contact Us
  • Privacy Policy GDPR
  • Team

Recent Posts

  • Samsung Tablet 10.1 Review: Perfect for Your Entertainment Needs October 29, 2020
  • Take Better Pictures Today With These 9 Helpful IPhone Camera Settings November 4, 2019
  • The 6 Best Gaming Desks to Give You a Great View October 31, 2019
  • How Much RAM Do I Need for Gaming? Here’s the Sweet Spot for Optimal Performance October 21, 2019
  • Lenovo Ideapad Yoga 11s Review: A Teaser October 16, 2019
  • Basic Computer Skills – 6 Tips You Need to Know! September 30, 2019
  • Why is my Laptop Fan so Loud? Six Possible Reasons for the Noisy Nuisance September 9, 2019

Copyright © 2021 GadgetGestures.com

About · Privacy Policy · Terms of Use · Contact