<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>android bug Archives - Linux Windows and android Tutorials</title>
	<atom:link href="https://www.osradar.com/tag/android-bug/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.osradar.com</link>
	<description>tutorials and news and Seurity</description>
	<lastBuildDate>Mon, 08 Oct 2018 12:23:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.8.12</generator>
	<item>
		<title>RAMpage – Rowhammer Variant Affecting Android Devices</title>
		<link>https://www.osradar.com/rampage-rowhammer-variant-affecting-android-devices/</link>
					<comments>https://www.osradar.com/rampage-rowhammer-variant-affecting-android-devices/#respond</comments>
		
		<dc:creator><![CDATA[osradar_editor]]></dc:creator>
		<pubDate>Sat, 30 Jun 2018 11:27:54 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[android bug]]></category>
		<category><![CDATA[android flaw]]></category>
		<category><![CDATA[android glitch]]></category>
		<category><![CDATA[drammer]]></category>
		<category><![CDATA[rampage. rowhammer]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=4548</guid>

					<description><![CDATA[<p>In the world of security, there seems to be nothing so secured any more. Every now and then, there are new vulnerabilities found in different system. The first major ones were the Meltdown and Spectre that shook the world of security. Recently, a new vulnerability in Android has been identified that affects all the Android [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/rampage-rowhammer-variant-affecting-android-devices/">RAMpage – Rowhammer Variant Affecting Android Devices</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In the world of security, there seems to be nothing so secured any more. Every now and then, there are new vulnerabilities found in different system. The first major ones were the Meltdown and Spectre that shook the world of security. Recently, a new vulnerability in Android has been identified that affects all the Android devices since 2012!</p>
<p>The new vulnerability has a nice name – RAMpage. The vulnerability is a variation of the Rowhammer attack. Rowhammer is a hardware bug in modern memory cards. Using the bug, researchers noticed that when someone would send repeated read/write instruction to a same row of the memory cells, it would create an electric field and the field was able to alter data stored on the nearby memory.</p>
<p>Later, researchers found that the attack was able to affect devices like virtual machines, PCs and Android devices. Researchers also found that they could execute the attack using GPU cards, JavaScript codes and even network packets.</p>
<h2>RAMpage – Rowhammer attack variation</h2>
<p><img loading="lazy" class=" wp-image-4550 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/06/RAMpage.gif" alt="" width="676" height="161" /></p>
<p>The first Rowhammer attack was named “DRammer” that would affect Android devices. This method was able to root the Android device. The current and latest version (RAMpage) is nothing more than the expansion of the previous one.</p>
<p>According to a <a href="https://vvdveen.com/publications/dimva2018.pdf">research paper</a> published recently, a team of 8 academics from 3 different universities and 2 private companies discovered this new attack.</p>
<p>According to the researchers, RAMpage can break the most fundamental isolation between user apps and the OS. A nicely crafted malicious program can use the RAMpage exploit for gaining admin control of the system and get hold of secrets from the device memory.</p>
<p>Now, once a malware gets admin privilege, it can steal any info like passwords, your personal photos etc. and even critical documents.</p>
<h2>RAMpage infecting other devices (Apple, VMs and PCs)</h2>
<p>The development of the attack is still in early stage. However, according to the researchers, the attack holds potential to work on home PCs, Apple devices and even on cloud servers. For Android devices, here’s <a href="https://vvdveen.com/drammer.apk">an app from the security researchers to check if your device is vulnerable to DRammer and RAMpage</a>.</p>
<h2>RAMpage targeting Android’s ION subsystem</h2>
<p>The difference between the DRammer and RAMpage is, the newer one specifically targets ION – an Android memory subsystem. ION is the responsible part of Android that manages memory allocation between apps and the OS. ION was introduced back in 2011 with Android 4.0 (Ice Cream Sandwich).</p>
<p>Thankfully, researchers also made a new tool that puts an additional guard in front of the ION subsystem. The guard is supposed to protect against RAMpage attack routine. You can g<a href="https://github.com/vusec/guardion">et the app from GitHub</a>.</p>
<h2>The bad news</h2>
<p>Be prepared for the bad news, folks! Researchers successfully pulled the attack on an LG4 smartphone, but the attack is able to infect other mobile devices with LPDDR2 to LPDDR4 memory. In short, that’s nearly all the Android smartphones produced since 2012!</p>
<p>Here’s a website that clarifies <a href="https://rampageattack.com/">all the information about this dangerous vulnerability</a>. The researchers encouraging people to use their apps and send the scanning result to them for getting more information and ultimately, understand the depth and making decision on next step.</p>
<p>Still not satisfied? <a href="https://www.osradar.com/upnp-ddos-attacks-are-becoming-a-reality/">Check out this new form of DDoS attack that uses UPnP for masking its identity and rendering all the DDoS mitigation method useless</a>.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/rampage-rowhammer-variant-affecting-android-devices/">RAMpage – Rowhammer Variant Affecting Android Devices</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/rampage-rowhammer-variant-affecting-android-devices/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Android Devices with Exposed ADB Port</title>
		<link>https://www.osradar.com/android-devices-with-exposed-adb-port/</link>
					<comments>https://www.osradar.com/android-devices-with-exposed-adb-port/#respond</comments>
		
		<dc:creator><![CDATA[Mel]]></dc:creator>
		<pubDate>Tue, 12 Jun 2018 05:54:20 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[adb bug]]></category>
		<category><![CDATA[adb miner]]></category>
		<category><![CDATA[adb port]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[android bug]]></category>
		<category><![CDATA[usb debugging]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=4042</guid>

					<description><![CDATA[<p>In the recent days, security has always been one of the greatest concerns of the internet. Now, it’s another vulnerability/flaw in many Android devices that are putting users at risk. The security community raised alarm on the fact that Android devices were having open ADB debug port for remote connection over Wi-Fi. This issue isn’t [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/android-devices-with-exposed-adb-port/">Android Devices with Exposed ADB Port</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In the recent days, security has always been one of the greatest concerns of the internet. Now, it’s another vulnerability/flaw in many Android devices that are putting users at risk. The security community raised alarm on the fact that Android devices were having open ADB debug port for remote connection over Wi-Fi.</p>
<p>This issue isn’t something new. The first time it was detected by the team at Qihoo 360 Netlab in February 2018. A worm was spreading through Android devices and infecting the hosts with a cryptocurrency miner named <a href="https://www.osradar.com/cryptojacking-android-stay-secured/">ADB.Miner</a>. The worm was using a vulnerability in the ADB (Android Debug Bridge) – a feature of Android for troubleshooting faulty devices and perform many actions.</p>
<p>By default, the feature of ADB is disabled and users have to manually turn it on for using via USB connection. ADB also supports a feature named “ADB over Wi-Fi” that allows remote debugging instead of the traditional USB cable, a flexible option for devs.</p>
<h2>ADB interface left open</h2>
<p>This current issue is because of the open “ADB over Wi-Fi” feature in various shipped Android devices. Customers using those devices may be completely unaware of the open remote connection. The connection is open via TCP port 5555.</p>
<p>ADB is a troubleshooting utility that allows collecting other sensitive information from the device as well. The access also opens access to a UNIX shell.</p>
<p>That’s how the infamous ADB.Miner spread throughout numerous devices back in February. It loaded the Monero miner using the Unix shell and continued spreading from the infected devices over TCP port 5555.</p>
<h2>Devices exposing ADB port</h2>
<p>Last week, security researcher Kevin Beaumont has brought it into focus once again. In a <a href="https://doublepulsar.com/root-bridge-how-thousands-of-internet-connected-android-devices-now-have-no-security-and-are-b46a68cb0f20">Medium blog post</a>, he mentioned that there are still numerous Android devices that are left exposed online.</p>
<p>According to Beaumont, the open port is highly problematic as it allows anyone on the same network remotely access these devices as root user – the most powerful privilege of any UNIX-based system.</p>
<h2>ADB.Miner still active</h2>
<p>Because the port is left open, ADB.Miner is still going strong. According to security researchers, it’s confirmed that the worm is still active and kicking.</p>
<p>In addition to the worm, there’s also a Metasploit module that can exploit and root Android devices via port 5555. The best option, for now, is to check out your device manually and make sure that the ADB port is turned off.</p>
<p>The easiest way to do so is to disable “USB Debugging” from “Developers option” in Android “Settings”.</p>
<p><img loading="lazy" class="size-full wp-image-4044 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/06/usb-debugging-android-device.jpg" alt="" width="670" height="596" srcset="https://www.osradar.com/wp-content/uploads/2018/06/usb-debugging-android-device.jpg 670w, https://www.osradar.com/wp-content/uploads/2018/06/usb-debugging-android-device-300x267.jpg 300w, https://www.osradar.com/wp-content/uploads/2018/06/usb-debugging-android-device-472x420.jpg 472w" sizes="(max-width: 670px) 100vw, 670px" /></p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/android-devices-with-exposed-adb-port/">Android Devices with Exposed ADB Port</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/android-devices-with-exposed-adb-port/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Weird Android Bug – Really WEIRD!</title>
		<link>https://www.osradar.com/weird-android-bug-really-weird/</link>
					<comments>https://www.osradar.com/weird-android-bug-really-weird/#respond</comments>
		
		<dc:creator><![CDATA[Mel]]></dc:creator>
		<pubDate>Sun, 03 Jun 2018 17:02:07 +0000</pubDate>
				<category><![CDATA[Hardware]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[android bug]]></category>
		<category><![CDATA[android glitch]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=3779</guid>

					<description><![CDATA[<p>Android is one of the most popular OS for smart devices. It’s powerful and highly customizable, giving developers the ability to create the best use of their hardware. There are also good security features of Android that can ensure privacy. This time, it’s a really weird bug happened to be present in Android. The bug [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/weird-android-bug-really-weird/">Weird Android Bug – Really WEIRD!</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Android is one of the most popular OS for smart devices. It’s powerful and highly customizable, giving developers the ability to create the best use of their hardware. There are also good security features of Android that can ensure privacy. This time, it’s a really weird bug happened to be present in Android.</p>
<h3>The bug</h3>
<p>This bug is really funny. This bug exposes the SMS text open to the browser when searched using various terms.</p>
<p>For example, the initial report was when a user tried to access the URL “the1975..com”. Then, Google Pixel Launcher app returned the data of his SMS texts instead of the search result. The bug went public on Reddit. Eventually, there were also other Android-centered blogs who were able to reproduce the bug successfully.</p>
<p><img loading="lazy" class="size-full wp-image-3781 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/06/android-weird-glitch.png" alt="" width="1250" height="465" srcset="https://www.osradar.com/wp-content/uploads/2018/06/android-weird-glitch.png 1250w, https://www.osradar.com/wp-content/uploads/2018/06/android-weird-glitch-300x112.png 300w, https://www.osradar.com/wp-content/uploads/2018/06/android-weird-glitch-768x286.png 768w, https://www.osradar.com/wp-content/uploads/2018/06/android-weird-glitch-1024x381.png 1024w, https://www.osradar.com/wp-content/uploads/2018/06/android-weird-glitch-696x259.png 696w, https://www.osradar.com/wp-content/uploads/2018/06/android-weird-glitch-1068x397.png 1068w, https://www.osradar.com/wp-content/uploads/2018/06/android-weird-glitch-1129x420.png 1129w" sizes="(max-width: 1250px) 100vw, 1250px" /></p>
<p>The bug also worked on other Google apps. Here are some of the terms to try out for yourself –</p>
<pre>the1976..com
thw1975..com
the1974..com
the1975..com
Izela viagens
Vizel viagens
Zela viagens</pre>
<h3>Google apps fixed</h3>
<p>Such glitch wasn’t supposed to be present. Generally, Google apps have the ability to return user’s SMS text, but that requires permission from the user himself.</p>
<p>As it appears, it’s more a “glitch” rather than a security flaw. It’s not exploitable remotely, so you’re completely safe against any possible threat due to this issue. Even if someone has physical access to your smart device, he/she is more likely to log into your Message app instead of typing some garbage &amp; meaningless text into your phone’s browser.</p>
<p>As of now, Google has already fixed the issue and released updates for Google Assistant, Pixel Launcher, Google Search and other related apps. Those should appear on your Play Store’s update section.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/weird-android-bug-really-weird/">Weird Android Bug – Really WEIRD!</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/weird-android-bug-really-weird/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ZipperDown Infecting iOS Apps</title>
		<link>https://www.osradar.com/zipperdown-infecting-ios-apps/</link>
					<comments>https://www.osradar.com/zipperdown-infecting-ios-apps/#respond</comments>
		
		<dc:creator><![CDATA[Mel]]></dc:creator>
		<pubDate>Fri, 18 May 2018 03:38:53 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[android bug]]></category>
		<category><![CDATA[ios]]></category>
		<category><![CDATA[ios app]]></category>
		<category><![CDATA[ios bug]]></category>
		<category><![CDATA[ios vulnerability]]></category>
		<category><![CDATA[zipperdown]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=3146</guid>

					<description><![CDATA[<p>iOS is supposed to be one of the toughest platforms for security. Apple designed it really good for being smooth and secured at the same time. However, a new vulnerability is found in the iOS apps that infect almost 10% of all the iOS apps all over the world. Security researchers from Pangu Lab, a [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/zipperdown-infecting-ios-apps/">ZipperDown Infecting iOS Apps</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>iOS is supposed to be one of the toughest platforms for security. Apple designed it really good for being smooth and secured at the same time. However, a new vulnerability is found in the iOS apps that infect almost 10% of all the iOS apps all over the world.</p>
<p>Security researchers from Pangu Lab, a well-known company for providing jailbreaks have confirmed the vulnerability and named it “ZipperDown”. This flaw, according to their description, is a common programming error that leads to severe consequences like data overwriting, even code execution in the affected apps’ context.</p>
<h3>Vulnerable apps</h3>
<p><img loading="lazy" class="size-full wp-image-3148 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/05/zipperdown-bug-ios-android.png" alt="" width="1250" height="455" srcset="https://www.osradar.com/wp-content/uploads/2018/05/zipperdown-bug-ios-android.png 1250w, https://www.osradar.com/wp-content/uploads/2018/05/zipperdown-bug-ios-android-300x109.png 300w, https://www.osradar.com/wp-content/uploads/2018/05/zipperdown-bug-ios-android-768x280.png 768w, https://www.osradar.com/wp-content/uploads/2018/05/zipperdown-bug-ios-android-1024x373.png 1024w, https://www.osradar.com/wp-content/uploads/2018/05/zipperdown-bug-ios-android-696x253.png 696w, https://www.osradar.com/wp-content/uploads/2018/05/zipperdown-bug-ios-android-1068x389.png 1068w, https://www.osradar.com/wp-content/uploads/2018/05/zipperdown-bug-ios-android-1154x420.png 1154w" sizes="(max-width: 1250px) 100vw, 1250px" /></p>
<p>Pangu Lab created a scan rule for searching ZipperDown flaw in iOS apps. According to the result, 15,978 out of 168,951 scanned apps appear to have ZipperDown infection. However, they also added that the apps are to be manually inspected for confirmation.</p>
<p>Unfortunately, in the list of vulnerable apps, there are some really popular apps like NetEase Music, QQ Music, MOMO, Kwai etc. who have over 100 million users. Here’s a video where the researchers showed a demo infecting Weibo.</p>
<h3>Devs must contact the researchers</h3>
<p>Pangu Lab said that due to the potential infection in a large amount of apps, they’re not able to verify all the individual apps precisely. Moreover, the number of authors of infected apps is also large enough, making it really difficult for contacting each of them and informing the issue.</p>
<p>That’s why the company is asking the devs if their apps is on the list of potential infection list, they need to contact Pangu Lab for further details and test &amp; fix their application(s).</p>
<h3>Android infected(?)</h3>
<p>According to Pangu Lab, Android also suffers from similar issues like ZipperDown. The researchers said that they’ll continue further investigation for pinning the flaw.</p>
<p>Fortunatley, ZipperDown isn’t like other vulnerabilities and not available for easy exploitation. In order to exploit, the hacker must be within the range of the same network position for hijacking/spoofing traffic. According to the researchers, the sandbox on both Android and iOS are really effective in mitigating any possible damage for ZipperDown’s consequences.</p>
<h3>How to stay secured</h3>
<p>If you want to protect yourself from the vulnerability, you have to make sure that you are using the latest version of all the installed apps. It’s highly likely that app devs will release update to their software in the future.</p>
<p>Recently, the source code of TreasureHunter malware went public. Learn more about <a href="https://www.osradar.com/treasurehunter-pos-malware-source-code-published/">the source code leak and the future attacks</a>.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/zipperdown-infecting-ios-apps/">ZipperDown Infecting iOS Apps</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/zipperdown-infecting-ios-apps/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
