August 9, 2016 By Douglas Bonderud 2 min read

When it comes to malware, users are conditioned to look outside their device. Don’t open malicious attachments, follow suspicious links or fall victim to supposedly official emails from banks or credit agencies.

But what happens when pre-existing flaws make it possible for attackers to fully control a mobile phone or tablet? That’s the case with Quadrooter, a set of four privilege escalation vulnerabilities that may affect up to 900 million devices running Qualcomm chips, according to ZDNet. Here’s the scoop on this ramped up rooting risk.

Android Attacks on the Rise

There’s been a significant uptick in Android malware over the last few years as cybercriminals find ways to exploit mobile apps and recognize the huge potential this billion-user market represents.

As noted by Ars Technica, for example, a malware family called HummingBad — which may actually be part of Shedun — managed to infect more than 10 million handsets worldwide. Using unfixed vulnerabilities from older Android versions, the malware is able to root Android phones, install malicious apps and generate fraudulent advertisements. So far, attackers have enjoyed a significant payday with the malware producing more than $300,000 in revenue per month.

Then there are banking attacks like Android.Fakebank. According to BGR, not only does this do the old “steal account details and transfer money” shtick, but also prevents users from directly calling their bank to address the problem of fraudulent logins.

Put simply, cybercriminals have a vested interest in finding and exploiting new Android issues to grab valuable user data.

Fearsome Foursome

The so-called Quadrooter problem, meanwhile, takes a different track by targeting vulnerabilities on factory-installed Qualcomm chips.

As noted by PC Mag, the flaws were found by security firm Check Point and detailed at the recent DEF CON conference; the four new privilege exploits let attackers access saved data, change or remove system files, delete or add apps, and access virtually all phone services.

Since the Qualcomm chip drivers come pre-installed, there’s no way for users to prevent the potential of infection. If attackers can convince users to install a single malicious app, the bad guys gain total device control.

Qualcomm Chips In

Qualcomm and Google have been working to remedy the flaws, which affect everything from the Nexus 5X to Galaxy S7 Edge and even Blackberry’s DTEK50. While three vulnerabilities were addressed in the most recent security update, one is still outstanding because the patch wasn’t ready in time.

Qualcomm did release the affected code to partners, meaning it’s possible for device manufacturers to design their own in-house solution. Check Point now offers a Quadrooter checking tool that scans devices to determine if they’re fully protected as well.

While the Quadrooter issues were quickly identified and addressed by both the manufacturer and Google, the proof of concept here is worrisome. Almost 1 billion Android phones were put at risk of complete root access not because of phishing emails or malvertising, but due to inherent flaws on original device chipsets.

It’s a warning to developers and manufacturers alike: No segment of the mobile ecosystem is beyond the reach of motivated malware-makers.

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today