City
Epaper

Surveillance vendor targeted Samsung smartphones with zero-day bugs: Google

By IANS | Updated: November 11, 2022 10:15 IST

New Delhi, Nov 11 Google has warned that a commercial surveillance vendor was exploiting three zero-day security vulnerabilities ...

Open in App

New Delhi, Nov 11 Google has warned that a commercial surveillance vendor was exploiting three zero-day security vulnerabilities in new Samsung smartphones that could have been exploited to steal users' data.

All three vulnerabilities were in the manufacturer's custom components rather than in the Android Open Source Project (AOSP) platform or the Linux kernel.

"It's also interesting to note that 2 out of the 3 vulnerabilities were logic and design vulnerabilities rather than memory safety," said Maddie Stone, Project Zero.

"While we understand that Samsung has yet to annotate any vulnerabilities as in-the-wild, going forward, Samsung has committed to publicly sharing when vulnerabilities may be under limited, targeted exploitation, as part of their release notes," Stone added in a blog post.

"We hope that, like Samsung, others will join their industry peers in disclosing when there is evidence to suggest that a vulnerability is being exploited in-the-wild in one of their products".

The Google Threat Analysis Group (TAG) obtained a partial exploit chain for Samsung devices that it believes belonged to a commercial surveillance vendor.

"All 3 vulnerabilities are within Samsung custom components, including a vulnerability in a Java component," said the team.

The exploit sample targeted Samsung phones running kernel 4.14.113 with the Exynos SOC.

"Samsung phones run one of two types of SOCs depending on where they're sold. For example the Samsung phones sold in the United States, China, and a few other countries use a Qualcomm SOC and phones sold in most other places (example Europe and Africa) run an Exynos SOC," said the Google team.

Examples of Samsung phones that were running kernel 4.14.113 in late 2020 (when this sample was found) include the S10, A50, and A51 smartphones, the team added.

"The analysis of this exploit chain has provided us with new and important insights into how attackers are targeting Android devices. It highlights a need for more research into manufacturer specific components," said Google.

Disclaimer: This post has been auto-published from an agency feed without any modifications to the text and has not been reviewed by an editor

Tags: Sweet Maddie StonegooglesamsungNew DelhiUnited StatesThe statesEuaWord on macThe new delhi municipal councilWho dgDelhi south-west
Open in App

Related Stories

EntertainmentAjith Kumar Injured in Fan Frenzy After Padma Bhushan Award Ceremony, Actor Hospitalized In Chennai

MaharashtraReligion Is One Consideration In Custody Cases, But Child Welfare Is Primary Factor: Bombay High Court

MaharashtraOver 10,000 Pakistani Nationals Traced in Maharashtra and Delhi Post-Palgham Terror Attack

InternationalUS Visa Waiver Program: Can Indian Passport Holders Enter the US Without Visa? Citizens of 41 Countries Get Free Entry

TechnologyGoogle Layoffs: Indian Employees in Hyderabad and Bengaluru Likely to Be Affected

Technology Realted Stories

TechnologyStudy finds long Covid biomarkers in blood linked to respiratory problems

TechnologyAbsolutely false: Tesla chair denies report about replacing Musk as CEO

TechnologyGitHub Copilot surpasses 15 million users, India a bright spot

TechnologyIncreasing urban vegetation can save over 1.1 mn lives from heat-related deaths: Study

TechnologyStudy shows young adults not as happy as before