Stagefright bug now spreads via malicious audio information

Stagefright bug now spreads through malicious audio files

Cripes, what number of occasions is Google going to should patch earlier than the Stagefright exploit bug stays fastened? The corporate has already patched its code 3 times however on Thursday, safety analysis agency Ziperium (the blokes that initially found the flaw) introduced that it had found yet one more approach hackers might bypass an Android handset’s safety. This time, the malicious code could be delivered by an audio message.

Hackers can encode a bit of malware into an MP3 or Mp4 file after which disseminate it (worryingly, this type of digital supply car works rather well over public Wi-Fi connections). Any Android consumer who clicks on the downloaded file will immediate the OS to mechanically preview the music, infecting the gadget. And since nearly each construct of Android OS at present obtainable shares this similar auto-preview function, the exploit works almost universally. Google is reportedly already working to patch the vulnerability in Android’s core code, which must be prepared by the October Month-to-month Safety Replace on the fifth.

Featured Tales

Sponsored Content material

Examine Your Devices

Stagefright bug now spreads through malicious audio files

Immediately examine merchandise aspect by aspect and see which one is greatest for you!

Attempt it now →