Stagefright bug now spreads via malicious audio information
Cripes, what number of occasions is Google going to should patch earlier than the Stagefright exploit bug stays fastened? The corporate has already patched its code 3 times however on Thursday, safety analysis agency Ziperium (the blokes that initially found the flaw) introduced that it had found yet one more approach hackers might bypass an Android handset’s safety. This time, the malicious code could be delivered by an audio message.
Hackers can encode a bit of malware into an MP3 or Mp4 file after which disseminate it (worryingly, this type of digital supply car works rather well over public Wi-Fi connections). Any Android consumer who clicks on the downloaded file will immediate the OS to mechanically preview the music, infecting the gadget. And since nearly each construct of Android OS at present obtainable shares this similar auto-preview function, the exploit works almost universally. Google is reportedly already working to patch the vulnerability in Android’s core code, which must be prepared by the October Month-to-month Safety Replace on the fifth.