Tuesday, November 12, 2024
HomeBackdoorMillions of Smartphones are Vulnerable to inject Backdoor via open Ports

Millions of Smartphones are Vulnerable to inject Backdoor via open Ports

Published on

Malware protection

[jpshare]A Recent Research Revealed by University of Michigan  Research team, Open Ports Create Backdoors in Millions of Smartphones .This Vulnerability Existing in Low secured Server Software which used to Serve for Remote Clients . 

Many of Smart phones are using Open ports support  in server and mostly it serves in Traditional servers which communication endpoint for accepting incoming connections.

- Advertisement - SIEM as a Service
According to the Researchers From University of Michigan,  perform an open port usage analysis on 24K popular Android apps from Google Play ,and successfully classify 99% of the usage 5 category which including data sharing, proxy, remote execution, VoIP call,and PhoneGap by  Using OPAnalyzer tool which Developed by they own

These open port Families, if its not much Protected  most of the ports are directly enable a number of serious remote exploits .

Most popular usage, data sharing, over half of the paths can be easily triggered by any remote attacker, and in some usage categories such as proxy, over 80% of the paths are not protected.

According to the output of the OPAnalyzer  Tool, they uncover 410 vulnerable applications with 956 potential exploits in total, and manually confirm 57 vulnerable apps including popular ones with 10 to 50 million downloads on the official market, and also an app that is pre-installed on some device models.

Researchers Reported, “If one of these vulnerable open port apps is installed, your phone can be fully taken control of by attackers.”

Design Pattern of Open Port Apps:

Android application that opens a port for Accepting remote Command to push notifications on the client’s Device. The application initially makes a ServerSocket to Listen in on a TCP port.

Once a Victims associates with the port, the application peruses the remote contribution from the attachment and serves the demand.

In this illustration, the application checks whether the remote info contains the “PUSH” Command, and assuming this is the case, it begins pushing the messages contained in the remote contribution to Device notice bar.

 An app’s open ports to steal photos with on-device malware:

The incoming connection notification, which pops up a window when a new host connects to the open port and displays the IP address of the host And the request is not served until user explicitly accepts the client by clicking the “allow” button,  researchers said

Here the Demo Videos tested by the Researcher for steal photos with on-device Malware.

Steal photos via a network attack:

Victims behind NAT or using private WiFi networks, attackers sharing the same local network can use ARP scanning  to find reachable smartphone IP addresses at first, and then launch targeted port scanning to discover vulnerable open ports .

 Force to SMS to a premium service:

This video Demonstrate How Attacker Forcing victims to send a Premium rate  SMS with one Click.

These vulnerabilities can be exploited to cause highly-severe damage such as remotely stealing contacts,photos, and even security credentials, and also performing sensitive actions such as malware installation and malicious code execution, Researchers said.

Also Read:

Mass Scan Revealed More Than 30000 Windows Computers Infected by NSA backdoor DoublePulsar

A new IoT Botnet is Spreading over HTTP Port 81 and Exploit the Vulnerability in Security Cameras

Smartphone Sensors can Spying your Mobile and Reveal PINs and Passwords by Tracking your Motion

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and...

Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace

Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS...

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Researchers Backdoored Azure Automation Account Packages And Runtime Environments

Runtime environments offer a flexible way to customize Automation Account Runbooks with specific packages....

Hackers Using Supershell Malware To Attack Linux SSH Servers

Researchers identified an attack campaign targeting poorly secured Linux SSH servers, where the attack...

UNC2970 Hackers Attacking Job Seekers Using Weaponized PDF Reader

UNC2970, a North Korean cyber espionage group, used customized SumatraPDF trojans to deliver MISTPEN...