sb-nz logo
Story image

New security flaw on Samsung, LG Android devices

A new security flaw has been discovered within the Android operating system that affects devices made by several major manufacturers.

Global security vendor Check Point disovered the vulnerability and disclosed its findings during a briefing session at Black Hat USA 2015 in Las Vegas.

The company says the flaw afffects devices from Samsung, LG, HTC and ZTE.

Certifi-gate is a vulnerability that allows applications to gain illegitimate privileged access rights that are typically used by remote support applications that are either pre-installed or personally installed on the device, Check Point explains. Attackers can exploit Certifi-gate to gain unrestricted device access, allowing them to steal personal data, track device locations, turn on microphones to record conversations, and more.

The security firm says Android offers no way to revoke the certificates that are providing privileged permissions. Left unpatched, and with no reasonable workaround, devices are exposed right out of the box, it says.

"Every day, people around the globe use mobile devices to manage important aspects of their lives: they access work email, manage bank accounts, and track health information," says Dorit Dor, vice president of products at Check Point Software Technologies.

"The problem is, they rarely stop to think about whether their data is secure,” Dor says.

“This vulnerability is very easily exploited, and can lead to the loss and dissemination of a user’s personal data. It’s time to take mobile security seriously."

All affected vendors were notified by Check Point about Certifi-gate and have begun releasing updates.

Dor says the vulnerability cannot be fixed, and can only be updated when a new software build is pushed to the device – a notoriously slow process, he says. “Android also offers no way to revoke certificates used to sign vulnerable plugins.”

Android users can check to see if their device is vulnerable to Certifi-gate by downloading a free Check Point Certfi-gate scanner app in Google Play.

Check Point today launched Check Point Mobile Threat Prevention, a new mobile security solution enterprises can use to battle the evolving mobile threat environment and to detect threats such as Certifi-gate, malicious apps, and Man-in-the-Middle attacks.

“With the highest level of security for stopping threats on iOS and Android, the solution delivers real-time visibility and threat intelligence into an organisation’s existing security and mobility infrastructures,” Dor explains.

“Deployment is easy and not only has integration into an organisation’s mobility and security infrastructure but it also provides a transparent user experience that maintains privacy and performance.”

Story image
High-tech heist: why fending off ransomware attacks is more challenging than ever in 2020
The COVID-19 crisis has unleashed a wave of sophisticated and disruptive ransomware attacks, and the onus is on businesses to ramp up their security measures if they’re to avoid falling victim, writes Attivo Networks regional director for A/NZ Jim Cook.More
Story image
Commvault launches Metallic in A/NZ region for first global expansion
The Australia and New Zealand region continues to be a priority market for Commvault, as cloud adoption across the region leads global averages, the company states.More
Link image
How to better protect your organisation's most valuable asset - its data.
Data resilience strategies are becoming increasingly critical in relation to the skyrocketing value of data and the proliferation of malicious entities wishing to steal it.More
Story image
NortonLifeLock introduces dark web monitoring to its security suite
Dark Web Monitoring Powered by LifeLock will be capable of monitoring the dark web, searching for over 120 personal identifiable information including email, physical address, phone number, driver licence number, credit card or bank account numbers and gamer tags.More
Link image
Webinar: How to navigate an increasingly crowded field of security solutions
Tools need to be organised and managed, issues need to be explored and resolved and all of this takes money and time. Find out more in this immersive webinar.More
Story image
Plugging the gaps: Australian organisations are leaving their defence barriers wide open
Cybercriminals are are walking through the gaping holes in Australia’s organisational defences – gaps that leadership teams don’t even realise are there.More