10th November 2019
Security researchers have discovered a vulnerability in several popular Android devices. This bug allows an external attacker to spy on his owners via Bluetooth and USB accessories. The vulnerability was found in the AT commands used to communicate with baseband software on Android smartphones. 10 spy-endangered Android devices Kristina Kokhanova's picture of Shutterstock  This attack allows attackers to trick endangered phones into revealing their unique identifiers, such as IMEI and IMSI numbers, the connection of a target to interrupt calls, redirect calls to another phone, or block all calls. Complete phone and Internet connection. These are the ten Android devices affected by the vulnerability: – Samsung Galaxy S8 + – Huawei P8 Lite – Samsung Galaxy S3 – Huawei Nexus 6P – Samsung Note 2 – Google Pixel 2 – LG G3 – LG Nexus 5 – Motorola Nexus 6 – HTC Desire 10 Lifestyle
How can hackers spy on device owners?
All smartphones are equipped with a baseband processor (cellular modem) and an application processor (AP). AP is a general-purpose processor, while the baseband processor incorporates the implementation of radio-based cellular connectivity features. The application processor may issue input commands [AT] to interact with the baseband processor and perform various cellular network operations.
While smartphone applications and other parts of the device have limitations in sending AT commands, the researchers found that many Android smartphones allow access to baseband from USB and Bluetooth accessories. Bad actors can use this accessory to send AT commands. The researchers discovered more than 14 problematic AT commands that can trick the Android device and filter sensitive information.
These 10 Android devices can be hacked to spy on their owners.
[+] Videos from our YouTube channel