August 9, 2016 By Douglas Bonderud 2 min read

When it comes to malware, users are conditioned to look outside their device. Don’t open malicious attachments, follow suspicious links or fall victim to supposedly official emails from banks or credit agencies.

But what happens when pre-existing flaws make it possible for attackers to fully control a mobile phone or tablet? That’s the case with Quadrooter, a set of four privilege escalation vulnerabilities that may affect up to 900 million devices running Qualcomm chips, according to ZDNet. Here’s the scoop on this ramped up rooting risk.

Android Attacks on the Rise

There’s been a significant uptick in Android malware over the last few years as cybercriminals find ways to exploit mobile apps and recognize the huge potential this billion-user market represents.

As noted by Ars Technica, for example, a malware family called HummingBad — which may actually be part of Shedun — managed to infect more than 10 million handsets worldwide. Using unfixed vulnerabilities from older Android versions, the malware is able to root Android phones, install malicious apps and generate fraudulent advertisements. So far, attackers have enjoyed a significant payday with the malware producing more than $300,000 in revenue per month.

Then there are banking attacks like Android.Fakebank. According to BGR, not only does this do the old “steal account details and transfer money” shtick, but also prevents users from directly calling their bank to address the problem of fraudulent logins.

Put simply, cybercriminals have a vested interest in finding and exploiting new Android issues to grab valuable user data.

Fearsome Foursome

The so-called Quadrooter problem, meanwhile, takes a different track by targeting vulnerabilities on factory-installed Qualcomm chips.

As noted by PC Mag, the flaws were found by security firm Check Point and detailed at the recent DEF CON conference; the four new privilege exploits let attackers access saved data, change or remove system files, delete or add apps, and access virtually all phone services.

Since the Qualcomm chip drivers come pre-installed, there’s no way for users to prevent the potential of infection. If attackers can convince users to install a single malicious app, the bad guys gain total device control.

Qualcomm Chips In

Qualcomm and Google have been working to remedy the flaws, which affect everything from the Nexus 5X to Galaxy S7 Edge and even Blackberry’s DTEK50. While three vulnerabilities were addressed in the most recent security update, one is still outstanding because the patch wasn’t ready in time.

Qualcomm did release the affected code to partners, meaning it’s possible for device manufacturers to design their own in-house solution. Check Point now offers a Quadrooter checking tool that scans devices to determine if they’re fully protected as well.

While the Quadrooter issues were quickly identified and addressed by both the manufacturer and Google, the proof of concept here is worrisome. Almost 1 billion Android phones were put at risk of complete root access not because of phishing emails or malvertising, but due to inherent flaws on original device chipsets.

It’s a warning to developers and manufacturers alike: No segment of the mobile ecosystem is beyond the reach of motivated malware-makers.

More from

What we can learn from the best collegiate cyber defenders

3 min read - This year marked the 19th season of the National Collegiate Cyber Defense Competition (NCCDC). For those unfamiliar, CCDC is a competition that puts student teams in charge of managing IT for a fictitious company as the network is undergoing a fundamental transformation. This year the challenge involved a common scenario: a merger. Ten finalist teams were tasked with managing IT infrastructure during this migrational period and, as an added bonus, the networks were simultaneously attacked by a group of red…

A spotlight on Akira ransomware from X-Force Incident Response and Threat Intelligence

7 min read - This article was made possible thanks to contributions from Aaron Gdanski.IBM X-Force Incident Response and Threat Intelligence teams have investigated several Akira ransomware attacks since this threat actor group emerged in March 2023. This blog will share X-Force’s unique perspective on Akira gained while observing the threat actors behind this ransomware, including commands used to deploy the ransomware, active exploitation of CVE-2023-20269 and analysis of the ransomware binary.The Akira ransomware group has gained notoriety in the current cybersecurity landscape, underscored…

New proposed federal data privacy law suggests big changes

3 min read - After years of work and unsuccessful attempts at legislation, a draft of a federal data privacy law was recently released. The United States House Committee on Energy and Commerce released the American Privacy Rights Act on April 7, 2024. Several issues stood in the way of passing legislation in the past, such as whether states could issue tougher rules and if individuals could sue companies for privacy violations. With the American Privacy Rights Act of 2024, the U.S. government established…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today