Stagefright – again :)

Unfortunately it is not the stagefright you are probably thinking about 🙁

Stagefright is the name given to a malicious program which can affect over 1 billion Android phones.

Yes, you heard that right – ONE BILLION ANDROID PHONES. That is a lot of phones.

This is actually the second variant of Stagefright and it will infect even the latest Android phones.

There was Stagefright v1 which was spread thru Google Hangouts and Messenger but this was contained by Google.

Well, we now have Stagefright v2

How do you get get it?

Three ways :

  • You visit a website which is bobby trapped.
  • You are attacked from within the network you are on thru your unencrypted browsing, i.e http
  • You play a video or a song which is booby trapped

How do you prevent it?

First and foremost, there are free and paid-for anti-malware products which are installable on Android phones but not having tried any of them, I would hesitate to recommend any.

Secondly, don’t visit sites which are suspect, eg porn sites, sites which promise wonderful riches, pirate sites, etc.

Third, don’t play media you have downloaded from suspect sites or have received from unknown sources.

Other Links

http://blog.zimperium.com/zimperium-zlabs-is-raising-the-volume-new-vulnerability-processing-mp3mp4-media/

==============================================================

http://arstechnica.com/security/2015/10/a-billion-android-phones-are-vulnerable-to-new-stagefright-bugs/

 A billion Android phones are vulnerable to new Stagefright bugs

Stagefright 2.0 comes as Android users were still recovering from Stagefright 1.

Ron Amadeo

There’s a new round of Stagefright vulnerabilities that allows attackers to execute malicious code on more than one billion phones running ancient as well as much more recent versions of Google’s Android operating system.

Stagefright 2.0, as it’s being dubbed by researchers from security firm Zimperium, is a set of two bugs that are triggered when processing specially designed MP3 audio or MP4 video files. The first flaw, which is found in the libutils library and is indexed as CVE-2015-6602, resides in every Android version since 1.0, which was released in 2008. The vulnerability can be exploited even on newer devices with beefed up defenses by exploiting a second vulnerability in libstagefright, a code library Android uses to process media files. Google still hasn’t issued a CVE index number for this second bug.

When combined, the flaws allow attackers to used booby-trapped audio or video files to execute malicious code on phones running Android 5.0 or later. Devices running 5.0 or earlier can be similarly exploited when they use the vulnerable function inside libutils, a condition that depends on what third-party apps are installed and what functionality came preloaded on the phone. In a blog post published Thursday, Zimperium researchers wrote:

The vulnerability lies in the processing of metadata within the files, so merely previewing the song or video would trigger the issue. Since the primary attack vector of MMS has been removed in newer versions of Google’s Hangouts and Messenger apps, the likely attack vector would be via the Web browser.

  1. An attacker would try to convince an unsuspecting user to visit a URL pointing at an attacker controlled Web site (e.g., mobile spear-phishing or malicious ad campaign)
  2. An attacker on the same network could inject the exploit using common traffic interception techniques (MITM) to unencrypted network traffic destined for the browser.
  3. 3rd party apps (Media Players, Instant Messengers, etc.) that are using the vulnerable library.

Zimperium researchers found an earlier round of vulnerabilities that also made it possible for attackers to remotely hijack Android phones. Those bugs, all residing in Android’s libstagefright, were especially alarming because they could be exploited by booby-trapped media files included in a text message. Google has since redesigned its Hangouts and Messenger apps to prevent that possibility. More recently, company developers have also fixed the underlying vulnerabilities in newer versions of Android, although those updates remain unavailable to many users. Members of Google’s Project Zero security research team recently found that Android’s address space layout randomization provided only minimal protection against Stagefright exploits.Google representatives have said the new round of Stagefright bugs will be fixed in an update scheduled for release next week. Once Google makes the update available, it could take as long as a week for it to become available to users of Google-branded Nexus phones and even longer for other brands.

 

3 comments for “Stagefright – again :)

  1. Mercy
    October 4, 2015 at 1:16 am

    better download music or video from youtube to avoid attack from stagefright bugs?

    • moses
      October 4, 2015 at 1:20 am

      Yeah, sounds like it but there are other trusted sites as well besides Youtube.

      It’s just a question of practising safe computing as far as I can see.

      • Mercy
        November 12, 2015 at 12:46 am

        CM Security offered to against stagefright bug.

Leave a Reply

Your email address will not be published. Required fields are marked *