Millions of Android devices are again vulnerable after the researchers discovered a new way to exploit an old vulnerability previously repaired or apparently resolved by Google.

Now the security researchers of NorthBit security company, which is based in Israel, published an article describing the “Metaphor,” a nickname for the new loophole found in Stagefright, a multimedia library of Android, which compromises any Android phone reliably.

New Way To Explore The Stagefright Flaw In Android

According to the security researchers of NorthBit security company, the attack works best in Google Nexus 5 devices, HTC One, LG G3, and Samsung Galaxy S5.

However, the Security researchers of NorthBit security company ensure that the problem should not reach those devices running on Android version 6.0 Marshmallow or higher.

Security researchers of NorthBit security company developed a proof of concept and managed to create a method to break down the defenses.

But, right now, the malware can break into your device and send the data stored on your device back to the attacker, and the process can be repeated several times until your whole information is acquired by the attacker. However, the entire process takes not more than 20 seconds.

In early 2015, when millions of Android devices were affected, the Zimperium security company found the first flaws in Stagefright. Since then, Google has repeatedly targeted the patches for the loopholes in Stagefright.

Google estimated that about 235,000 Android devices run on version 5.0 and 5.1 Lollipop, and about 40 million runs on version 2.2 Froyo.

The vice president of Veracode security company Chris Eng said, “it is likely that Google will resolve the issue quickly.

But the distribution of patches Stagefright’s has been uneven.” Chris Eng Also adds, “Repair application vulnerabilities is especially challenging for the Android community with several different manufacturers and operators entrusted with the responsibility of directing the repairs to the devices,” said Eng.

LEAVE A REPLY

Please enter your comment!
Please enter your name here