Are you an android smartphone user? If yes, then you must be cautious as over 900million Android devices are affected by ‘high-risk’Quadrooter flaw. This flaw is found in devices running Qualcomm processors.
This was the second time in this year, a flaw was detected in the Qualcomm processors. Earlier this year (in May), hackers gained the access to several million Android smartphones running on Qualcomm processors that are exposed to a bug.
Recently, a new bug was found in the devices running Qualcomm processors. Hackers used to get control of your phone by any one of the four vulnerabilities that are included in QuadRooter. A security company Check Point Software Technologies says,
“If exploited, QuadRooter vulnerabilities can give attackers complete control of devices and unrestricted access to sensitive personal and enterprise data on them. Access could also provide an attacker with capabilities such as keylogging, GPS tracking, and recording video and audio.”
Hackers can accelerate of any of these four vulnerabilities using a venomous app. Check point further says,
“Such an app would require no special permissions to take advantage of these vulnerabilities, alleviating any suspicion users may have when installing.”
According to the blog post, QuadRooter affects the drivers of the smartphone that control communication between the various chipset components. Only the Original Equipment Manufacturers (OEM) can fix this flaw by issuing the software patch because these drivers are pre-installed on devices at manufacturing level.
So, the check Point recommends android smartphone users to download and install the latest updates as soon as they become available. The company also warns the users to avoid side-loading apk files and also to read app permission requests carefully before installing the apps.
Most of the latest smartphones such as Samsung Galaxy S7, Galaxy S7 Edge , OnePlus 3, Google Nexus 5X, Nexus 6, Nexus 6P, LG G4, LG G5 , LG V10, OnePlus One, OnePlus 2, OnePlus 3 etc. are vulnerable to the QuadRooter.