100M users at risk from Chinese Android software devkit

Victor Barreiro Jr.

This is AI generated summarization, which may have errors. For context, always refer to the full article.

100M users at risk from Chinese Android software devkit
(UPDATED) The vulnerability acts like a back door that lets an attacker execute malicious commands on an affected device. Android users will want to scan for and remove potential vulnerabilities using a reputable security app.

MANILA, Philippines (UPDATED) – Around 100 million users of apps that take advantage of a software development kit (SDK) from Baidu are at risk after security firms found that the SDK gave backdoor-like access to a user’s device.

According to Trend Micro, the Moplus SDK is integrated in 14,112 applications.

PC World said the vulnerability in the Moplus SDK, called Wormhole, lets attackers “open an HTTP server on devices where affected apps are installed; the server doesn’t use authentication and accepts requests from anyone on the Internet.”

If an attacker sends a request to this hidden HTTP server, they can tell the device to execute commands that were implemented in the SDK, including grabbing information from the device, such as like location data and search queries.

It also lets the attacker add new contacts, upload files, make phone calls, display unwanted or otherwise fake messages, and install other applications.

Trend Micro also said the vulnerability is potentially easier to exploit than the Stagefright vulnerability, as it does not require social engineering to hit an unsuspecting target.

Trend Micro has also seen malware that takes advantage of the Wormhole vulnerability in Moplus. The malware is detected as ANDROIDOS_WORMHOLE.HRXA.

Trend Micro has informed Baidu and Google of the issue.

While 4,014 of the affected apps are from Baidu, the rest require the third-party developers to patch their apps to ensure protection from exploitation.

Baidu has released a new version of the SDK and asserts that no backdoor exists now. It will be further removing some inactive code in its next release. 

In the meantime, Trend Micro advises scanning for the vulnerability using a reputable mobile security app – Trend Micro suggests their own application – and then removing any affected apps.  – Rappler.com

Android phone image via Shutterstock

Add a comment

Sort by

There are no comments yet. Add your comment to start the conversation.

Summarize this article with AI

How does this make you feel?

Loading
Download the Rappler App!
Person, Human, Sleeve

author

Victor Barreiro Jr.

Victor Barreiro Jr is part of Rappler's Central Desk. An avid patron of role-playing games and science fiction and fantasy shows, he also yearns to do good in the world, and hopes his work with Rappler helps to increase the good that's out there.