Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


06:26 PM
Connect Directly

Droid Smartphone Hacked

Exploit lets phone users gain administrative root access to Google Android-based phones

First the iPhone, now the Droid: A hacker has unleashed an exploit that lets a user wrest administrative root control of his or her Motorola Droid smartphone.

The code, which was posted on the AllDroid online forum, lets a user gain root privileges to either Motorola Droid Android 2.0 or Android 2.0.1 version phones. That basically means a user can run whatever themes, gadgets, and applications he or she wants -- akin to a jailbroken iPhone. The Droid, which is based on Google's Android operating system, runs on Verizon's network.

Unlocking or jailbreaking comes with its risks, too, of course: Not only could it possibly "brick" or render the device unoperational and deactivate its warranty, but a jailbroken phone also leaves the door open for malware writers.

Andrew Storms, director of security operations for nCircle, says the danger to enterprises is that users could then work around any IT security policies. "I'm telling IT, 'Don't ignore people coming back after Christmas with their new Droids,'" Storms says. "They are going to want them for work, and you have to get one and see what you can do to reach a compromise."

Treat mobile devices like laptops, he says. "Now you have this mobile device where an end user can continually make any changes that he desires. Now it becomes an untrusted platform, and it's unknown what the user has done, installed, or subverted," whether the user realizes it or not, he says. "Enterprise IT should be concerned."

Just what the "rooted" Droid means for consumer users is unclear, Storms says. "It's still too early to say what a rooted Android looks like... It's only been 48 hours since the [exploit] went public," he says.

While the iPhone has a big jump on the Droid in terms of smartphone popularity, the open-source Android operating system is attractive because of its relatively aggressive pricing. "My predictions for mobile malware follow the same trends you see with PCs," Storms says. And that means more phishing attacks, botnets recruiting smartphones, and other malware, he says.

"Attackers are still going after your personal and private information, whether it's on a PC or mobile device," he says.

The challenge for securing these devices is that users can easily "let down their guard" more easily than when on their PCs, he says. "On the road or in a bar" you're more likely to click on something you would not while at your desk, Storms says.

And the Droid's appeal to hackers will increase as it becomes more pervasive, he says, which is likely to jump significantly in 2010. "I'm predicting huge sales of smartphones in 2010," he says. "The Droid has a cheaper price point," which will boost its sales and the potential for malware and attacks, he says.

Meanwhile, the root exploit and instructions for jailbreaking the Droid are posted here.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-16
A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions < V7.23.19), Mendix Applications using Mendix 8 (All versions < V8.17.0), Mendix Applications using Mendix 8 (V8.12) (All versions < V8.12.5), Mendix Applications using Mendix 8 (V8.6) (All versions <...
PUBLISHED: 2021-04-16
Adobe Genuine Service version 6.6 (and earlier) is affected by an Uncontrolled Search Path element vulnerability. An authenticated attacker could exploit this to to plant custom binaries and execute them with System permissions. Exploitation of this issue requires user interaction.
PUBLISHED: 2021-04-16
Adobe Genuine Service version 6.6 (and earlier) is affected by an Improper Access control vulnerability when handling symbolic links. An unauthenticated attacker could exploit this to elevate privileges in the context of the current user.
PUBLISHED: 2021-04-16
Adobe Genuine Service version 6.6 (and earlier) is affected by an Uncontrolled Search Path element vulnerability. An authenticated attacker could exploit this to rewrite the file of the administrator, which may lead to elevated permissions. Exploitation of this issue requires user interaction.
PUBLISHED: 2021-04-16
SQL Injection in Tribalsystems Zenario CMS 8.8.52729 allows remote attackers to access the database or delete the plugin. This is accomplished via the `ID` input field of ajax.php in the `Pugin library - delete` module.