Connect with us

Bugs and Issues

These Android apps are putting users’ data at risk, be aware [May 2021]

Published

on

Android

When software technology has reached the pinnacle in today’s era, it has been impossible to always stay protected from the virus and bugs. Because our day starts with the software applications as well as ends with them.

In other words, we can say that the Android Apps has been making a great place in our daily routine. We also can’t deny that they have almost every piece of information about us.

However, somewhere we need to feed our data in the Android applications to activate them. But have you ever think that if your data has been safe or not?

According to the latest report generated from Check Point Research, many popular Android apps have been harming users’ personal information because of third-party applications’ inadequate security arrangements.

Advertisement

The report points out that 23 different apps obtainable from Google Play Store have individual security problems. Shockingly, these apps have recorded 50,000 to 10 million downloads, which show their popularity.

How the data has been misused:

The data collected and stores through these apps are used by the hackers to modify it and further spread the malware, phishing links, misleading contents, and notifications.

What Android apps have security problems:

The research firm detected 23 Android apps that have these security problems. Among them, 13 apps are said to work on real-time database information.

The report individually pointed out 5 different Android apps with thousands of registered users, which are described as follows-

Advertisement
  • Astro Guru- AstroGuru is an astrology app that claims gives you the best of palm reading by actually scanning your palm. It has over 10 million installs
  • iFax- This app allows you to send faxes as you would from a fax machine. It’s using by more than 5 million people & 20,000 companies.
  • Logo Maker- This graphic design app has more than 170,000 signups. The agency noticed that it can access user names, account IDs, emails, and passwords.
  • Screen Recorder- With more than 10 million downloads it can track the users’ activity.
  • T’Leva- This free app that allows you, in the passenger version, to comfortably call for a taxi based on location, has more than 50,000 downloads. It can obtain the location data, full names, and phone numbers.

How to prevent from:

Well, there is no permanent way to be safe from these phenomena, only the precaution steps can help in avoiding them.

  1. In case you are using any of these applications, uninstall them
  2. Try to use two-factor authentication
  3. Set different passwords for different accounts
  4. Try not to feed your exact location
  5. Grant minimum permissions, if possible
  6. Use services that notify you of breaches and compromised accounts

These precautions can not completely avoid the transgression but can help in mitigating your risk of identity theft, fraud, and other scams.

Yash is a graduate of computer science and followed his way into journalism, he is interested in various subjects related to technologies and politics. Yash likes to listen classical songs and has a huge library of classical mixes.

Bugs and Issues

An advance cryptomining malware could be a threat to Huawei Cloud

Published

on

Huawei Cloud

An advanced version of crypto-mining malware has been found lately that could be a serious threat to Huawei Cloud and users. This malware was previously reported attacking the open-source software development platform- Docker Containers.

As per the report, this new malware version has enough algorithms to dodge the firewall rules creation function. Adding to this, it leaves a network scanner behind to track API-relevant ports of the other hosts.

However, this new crypto-mining malware is currently active in cloud environments. Furthermore, it’s checking for the other ecosystem that has previously been affected by this attack.

Before discussing its other details, let’s first know what crypto-mining is-

Advertisement

What is Crypto-mining :

Crypto-mining or Cryptojacking is defined as an online thread or malware that holds the ability to hamper and even crash an organization’s digital environment. In addition, it worked while staying completely hidden from a user.

In Cryptojacking, the attacker can use the victim’s devices without their concerns to secretly mine cryptocurrency. Likewise, it also causes financial losses for the victim and disruption to business workings. Moreover, it mainly targets cryptocurrencies or digital money.

On a Linux system, this digital currency miner malware has to follow a procedure shown in the figure. It not only harms the system but simultaneously removes its traces.

 Huawei Cloud crypto mining malware

Afterward, it replaces all users added by the other actors with the one created by them. It’s one of the basic steps follows by the cloud-targeting cryptojackers. Unlike other attackers, the cryptojackers use the Sudo programs in their accounts that provide root access to the system.

Advertisement

Furthermore, the attacker uses their own sh-RSA key to perform system adjustments and change the file permissions to a locked state. It restricts other users to get entire control of the vulnerable computer or device even if they gain access to the device.

 Huawei Cloud malware

Besides, the actors install the Tor proxy service that helps them in preventing from establishing a connection to other network scanning detection. For wrapping, there are binaries codes (linux64_shell, ff.sh, fczyo, xlinux) at UPX packer. Once the attack get complete control of the device, it began to execute its malicious activities.

 Huawei Cloud malware

However, there are some known vulnerabilities detected during the scan in this attack. Most of them are related to the weak password in some functions that includes

Some Known Vulnerabilities:

  1. SSH weak passwords
  2. Vulnerability in the Oracle WebLogic Server product of Oracle Fusion
  3. Middleware (CVE-2020-14882)
  4. Redis unauthorized access or weak passwords
  5. PostgreSQL unauthorized access or weak password
  6. SQLServer weak password
  7. MongoDB unauthorized access or weak password
  8. File transfer protocol (FTP) weak password

As you can see, what users can if on Huawei Cloud if this coin-mining malware has been surfed in actual. To be mention, all the describe info came from the leading data security and cybersecurity solution provider TrendMicro.

According to this firm, it has sent the acknowledgment report to Huawei Cloud to make the authorities aware of the crypto-mining malware. Now, we are waiting for Huawei to officially address this problem.

Advertisement

(Via- BleepingComputer)

Continue Reading

Bugs and Issues

HarmonyOS October security update resolves input verification issue

Published

on

Huawei has released the October security 2021 patch that soon rollout for eligible smartphones and tablets running on HarmonyOS. This monthly update fixes several known issues and vulnerabilities to resolve the improper behavior of the devices.

While exploring the patch details, we have come to know about a serious issue that can cause injection attacks, memory leakage, and compromised application. However, the HarmonyOS October 2021 security release note will fix this issue in the affected devices. You can check the basic details below-

  • Affected Sector: Applications
  • CVE: CVE-2021-37116
  • Description: It’s an input verification vulnerability
  • Impact: Successful exploitation of this vulnerability may affect the data confidentiality and product availability

HarmonyOS input verification issue

The input verification issue with high severity is only affecting the devices working on HarmonyOS 2.0 system. The device infected will this issue, accepts improper data or information while receiving data from an external party especially from untrusted sources.

An attacker can intentionally send malicious input into the system. Meanwhile, the affected devices aren’t able to verify the authenticity of the data and take it. It causes an application to carry out some unplanned action such as data leakage or confidential information exposers.

Advertisement

Moreover, the attackers relay malicious code through an application to another system that accepts it due to holes in input verification algorithms. Luckily, as the latest HarmonyOS security patch will be released for the devices, this input verification issue will be fixed.

Besides, the security update also acknowledged 2 medium levels of CVE in the framework, 2 high and 4 medium levels CVEs in the kernel, and 1 high and 5 medium to low-level system threats. In addition, 2 critical, 3 high and 6 medium levels security threats fix in the HarmonyOS 2.0 applications.

Continue Reading

Bugs and Issues

Huawei fixed a dangerous Bluetooth bug in September 2021 update

Published

on

Huawei Bluetooth Bug

With the release of the September 2021 Security Patch details, Huawei highlights the bugs and their fixes for the Huawei and Honor devices. It’ll fix various issues in the system alongside a Bluetooth bug that could harm a user in several ways.

The latest security patch includes a medium-level bug fix identity as CVE-2021-37039 on the smartphones running on EMUI 11.0.0, EMUI 10.1.1, Magic UI 4.0.0, Magic UI 3.1.1 Android skins. Once an attacker successfully exploits cross this Bluetooth bug, it may cause a serious Bluetooth DoS.

What is Bluetooth DoS:

The Bluetooth system in any device can be the mean of DoS (Denial of service) attracts and cloud seriously harm the victim. In BT DoS, the attacker or hacker frequently requests to pair the target’s Bluetooth device with his in order to access the personal info of the soon-to-be victim.

However, Huawei has timely recognized this flaw and release the patch fix. Once it reaches the device holders, they will get input verification notice before their device is paired with the other. It’ll help them to avoid intruders.

Advertisement

Bluetooth

In simple words, when someone wants to establish a BT connection with users, the device will ask for the owner’s permission before connecting the other device. If the second user is a known person, you can accept the request and can grant the permission. Furthermore, you can also deny it, if you don’t know the origin of the second device.

Know More: Monthly and Quarterly: September 2021 Huawei EMUI Devices (New and Old)

Although Huawei has released the patch details, the company hasn’t started the rollout process. It’s still releasing the June and July security patches not to talk about the August security release. Until the patch is available to the users, they can try to avoid enabling their BT, while not in use.

That’s all for now, Stay connected with us for more updates about Huawei.

Advertisement
Continue Reading