{"id":488,"date":"2016-11-25T14:41:13","date_gmt":"2016-11-25T21:41:13","guid":{"rendered":"http:\/\/dshsolutions.com\/wordpress\/?p=488"},"modified":"2016-11-25T14:41:13","modified_gmt":"2016-11-25T21:41:13","slug":"dangerous-rootkit-found-pre-installed-on-nearly-3-million-android-phones","status":"publish","type":"post","link":"https:\/\/dshsolutions.com\/wordpress\/dangerous-rootkit-found-pre-installed-on-nearly-3-million-android-phones\/","title":{"rendered":"Dangerous Rootkit found Pre-Installed on nearly 3 Million Android Phones"},"content":{"rendered":"<p>Luckily, not many US Android phones. \u00a0Just a matter of time before manufacturers install rootkits as a matter of course.<\/p>\n<blockquote><p>Nearly 3 Million Android devices worldwide are vulnerable to man-in-the-middle (MITM) attacks that could allow attackers to remotely execute arbitrary code with root privileges, turning over full control of the devices to hackers.<\/p><\/blockquote>\n<blockquote><p>According to a new report from security rating firm BitSight, the issue is due to a vulnerability in the insecure implementation of the OTA (Over-the-Air) update mechanism used by certain low-cost Android devices, including BLU Studio G from US-based Best Buy.<\/p><\/blockquote>\n<blockquote><p><a href=\"http:\/\/thehackernews.com\/2016\/11\/hacking-android-smartphone18.html\">Read the article&#8230;<\/a><\/p><\/blockquote>\n<p>Source: <em><a href=\"http:\/\/thehackernews.com\/2016\/11\/hacking-android-smartphone18.html\">Dangerous Rootkit found Pre-Installed on nearly 3 Million Android Phones<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Luckily, not many US Android phones. \u00a0Just a matter of time before manufacturers install rootkits as a matter of course. Nearly 3 Million Android devices worldwide are vulnerable to man-in-the-middle (MITM) attacks that could allow attackers to remotely execute arbitrary code with root privileges, turning over full control of the devices to hackers. According to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,4,5,6],"tags":[],"class_list":["post-488","post","type-post","status-publish","format-standard","hentry","category-hardware","category-privacy","category-security-2","category-smart-phones"],"_links":{"self":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/posts\/488","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/comments?post=488"}],"version-history":[{"count":0,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/posts\/488\/revisions"}],"wp:attachment":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/media?parent=488"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/categories?post=488"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/tags?post=488"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}