News

The Samsung Hack Could Still Put You at Risk

Although Samsung claims that no personal data is lost

Important consequences

  • The Stolen Galaxy device source code could be used as an easier way for hackers to find vulnerabilities and weaknesses.
  • If the attackers also got the bootloader source code, they could gain system-level access to the devices.
  • The best thing customers can do is keep up with security updates and be very careful when installing new apps or following URLs.

Close-up of a person using a smartphone against a dark background.

d3sign/Getty Images

Samsung said the recent attack, which resulted in the theft of source code for Galaxy devices, is nothing to worry about – but some experts say there is cause for concern.

Although Samsung offers assurances that neither customer nor employee personal information has been compromised, this is the only possible route hackers can take. The recovered data, which hackers say includes biometric authentication algorithms and bootloader source code, can still be used in harmful ways.

“Many high-profile breaches have resulted in the loss of personal data that could potentially affect individuals,” Purandar Das, CEO and co-founder of encryption-based data security solutions company Sotero, said in an email. email to Lifewire. It is a baseline, rather a knee-jerk response, that personal data is not lost, and is not a true indicator of the negative potential posed by any data breach.

Crack detection

The big concern among security experts over the leaked Galaxy device source code is what that code could be used for. Admittedly, it’s not exactly a key to the famous city of Samsung devices; hackers won’t be able to instantly endanger critical systems or anything like that. However, they can use the data to find vulnerabilities that may not have been discovered yet, and then find ways to exploit them.

“Users should be very careful when installing apps on their phones, making sure it’s a known and trusted app and doesn’t require too many permissions on the phone.”

“While every piece of software and every device contains some vulnerabilities, the process of finding these bugs can be extremely time-consuming and difficult,” Brian Contos, a 25-year cybersecurity veteran and chief security officer at Phosphorus Cybersecurity, said in a statement. email to Lifewire. . . But if you have access to all the source code, it greatly simplifies the process.

Hackers have been finding and exploiting vulnerabilities since computers have existed, but it takes time and effort. In this case, Samsung’s source code can be used as a sort of roadmap or blueprint, eliminating the need to find weaknesses in the first place.

“Any source code used to run devices or serve as authentication services on devices poses a serious problem,” admits Das. It can also serve as a framework for analyzing security controls that can be overridden later.

Bootloader issues

This can pose a significant security risk if the bootloader source code is also compromised, as claimed by the hacking group. Unlike the previously mentioned system source code, the bootloader is is It’s like having the keys to the city. It is the program required to start a piece of hardware (applications, operating system) and they all need to be started and it is the main function of the bootloader.

If a malicious party could exploit a device’s bootloader, they would basically have free rein over the entire system – provided they had the tools and the technical knowledge. Experts agree there is cause for concern, with 190GB of data stolen by Samsung available for download by just about anyone.

Close-up of a computer screen with the option

LPETTET/Getty Images

“A bootloader attack is particularly worrisome because it allows the attacker to break into the device below the operating system level, which means the hacker can bypass all security on the device. Contos said, “A bootloader attack can also be used to steal user credentials and possibly bypass device encryption.”

Unfortunately, there is not much we can do at the user level as the intercepted information can be used to help hackers discover new ways to attack Galaxy devices. Try to stay as up-to-date as possible with security updates and avoid taking unnecessary risks online. Beware of suspicious attachments, be very careful with the apps you download (and check the list of permissions), etc.

“The solution to this is in Samsung’s hands,” Das explained, “and they will have to release one or more patches that address known or potential vulnerabilities.”

“Samsung should also step up its own security analysis and code review to try to find these issues first,” Contos added. “Meanwhile, when users install apps on their phones, it is a well-known and trusted app and does not require many permissions on the phone. Moreover, especially in the United States. S “traveling abroad, they should be very careful not to leave their phone unattended. This is true even if the device is password or biometric protected.”


See more

The Samsung Hack Could Still Put You at Risk

Even though Samsung claims no personal data was lost

Key Takeaways
Stolen Galaxy device source code could be used as an easier way for hackers to locate security flaws and weaknesses.
If attackers also took the bootloader source code, they could gain system-level access to devices.
The best thing customers can do is stay on top of security updates and be very cautious when installing new apps or following URLs.
d3sign / Getty Images

Samsung has stated that the recent hack, which resulted in source code for Galaxy devices being stolen, is nothing to worry about—but some experts believe worrying is necessary.

While Samsung offered reassurance that neither customer nor employee personal information had been compromised, that’s only one possible avenue for the hackers to take. The data that was taken, which the hackers’ claim includes biometric authentication algorithms and bootloader source code, could still be used in damaging ways.

“Most high-profile breaches have resulted in the loss of personal data that has the potential to impact individuals,” said Purandar Das, CEO and co-founder of encryption-based data security solutions company Sotero, in an email to Lifewire, “Establishing a baseline that personal data wasn’t lost is more of a reflex response and not truly indicative of the adverse potential any data breach poses.”

Finding Cracks

A big concern security experts have about the Galaxy device source code leak is what that code could be used for. Granted, it’s not exactly a key to the proverbial city of Samsung devices; hackers aren’t going to be able to instantly compromise critical systems or anything like that. But they could use the data to find vulnerabilities that may not have been discovered yet, then figure out ways to exploit them.

“Users should be extra careful when installing apps on their phone by making sure it is a well-known and trusted app, and does not require too many permissions on the phone.”

“While every software program and every device contain some vulnerabilities, the process of finding these bugs can be extremely time-consuming and difficult,” said Brian Contos, 25-year cybersecurity veteran and Chief Security Officer of Phosphorus Cybersecurity, in an email to Lifewire. “But if you have access to the full source code, it makes the process substantially easier.”

Hackers have been finding and taking advantage of security vulnerabilities for as long as computers have existed, but it takes time and effort. In this situation, Samsung’s source code could be used as a sort of road map or blueprint that all but eliminates the need to search for weaknesses in the first place.

“Any source code that is used to operate devices or serve as authentication services on devices poses a severe problem,” Das agrees, “The code can be used to devise alternate paths, force the capture of data, or override security controls. The code can also serve as an analysis framework for security controls that can then be overridden.”

Bootloader Worries

If the bootloader source code was also compromised, as the hacking group claims, that could create a substantial security risk. Unlike the system source code mentioned previously, the bootloader is like having the keys to the city. It’s the program required to boot up a piece of hardware—applications, the operating system—it all needs to boot up, and that’s the bootloader’s primary function.

If a malicious party were able to exploit a device’s bootloader, they’d basically have free reign over the entire system—provided they had the tools and the know-how. Experts agree that, with 190GB of Samsung’s stolen data available to download by pretty much anyone, there is cause for concern.

LPETTET / Getty Images

“A bootloader attack is particularly worrisome because it allows the attacker to get into the device below the operating system level, which means the hacker can bypass all the security on the device,” Contos stated, “A bootloader attack can also be used to steal the user’s credentials and potentially bypass device encryption.”

Unfortunately, because the compromised information could be used to help hackers discover new ways to attack Galaxy devices, there isn’t much we can do on the user level. Just try to stay as current as possible with security updates, and avoid taking unnecessary risks online. Be wary of suspicious email attachments, pay close attention to the apps you download (and inspect the permissions list), and so on.

“The resolution to this is in the hands of Samsung,” Das explained, “They would have to release a patch or patches that address any known or potential vulnerabilities.”

“Samsung should also ramp up its own security analysis and review of its code, to try to find these problems first,” Contos added, “In the meantime, users should be extra careful when installing apps on their phone by making sure it is a well-known and trusted app, and does not require too many permissions on the phone. They should also be very careful about leaving their phones unattended, particularly if they travel outside the US. This is true even if the device is password- or biometric-protected.”

#Samsung #Hack #Put #Risk

The Samsung Hack Could Still Put You at Risk

Even though Samsung claims no personal data was lost

Key Takeaways
Stolen Galaxy device source code could be used as an easier way for hackers to locate security flaws and weaknesses.
If attackers also took the bootloader source code, they could gain system-level access to devices.
The best thing customers can do is stay on top of security updates and be very cautious when installing new apps or following URLs.
d3sign / Getty Images

Samsung has stated that the recent hack, which resulted in source code for Galaxy devices being stolen, is nothing to worry about—but some experts believe worrying is necessary.

While Samsung offered reassurance that neither customer nor employee personal information had been compromised, that’s only one possible avenue for the hackers to take. The data that was taken, which the hackers’ claim includes biometric authentication algorithms and bootloader source code, could still be used in damaging ways.

“Most high-profile breaches have resulted in the loss of personal data that has the potential to impact individuals,” said Purandar Das, CEO and co-founder of encryption-based data security solutions company Sotero, in an email to Lifewire, “Establishing a baseline that personal data wasn’t lost is more of a reflex response and not truly indicative of the adverse potential any data breach poses.”

Finding Cracks

A big concern security experts have about the Galaxy device source code leak is what that code could be used for. Granted, it’s not exactly a key to the proverbial city of Samsung devices; hackers aren’t going to be able to instantly compromise critical systems or anything like that. But they could use the data to find vulnerabilities that may not have been discovered yet, then figure out ways to exploit them.

“Users should be extra careful when installing apps on their phone by making sure it is a well-known and trusted app, and does not require too many permissions on the phone.”

“While every software program and every device contain some vulnerabilities, the process of finding these bugs can be extremely time-consuming and difficult,” said Brian Contos, 25-year cybersecurity veteran and Chief Security Officer of Phosphorus Cybersecurity, in an email to Lifewire. “But if you have access to the full source code, it makes the process substantially easier.”

Hackers have been finding and taking advantage of security vulnerabilities for as long as computers have existed, but it takes time and effort. In this situation, Samsung’s source code could be used as a sort of road map or blueprint that all but eliminates the need to search for weaknesses in the first place.

“Any source code that is used to operate devices or serve as authentication services on devices poses a severe problem,” Das agrees, “The code can be used to devise alternate paths, force the capture of data, or override security controls. The code can also serve as an analysis framework for security controls that can then be overridden.”

Bootloader Worries

If the bootloader source code was also compromised, as the hacking group claims, that could create a substantial security risk. Unlike the system source code mentioned previously, the bootloader is like having the keys to the city. It’s the program required to boot up a piece of hardware—applications, the operating system—it all needs to boot up, and that’s the bootloader’s primary function.

If a malicious party were able to exploit a device’s bootloader, they’d basically have free reign over the entire system—provided they had the tools and the know-how. Experts agree that, with 190GB of Samsung’s stolen data available to download by pretty much anyone, there is cause for concern.

LPETTET / Getty Images

“A bootloader attack is particularly worrisome because it allows the attacker to get into the device below the operating system level, which means the hacker can bypass all the security on the device,” Contos stated, “A bootloader attack can also be used to steal the user’s credentials and potentially bypass device encryption.”

Unfortunately, because the compromised information could be used to help hackers discover new ways to attack Galaxy devices, there isn’t much we can do on the user level. Just try to stay as current as possible with security updates, and avoid taking unnecessary risks online. Be wary of suspicious email attachments, pay close attention to the apps you download (and inspect the permissions list), and so on.

“The resolution to this is in the hands of Samsung,” Das explained, “They would have to release a patch or patches that address any known or potential vulnerabilities.”

“Samsung should also ramp up its own security analysis and review of its code, to try to find these problems first,” Contos added, “In the meantime, users should be extra careful when installing apps on their phone by making sure it is a well-known and trusted app, and does not require too many permissions on the phone. They should also be very careful about leaving their phones unattended, particularly if they travel outside the US. This is true even if the device is password- or biometric-protected.”

#Samsung #Hack #Put #Risk


Synthetic: Ôn Thi HSG

Trả lời

Email của bạn sẽ không được hiển thị công khai. Các trường bắt buộc được đánh dấu *

Back to top button