Android Defenses Breached
On to some more crypto-hacker news, Chinese researchers have found hackers to be turning internet connections into tools for creating caches of the crypto coin Monero.
The devices that have been recognized as being used in this manner are Android phones and TV’s. Thus far 7000 devices in Chine have been hacked and used in the aforementioned manner. The devices processing powers were used in conjunction with an internet connection to produce or mine more Monero coin.
Thought this strategy is new, there is talk that this form of attack will become common place in the near future. Almost everyone now a days has a computer or phone connected to the internet, meaning there are plenty of sources for this to occur. Computers, IoT devices, phones and tablets could all be vulnerable soon enough.
The lab that discovered this breach, Netlab360, stated that this device hacking was possible due to an open port, a function in a device that allows the operating system to communicate with the internet. The port 5555 was the main form of access and allowed the hackers to retrieve a list of Android devices that were unsecured. Once the infiltration was complete, the hackers had released a malicious software known as a worm, and not the kind that birds eat, the kind that would spread to other unsecured devices.
The port that was abused to achieve this attack was not opened by the unauthorized party, but rather hitched a ride. The 5555 ADB ports were reported to have been open already, however there is still an ongoing investigation as to why these ports would have been opened.
Moral of this story, use secured networks and ensure the security of your devices is in place.
give us a call or send us an email and let’s take a look at your system and its defenses!
We have all become painfully aware of the involvement of technology to our daily lives and how it has been keeping keep eyes on us for more information about our lives.
This has been particularly noticeable with Facebook, the social media giant through the use of Ads. If you decide one day your interested in getting a DVD player and you decide to search for some on the internet, the next time you go to Facebook the Ad’s you’ll see are for DVD players. At first this was creepy and unsettling, but then the mechanics behind it came to light and you couldn’t help but be impressed with their advertisement team.
As time has passed however, there have been stories of companies like Facebook and Twitter that had information floating around from news articles and fake news that caused an uproar. Social media giants have been taking a lash for their uncontrolled content and the effects it has played in society. Now we are seeing a more strict and invested reaction by these social media giants to prevent the same issues from occurring and to help keep their business model on track.
Social media giants aren’t the only companies being scrutinized for their actions or inaction’s. Companies like Google and Apple are also under fire for their role in the technological web of rule breaking. For example, apparently Apple had released an update that slowed the older models of their phones in hopes that customers would upgrade and generate income for the company. There has been a lot of slack by the government when it comes to keeping these rising tech giants within the confines of the law, but now it seems legislation has their eyes set on these tech corporations.
The biggest concern right now in terms of the technology we use today, is the health effects it has on our children. Companies have made it their goal for many years to increase the amount of time people use their products, and that goes for children’s applications as well. There is worry that children are too susceptible to the technology available to them and that may lead to development issues, and because of this, there is some questioning of the ethical development of such technology.
Technology is coming under wraps by the government more and more as time passes, and this could have some positive and poor effects depending on where your interests lay.
Keep up to date on your technology and it’s vulnerabilities and solutions with RE2Tech. We make I.T. easy!
Have you taken precautions? Is your sensitive information at risk?
Give us a call or send us an email for all your I.T needs! We at Re2tech make I.T. happen!