A vulnerability had existed in Google’s eponymous Android app with over five billion downloads to date that might have enabled an attacker to stealthily steal the personal information of a victim’s device.
In a blog post-Sergey Toshin, the founder of Oversecured Mobile App Security Group, noted that it’s about the way the Google app relies on code that is not packaged with the app directly. Several Android apps, notably the Google application, decrease download size and storage space by depending on code libraries installed on Android smartphones.
However, the shortcoming in Google’s code allowed the malicious application to inherit the permissions of the Google app and permit it to almost completely access data from a user.
The malicious application could also pull the code library from a malicious app on the very same device rather than its legitimate code library. This access includes access to Google user accounts, search histories, e-mails, text messages, contacts, and call history, as well as microphone/camera triggering and user location.
Toshin added that the malicious application will be activated once for the attack to start, but it is carried out without the knowledge or cooperation of the user. He added that removing the malicious program will not remove malicious components from the Google app.
A Google spokesman told that last month it addressed the issue and there was no proof that the attackers would be using the flaw. The built-in malware scanner of Android, Google Protect Play, will stop the installation of harmful apps. However, there is no absolute safety feature, and malicious apps are already on the internet.
Toshin stated that the vulnerability in Google’s app is almost like a bug identified in TikTok earlier in this year that would allow an attacker to hijack a TikTok user’s session tokens which are exploited to gain control of their account.
Oversecured identified several other identical vulnerabilities, including the Google Play app for Android and more recent pre-installed apps on Samsung phones.
If you like the site, please consider joining the telegram channel or supporting us on Patreon using the button below.