August 9, 2016 By Douglas Bonderud 2 min read

When it comes to malware, users are conditioned to look outside their device. Don’t open malicious attachments, follow suspicious links or fall victim to supposedly official emails from banks or credit agencies.

But what happens when pre-existing flaws make it possible for attackers to fully control a mobile phone or tablet? That’s the case with Quadrooter, a set of four privilege escalation vulnerabilities that may affect up to 900 million devices running Qualcomm chips, according to ZDNet. Here’s the scoop on this ramped up rooting risk.

Android Attacks on the Rise

There’s been a significant uptick in Android malware over the last few years as cybercriminals find ways to exploit mobile apps and recognize the huge potential this billion-user market represents.

As noted by Ars Technica, for example, a malware family called HummingBad — which may actually be part of Shedun — managed to infect more than 10 million handsets worldwide. Using unfixed vulnerabilities from older Android versions, the malware is able to root Android phones, install malicious apps and generate fraudulent advertisements. So far, attackers have enjoyed a significant payday with the malware producing more than $300,000 in revenue per month.

Then there are banking attacks like Android.Fakebank. According to BGR, not only does this do the old “steal account details and transfer money” shtick, but also prevents users from directly calling their bank to address the problem of fraudulent logins.

Put simply, cybercriminals have a vested interest in finding and exploiting new Android issues to grab valuable user data.

Fearsome Foursome

The so-called Quadrooter problem, meanwhile, takes a different track by targeting vulnerabilities on factory-installed Qualcomm chips.

As noted by PC Mag, the flaws were found by security firm Check Point and detailed at the recent DEF CON conference; the four new privilege exploits let attackers access saved data, change or remove system files, delete or add apps, and access virtually all phone services.

Since the Qualcomm chip drivers come pre-installed, there’s no way for users to prevent the potential of infection. If attackers can convince users to install a single malicious app, the bad guys gain total device control.

Qualcomm Chips In

Qualcomm and Google have been working to remedy the flaws, which affect everything from the Nexus 5X to Galaxy S7 Edge and even Blackberry’s DTEK50. While three vulnerabilities were addressed in the most recent security update, one is still outstanding because the patch wasn’t ready in time.

Qualcomm did release the affected code to partners, meaning it’s possible for device manufacturers to design their own in-house solution. Check Point now offers a Quadrooter checking tool that scans devices to determine if they’re fully protected as well.

While the Quadrooter issues were quickly identified and addressed by both the manufacturer and Google, the proof of concept here is worrisome. Almost 1 billion Android phones were put at risk of complete root access not because of phishing emails or malvertising, but due to inherent flaws on original device chipsets.

It’s a warning to developers and manufacturers alike: No segment of the mobile ecosystem is beyond the reach of motivated malware-makers.

More from

Unpacking the NIST cybersecurity framework 2.0

4 min read - The NIST cybersecurity framework (CSF) helps organizations improve risk management using common language that focuses on business drivers to enhance cybersecurity.NIST CSF 1.0 was released in February 2014, and version 1.1 in April 2018. In February 2024, NIST released its newest CSF iteration: 2.0. The journey to CSF 2.0 began with a request for information (RFI) in February 2022. Over the next two years, NIST engaged the cybersecurity community through analysis, workshops, comments and draft revision to refine existing standards…

What should Security Operations teams take away from the IBM X-Force 2024 Threat Intelligence Index?

3 min read - The IBM X-Force 2024 Threat Intelligence Index has been released. The headlines are in and among them are the fact that a global identity crisis is emerging. X-Force noted a 71% increase year-to-year in attacks using valid credentials.In this blog post, I’ll explore three cybersecurity recommendations from the Threat Intelligence Index, and define a checklist your Security Operations Center (SOC) should consider as you help your organization manage identity risk.The report identified six action items:Remove identity silosReduce the risk of…

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today