Android's Jelly Bean, Kit Kat under cyber threat: CERT | HT Tech

Android's Jelly Bean, Kit Kat under cyber threat: CERT

A “critical flaw” has been detected in the virtual private network offered by Android operating systems in the Indian cyberspace leading to “hijack” of personal data of users.

By:PTI
| Updated on: Mar 03 2014, 12:24 IST
image caption

A "critical flaw" has been detected in the virtual private network offered by Android operating systems in the Indian cyberspace leading to "hijack" of personal data of users.

Internet security sleuths have alerted consumers of this web-based service to guard against the spread of this virus which affects computer systems and mobile phones using the Android system.

You may be interested in

MobilesTablets Laptops
3% OFF
Samsung Galaxy Z Fold5
  • Icy Blue
  • 12 GB RAM
  • 256 GB Storage
Vivo X100 Pro 5G
  • Asteroid Black
  • 16 GB RAM
  • 512 GB Storage
8% OFF
Apple iPhone 15 Plus
  • Black
  • 6 GB RAM
  • 128 GB Storage
10% OFF
Realme 12 Plus
  • Pioneer Green
  • 8 GB RAM
  • 128 GB Storage

The suspicious activity has been noticed in two Android versions — 4.3 known as 'Jelly Bean' and the latest version 4.4 called 'Kit Kat'.

Also read
Looking for a smartphone? To check mobile finder click here.

"A critical flaw has been reported in Android's (virtual private network) VPN implementation, affecting Android version 4.3 and 4.4 which could allow an attacker to bypass active VPN configuration to redirect secure VPN communications to a third party server or disclose or hijack unencrypted communications," the Computer Emergency Response Team of India (CERT-In) said in a latest advisory to users of this network.

The CERT-In is the nodal agency to combat hacking, phishing and to fortify security-related defences of the Indian Internet domain.

VPN technology is used to create an encrypted tunnel into a private network over public Internet. Organisations and group of people use such connections to enable employees or acquaintances to securely connect to enterprise networks from remote locations through multiple kinds of devices like laptops, desktops, mobiles and tablets.

The agency said the current malicious application is capable of diverting the VPN traffic "to a different network address" and successful exploitation of this issue "could allow attackers to capture entire communication originating from affected device."

The lethality of the virus to disrupt a system is large.

"It is noted that not all applications are encrypting their network communication. Still there is a possibility that attacker could possibly capture sensitive information from the affected device in plain text like email addresses, IMEI number, SMSes, installed applications," the advisory said.

Cyber experts said that this anomaly could only lead to capture and viewing the data which is in plain text and Android applications directly connecting to the server using SSL will not be affected.

Websites which use 'https' in their URL will also be safe.

The cyber agency has also suggested some countermeasures to beat this threat.

"Apply appropriate updates from original equipment manufacturer, do not download and install application from untrusted sources, maintain updated mobile security solution or mobile anti-virus solutions on the device, exercise caution while visiting trusted or untrusted URLs and do not click on the URLs received via SMS or email unexpectedly from trusted or received from untrusted users" are some of the combat techniques which have been suggested by the agency.

Catch all the Latest Tech News, Mobile News, Laptop News, Gaming news, Wearables News , How To News, also keep up with us on Whatsapp channel,Twitter, Facebook, Google News, and Instagram. For our latest videos, subscribe to our YouTube channel.

First Published Date: 03 Mar, 12:03 IST
NEXT ARTICLE BEGINS