Man-in-the-disk: New vulnerability has put millions of Android phones at risk | HT Tech

Man-in-the-disk: New vulnerability has put millions of Android phones at risk

Thanks to ‘careless’ usage of external storage by certain apps, millions of Android users are left vulnerable to cyber threats, said Checkpoint researchers. Here’s everything you need to know about Man-in-the-disk flaw.

By: KUL BHUSHAN
| Updated on: Aug 13 2018, 13:46 IST
Everything you need to know about  the Man-in-the-Disk attack
Everything you need to know about the Man-in-the-Disk attack (Reuters)

Mobile handsets, especially the Android platform, have long been targeted by the cyber criminals. But most of the vulnerabilities or exploits have revolved around the software. Of late, the trend is changing with critical security flaws being found at the chipset levels. Now, security researchers have discovered a new flaw in the external storage that houses microSD cards.

The vulnerability, aptly dubbed as Man-in-the-disk, has put millions of Android phones at risk, reported security firm Checkpoint. Unfortunately, there's very little that users can do to protect themselves from this exploit. According to the researchers, the loophole is mainly because the Android applications have been "careless" about how they handle their data on these external storages.

You may be interested in

25% OFF
Google Pixel 8
  • Hazel
  • 8 GB RAM
  • 128 GB Storage
25% OFF
Google Pixel 8 Pro
  • Obsidian
  • 12 GB RAM
  • 128 GB Storage
31% OFF
Google Pixel 7 5G
  • Obsidian
  • 8 GB RAM
  • 128 GB Storage
41% OFF
Google Pixel 7 Pro 5G
  • Obsidian
  • 12 GB RAM
  • 128 GB Storage

"Through our research analysis we have witnessed cases where an app was downloaded, updated or received data from the app provider's server, which passed through the External Storage before being sent on to the app itself - as seen in the diagram on the left. Such practice offers an opportunity for an adversary to manipulate the data held in the External Storage before the app reads it again," wrote the researchers in their blog post.

Also read
Looking for a smartphone? To check mobile finder click here.

Interesting enough, a lot of apps that were tested for this vulnerability are from Google itself. The list of Google apps includes Google Voice Typing and Google Translate among others. The researchers also discovered that Xiaomi's native browser was using external storage and that they were able to "carry out an attack by which the application's update code was replaced, resulting in the installation of an alternative, undesired application instead of the legitimate update."

Google Translate crashes after compromising of certain files required by the app.
Google Translate crashes after compromising of certain files required by the app. (Check point)
image caption
Google Translate crashes after compromising of certain files required by the app. (Check point)

Researchers also stressed that they could not identify who is really at fault for the critical security flaw.

"On the one hand, although Android's developers have created guidelines to app developers on how to ensure their apps are safe, they must also be aware that it is well known for developers to not build their applications with security front of mind. On the other hand, and being aware of this foresaid knowledge, is there more Android could be doing to protect their operating system and the devices that use it?," they added.

Note that most of the applications use internal storage for their data. The external storage is mainly used for sharing and store files. But some Android developers may use external storage to for their apps as they may not want the app to take too much space on the phone or just not paying enough attention.

Catch all the Latest Tech News, Mobile News, Laptop News, Gaming news, Wearables News , How To News, also keep up with us on Whatsapp channel,Twitter, Facebook, Google News, and Instagram. For our latest videos, subscribe to our YouTube channel.

First Published Date: 13 Aug, 13:37 IST
NEXT ARTICLE BEGINS