The Samsung Hack Could Still Put You at Risk
Even if Samsung claims that no personal data was lost
central thesis
- Stolen source code from Galaxy devices could be used as an easier way for hackers to find security holes and vulnerabilities.
- If the attacker also took the bootloader source code, they could gain system-level access to the device.
- The best thing customers can do is to stay up to date on security updates and be very careful when installing new apps or following URLs.
d3sign/Getty Images
Samsung recently revealed that the source code of Galaxy devices was stolen in a hack, but some experts think it’s something to worry about.
Samsung guarantees that the privacy of its customers or employees has not been compromised, but this is only one avenue for hackers to use. Extracted data, including biometric authentication algorithms and bootloader source code claimed by hackers, can still be used in malicious ways.
Purandar Das, co-founder and CEO of Sotero, an encryption-based data security solutions company, said in an email to Lifewire, “The most high-profile breaches have resulted in the loss of personal data that could affect individuals. Not being lost is more of a kneeling response than a real indication of the detrimental potential a data breach represents.”
find a crack
One of the main concerns security researchers have about leaking the source code of Galaxy devices is that the code could be used. Of course, that’s not the heart of the proverbial city of Samsung devices. A hacker cannot immediately compromise a critical system or anything like that. However, they can use the data to find vulnerabilities that may not have been discovered yet and then figure out how to exploit them.
“Users should be extra careful when installing apps on their phones and make sure they’re known trusted apps that don’t require too many permissions on their phones.”
Brian Contos, chief security officer and cybersecurity veteran at Phosphorus Cybersecurity, told Lifewire in an email to Lifewire: “All software programs and devices have some vulnerabilities, but finding these flaws is difficult. “It can be very time consuming and difficult.” “But having access to the full source code makes the process a lot easier.”
Hackers find and exploit vulnerabilities throughout the existence of a computer, but it takes time and effort. In this situation, Samsung’s source code could be used as a roadmap or some sort of blueprint, making the vulnerability hunt almost redundant.
“Any source code used to power a device or act as an authentication service on a device poses serious problems,” Das said. “You can use this code to enforce data collection or develop alternative methods to bypass security controls.” .Code can also serve as an analytic framework for security controls, which can be overridden.”
bootloader worries
As the hacker group claims, if the bootloader source code is also compromised, it can pose a serious security risk. The difference from the aforementioned system source code is the bootloader. is Like holding the key to the city. It is the program required to boot any hardware, including applications and operating systems, and everything necessary for booting is the main function of the bootloader.
If an attacker is able to exploit your device’s bootloader, you are essentially free to use the entire system if you have the tools and know-how. Experts agree that there is cause for concern, given the 190GB of data stolen from Samsung, which can be downloaded by almost anyone.
LPETTET/Getty Images
“Bootloader attacks are of particular concern as attackers can penetrate devices below the operating system level. This means that hackers can bypass all security on the device.” Contos used to steal user credentials and potentially bypass device encryption, explained.
Unfortunately, there isn’t much you can do at the user level, as the compromised information can be used by hackers to find new ways to attack Galaxy devices. Keep your security updates as up to date as possible and avoid taking unnecessary risks online. Watch out for suspicious email attachments, pay close attention to apps you download, check permission lists, and more.
“The solution to this problem is in Samsung’s hands,” Das explained. “They will have to release one or more patches that fix any known or potential vulnerabilities.”
“Samsung should also strengthen its own security analysis and code reviews to try and find these issues first,” Contos added. You should also be very careful if you leave your phone unattended, especially when traveling outside the United States. This applies even if the device is password or biometric protected.”
More information
The Samsung Hack Could Still Put You at Risk
Even though Samsung claims no personal data was lost
Key Takeaways
Stolen Galaxy device source code could be used as an easier way for hackers to locate security flaws and weaknesses.
If attackers also took the bootloader source code, they could gain system-level access to devices.
The best thing customers can do is stay on top of security updates and be very cautious when installing new apps or following URLs.
d3sign / Getty Images
Samsung has stated that the recent hack, which resulted in source code for Galaxy devices being stolen, is nothing to worry about—but some experts believe worrying is necessary.
While Samsung offered reassurance that neither customer nor employee personal information had been compromised, that’s only one possible avenue for the hackers to take. The data that was taken, which the hackers’ claim includes biometric authentication algorithms and bootloader source code, could still be used in damaging ways.
“Most high-profile breaches have resulted in the loss of personal data that has the potential to impact individuals,” said Purandar Das, CEO and co-founder of encryption-based data security solutions company Sotero, in an email to Lifewire, “Establishing a baseline that personal data wasn’t lost is more of a reflex response and not truly indicative of the adverse potential any data breach poses.”
Finding Cracks
A big concern security experts have about the Galaxy device source code leak is what that code could be used for. Granted, it’s not exactly a key to the proverbial city of Samsung devices; hackers aren’t going to be able to instantly compromise critical systems or anything like that. But they could use the data to find vulnerabilities that may not have been discovered yet, then figure out ways to exploit them.
“Users should be extra careful when installing apps on their phone by making sure it is a well-known and trusted app, and does not require too many permissions on the phone.”
“While every software program and every device contain some vulnerabilities, the process of finding these bugs can be extremely time-consuming and difficult,” said Brian Contos, 25-year cybersecurity veteran and Chief Security Officer of Phosphorus Cybersecurity, in an email to Lifewire. “But if you have access to the full source code, it makes the process substantially easier.”
Hackers have been finding and taking advantage of security vulnerabilities for as long as computers have existed, but it takes time and effort. In this situation, Samsung’s source code could be used as a sort of road map or blueprint that all but eliminates the need to search for weaknesses in the first place.
“Any source code that is used to operate devices or serve as authentication services on devices poses a severe problem,” Das agrees, “The code can be used to devise alternate paths, force the capture of data, or override security controls. The code can also serve as an analysis framework for security controls that can then be overridden.”
Bootloader Worries
If the bootloader source code was also compromised, as the hacking group claims, that could create a substantial security risk. Unlike the system source code mentioned previously, the bootloader is like having the keys to the city. It’s the program required to boot up a piece of hardware—applications, the operating system—it all needs to boot up, and that’s the bootloader’s primary function.
If a malicious party were able to exploit a device’s bootloader, they’d basically have free reign over the entire system—provided they had the tools and the know-how. Experts agree that, with 190GB of Samsung’s stolen data available to download by pretty much anyone, there is cause for concern.
LPETTET / Getty Images
“A bootloader attack is particularly worrisome because it allows the attacker to get into the device below the operating system level, which means the hacker can bypass all the security on the device,” Contos stated, “A bootloader attack can also be used to steal the user’s credentials and potentially bypass device encryption.”
Unfortunately, because the compromised information could be used to help hackers discover new ways to attack Galaxy devices, there isn’t much we can do on the user level. Just try to stay as current as possible with security updates, and avoid taking unnecessary risks online. Be wary of suspicious email attachments, pay close attention to the apps you download (and inspect the permissions list), and so on.
“The resolution to this is in the hands of Samsung,” Das explained, “They would have to release a patch or patches that address any known or potential vulnerabilities.”
“Samsung should also ramp up its own security analysis and review of its code, to try to find these problems first,” Contos added, “In the meantime, users should be extra careful when installing apps on their phone by making sure it is a well-known and trusted app, and does not require too many permissions on the phone. They should also be very careful about leaving their phones unattended, particularly if they travel outside the US. This is true even if the device is password- or biometric-protected.”
#Samsung #Hack #Put #Risk
The Samsung Hack Could Still Put You at Risk
Even though Samsung claims no personal data was lost
Key Takeaways
Stolen Galaxy device source code could be used as an easier way for hackers to locate security flaws and weaknesses.
If attackers also took the bootloader source code, they could gain system-level access to devices.
The best thing customers can do is stay on top of security updates and be very cautious when installing new apps or following URLs.
d3sign / Getty Images
Samsung has stated that the recent hack, which resulted in source code for Galaxy devices being stolen, is nothing to worry about—but some experts believe worrying is necessary.
While Samsung offered reassurance that neither customer nor employee personal information had been compromised, that’s only one possible avenue for the hackers to take. The data that was taken, which the hackers’ claim includes biometric authentication algorithms and bootloader source code, could still be used in damaging ways.
“Most high-profile breaches have resulted in the loss of personal data that has the potential to impact individuals,” said Purandar Das, CEO and co-founder of encryption-based data security solutions company Sotero, in an email to Lifewire, “Establishing a baseline that personal data wasn’t lost is more of a reflex response and not truly indicative of the adverse potential any data breach poses.”
Finding Cracks
A big concern security experts have about the Galaxy device source code leak is what that code could be used for. Granted, it’s not exactly a key to the proverbial city of Samsung devices; hackers aren’t going to be able to instantly compromise critical systems or anything like that. But they could use the data to find vulnerabilities that may not have been discovered yet, then figure out ways to exploit them.
“Users should be extra careful when installing apps on their phone by making sure it is a well-known and trusted app, and does not require too many permissions on the phone.”
“While every software program and every device contain some vulnerabilities, the process of finding these bugs can be extremely time-consuming and difficult,” said Brian Contos, 25-year cybersecurity veteran and Chief Security Officer of Phosphorus Cybersecurity, in an email to Lifewire. “But if you have access to the full source code, it makes the process substantially easier.”
Hackers have been finding and taking advantage of security vulnerabilities for as long as computers have existed, but it takes time and effort. In this situation, Samsung’s source code could be used as a sort of road map or blueprint that all but eliminates the need to search for weaknesses in the first place.
“Any source code that is used to operate devices or serve as authentication services on devices poses a severe problem,” Das agrees, “The code can be used to devise alternate paths, force the capture of data, or override security controls. The code can also serve as an analysis framework for security controls that can then be overridden.”
Bootloader Worries
If the bootloader source code was also compromised, as the hacking group claims, that could create a substantial security risk. Unlike the system source code mentioned previously, the bootloader is like having the keys to the city. It’s the program required to boot up a piece of hardware—applications, the operating system—it all needs to boot up, and that’s the bootloader’s primary function.
If a malicious party were able to exploit a device’s bootloader, they’d basically have free reign over the entire system—provided they had the tools and the know-how. Experts agree that, with 190GB of Samsung’s stolen data available to download by pretty much anyone, there is cause for concern.
LPETTET / Getty Images
“A bootloader attack is particularly worrisome because it allows the attacker to get into the device below the operating system level, which means the hacker can bypass all the security on the device,” Contos stated, “A bootloader attack can also be used to steal the user’s credentials and potentially bypass device encryption.”
Unfortunately, because the compromised information could be used to help hackers discover new ways to attack Galaxy devices, there isn’t much we can do on the user level. Just try to stay as current as possible with security updates, and avoid taking unnecessary risks online. Be wary of suspicious email attachments, pay close attention to the apps you download (and inspect the permissions list), and so on.
“The resolution to this is in the hands of Samsung,” Das explained, “They would have to release a patch or patches that address any known or potential vulnerabilities.”
“Samsung should also ramp up its own security analysis and review of its code, to try to find these problems first,” Contos added, “In the meantime, users should be extra careful when installing apps on their phone by making sure it is a well-known and trusted app, and does not require too many permissions on the phone. They should also be very careful about leaving their phones unattended, particularly if they travel outside the US. This is true even if the device is password- or biometric-protected.”
#Samsung #Hack #Put #Risk
Synthetic: Vik News