Samsung Galaxy Devices Comming in market with Pre installed backdoors – NSA in Action

Replicant, CyanogenMod based download of the Android OS, developers behind a remote attacker to manipulate the files and data that could allow Samsung Galaxy devices claim to have found a backdoor into the modem. 

According to Chief Replicant developer Paul Kocialkowski, many Samsung Galaxy devices found in the baseband processor that handles communications software to turn the device into a spy device by an attacker can be used.

Android-device owners usually a new download Android firmware update is released, which is updated every time “baseband” reference, may be familiar with. Such a version number Download Android 4.2.2 as the application processor, means, and other radio communication baseband processor which supports, or modem, equal.

“We are in charge of handling the communication protocol with the modem processor running proprietary applications program on the modem file system I / O operations to perform remote file that allows the implementation of a backdoor to know that ,” Kocialkowski a free Software Foundation’s blog post reads .


Affected Samsung Galaxy devices , Kocialkowski the Nexus S, S, S2, Note , Nexus , seven-inch Tab 2 , Tab 2 10.1 -inch , and note 2.

Communicate with the modem software which handles Android- Radio Interface Layer ( RIL) , Samsung ‘s implementation . Reliance Samsung to make reverse engineering your alternatives are , Kocialkowski RFS order execution software and remote I / O to perform the operation found Samsung uses the IPC protocol .

“Samsung IPC protocol messages incriminated RFS nor any justification were not found relevant use case ,” Kocialkowski wrote in his technical analysis .

“However , by providing a back door without intent to harm , it is possible for purposes have been added . Either way, the result is the same modem and it allows you to access the phone’s storage that . “

This device uses GPS enabled Kocialkowski mic , camera access and change data can be used to attack the modem device argues that a powerful tool . Also , usually a modem connected to the network operator , given that the back door is very accessible .

Back Door to the effect depends on the software . This modem can access , limiting the scope of possible files that SELinux is applied where an unprivileged user or , where equipment is running as a lowering effect while service running as root where is the worst case .

Kocialkowski the affected devices Samsung IPC protocol , most Intel and Intel XMM6260 XMM6160 modems that use modem .

The time of publication of ZDNet ‘s Samsung did not respond to questions . If it does , we ‘ll update the story

View full post on Who Got Hacked (WGH) – Latest Hacking News and Security Updates