Hackers in 2017 surreptitiously installed malicious software on Android phones by inserting code in apps and programs built by third party vendors, Google said in a blog post Thursday. The novel hacking technique was designed to load a customers’ phone with spam and unauthorized advertisements all before it even arrived in customers’ hands. When phone manufacturers wanted to include features not approved by the Android Open Source Project, like a face unlock program, Google said, those companies may hire unauthorized third party companies to build the features for them. In this case, a malware group, known as Triada, devised a way to exploit those third parties to pre-install backdoors onto the Android devices. “By working with the OEMs and supplying them with instructions for removing the threat from devices, we reduced the spread of preinstalled Triada variants and removed infections from the devices through the [over-the-air] updates,” Google said. “The […]
The post Google’s Triada backdoor demonstrates vulnerabilities in the mobile supply chain appeared first on CyberScoop.
Continue reading Google’s Triada backdoor demonstrates vulnerabilities in the mobile supply chain→