• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Guide
  • Home Improvement
  • Gadget & Apps
  • Deals
  • News

New Stagefright bug could hit millions of Android devices

By Guest Authors

A new Stagefright bug exploited by a security researcher stands to potentially hack millions of Android devices remotely.

NorthBit, a security firm based in Israel, published its research paper and an accompanying video that provide details about how the company exploited the new Stagefright bug, with a Nexus 5, LG G3, HTC One and Samsung Galaxy S5 as the test platforms for the exploit.

The exploit is alterable, meaning any hacker who wishes to take advantage of the Stagefright bug can do so, and even escalate the level of damage the exploit can carry out. And it’s not just the bad actors that can make use of the bug, the white hat hackers and governments can also have access to the research document and drive the bug to their advantage.

stagefright

The vulnerability could affect more than 3 out of 10 Android smartphones and tablets. One way to address the issue is to upgrade your handset to the latest version of the Android operating system. Luckily for Android 5 users, the exploit does not take effect.

Security researchers at Zimperium first reported on the Stagefright flaw in the middle of 2015. Hackers were then using the bug to execute code on Android devices from a remote server. It is said, according to research, that the flaw has the capacity to infect 95 percent of the more than one billion Android handsets worldwide.

In late 2015, a new breed of vulnerability emerged. The second Stagefright flaw affected bugs in .mp3 and .mp4 files by remotely executing malicious code in Android devices. Following the discovery of the Stagefright bug, Google vowed to address the issue by rolling out security updates on a regular basis.

Basically, Stagefright is a software library that resides within the Android operating system. The presence of Stagefright in Android makes a device vulnerable to memory corruption. One usual method employed by hackers to attack Android devices is through an MMS message to enable a malicious code inside an Android handset.

NorthBit claims it has devised an exploit that is able to bypass the address space layout randomization, a kind of memory protection process. The exploit can work in the wild, so anyone can use it. In order to breach the ASLR, one needs the details about the device configuration. Once the ASLR is breached, a link is dropped onto the device before the exploit works to transmit device data to the hacker.

Fortunately, many hackers still don’t have working Stagefright exploit at present, according to Zimperium. The company also did not publish the second exploit in order to keep Android safe for users.

Disclosure: We might earn commission from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Footer

Kodak Luma 500 Review – An Impressive Mini Projector with Native 1080p Resolution

Hohem iSteady V3 Ultra AI Gimbal Review – Smartphone Videography with Advanced AI and Control

iKoffy EdiBot Food Printer Review – Can It Replace Latte Art?

DYMESTY AI Glasses Review – Could These Be Your Next Wearable?

Follow TechWalls

YoutubeFacebookXInstagram

Recent Posts

  • iPhone 17 Model Number A3258, A3519, A3520, A3521 Differences
  • iPhone Air Model Number A3260, A3516, A3517, A3518 Differences
  • iPhone 17 Pro Max Model Number A3257, A3525, A3526, A3527 Differences
  • iPhone 17 Pro Model Number A3256, A3522, A3523, A3524 Differences

Copyright © 2025 · All Rights Reserved