In this article we will discuss Hackers could listen in on your calls on millions of Android phones due to a modem vulnerability. To this end, Google tries to stay current with Android and other Android manufacturers’ strategies to different degrees, ensuring they remain diligent about hardware and software protection. A serious bug in widely discovered by Check Point Research today is especially worrisome because it may affect widely-used Qualcomm chips. The code patch would potentially grant a malicious applications the ability to modify the software that is contained in Qualcomm’s MSM modem chips, which will allow them to spy on or capture calls and texts, and possibly enable recording of conversations.
There is a lot of detail involved in the Check Point position on this topic. However, it was discovered that the QMI software link that runs on the modem could patch the code at runtime and bypass other standard security features. standard third-party apps aren’t granted any QMI-granted rights, but the vulnerability this exploit uses could give more elevated third-party apps such as medical applications greater access
Because of the problems that were discovered, the researchers could eavesdrop on your conversations, collect and monitor your phone and text information, and activate your SIMs, and/personal data, they deduced that a malicious apps are also able to access and record your data. 40% of the devices are exposed to the new malware created by the QMI firm is susceptible to attack, and available on the market, including Google, LG, and OnePlus, among others
Some of the details of the procedure were not disclosed to the report’s readers to ensure that it wouldn’t be readily copied and expanded this was considered necessary to keep it simple. As of now, this type of attack has not been proven to be used, there is no proof of it being used in the real world.
They are aware of this vulnerability since the beginning of the year, as evidenced by Q Seal Analytics in October. Google has already provided this information to all Android handset manufacturers and companies that use Qualcomm modems. Immediately after this article was published, a workaround is being applied, but we expect that both Qualcomm and Google to implement a solution to this vulnerability into the next security patch.