{"id":1790,"date":"2021-05-07T18:03:06","date_gmt":"2021-05-07T12:33:06","guid":{"rendered":"https:\/\/xiarch.com\/blog\/?p=1790"},"modified":"2021-06-07T11:30:15","modified_gmt":"2021-06-07T06:00:15","slug":"new-qualcomm-chip-that-permits-the-hackers-to-monitor-android-devices","status":"publish","type":"post","link":"https:\/\/xiarch.com\/blog\/new-qualcomm-chip-that-permits-the-hackers-to-monitor-android-devices\/","title":{"rendered":"New Qualcomm Chip that Permits the Hackers to Monitor Android Devices!"},"content":{"rendered":"\n<p><p style=\"text-align: justify\">The researchers disclosed that as per the new security vulnerability present in Qualcomm\u2019s mobile station modems (MSM) that permits the attackers to get the underlying Android OS while slipping the malicious code that remained undetected into the mobile phones.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">In case the exploit is vulnerable and may permit the attackers to access the Android OS itself that it works as an entry point that injects the malicious and hidden code inside the smartphone, the execute the further attacks and grants the attackers to access the SMS messages, audio or phone conversations.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">Meanwhile, a heap overflow vulnerability is identified as CVE-2020-11292, which initiate the QMI voice service that exposed the modem to the high-level operating system and permits the attackers to exploit the malicious application that deals with the activities and also worked in modem chip as well and make it visible for the security system that was already installed in the device.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">These chips are designed in 1990 and assist mobile phones while connecting them to the cellular networks and permit the Android to access the chip\u2019s processor using the Qualcomm MSM Interface (QMI), which works as a proprietary protocol that also enables the communication between the software components present in MSM and another peripheral subsystem that includes the camera and other scanners.<\/p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Who is Influenced by this Attack?<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"728\" height=\"380\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/05\/qualcoom-chip-allow-hacker-to-monitor-android-image.png\" alt=\"New Qualcomm Chip that Permits the Hackers to Monitor Android Devices!\" class=\"wp-image-1792\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/05\/qualcoom-chip-allow-hacker-to-monitor-android-image.png 728w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/05\/qualcoom-chip-allow-hacker-to-monitor-android-image-300x157.png 300w\" sizes=\"(max-width: 728px) 100vw, 728px\" \/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify\">However, more than 40% of the smartphones today that also includes Google, Samsung, Xiaomi, One Plus, and LG are using the Qualcomm MSM chip, an estimated 30% of the devices are using the QMI as per the analysis.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">The attacker also added that these vulnerabilities will inject the malicious code that accesses the modem from the Android and give the access to the user devices and they controlled the call history, they can listen to the user conversation, and SMS too. The hacker can also capable to exploit the vulnerability that unlocked the user device SIM card and other overcoming limitations that were imposed by the service provider.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">Whereas, the organization spokesperson said that they will support the robust security and privacy is the priority of the company. The organization is willing to take every step which is required while fixing the vulnerability available in OEMs and they will also promote end-users while updating the devices and the patches are becoming available soon and it also deals with CVE-2020-11292 that present in Android Bulletin.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">According to the experts, this is not the first time when critical bugs were discovered in the Qualcomm chips. In August more than 400 security issues were discovered by the researcher that is collectively named Achilles.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">Although, these cellular modem chips are also used while considering the crown jewels for the hackers that also deal with the chips which are created by Qualcomm. An attack on such an organization is also driven by a negative impact that affects millions of devices situated across the world.<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The researchers disclosed that as per the new security vulnerability present in Qualcomm\u2019s mobile station modems (MSM) that permits the attackers to get the underlying Android OS while slipping the malicious code that remained undetected into the mobile phones. In case the exploit is vulnerable and may permit the attackers to access the Android OS [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1793,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[6],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>New Qualcomm Chip that Permits the Hackers to Monitor Android Devices! - Xiarch Solutions Private Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xiarch.com\/blog\/new-qualcomm-chip-that-permits-the-hackers-to-monitor-android-devices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Qualcomm Chip that Permits the Hackers to Monitor Android Devices! - Xiarch Solutions Private Limited\" \/>\n<meta property=\"og:description\" content=\"The researchers disclosed that as per the new security vulnerability present in Qualcomm\u2019s mobile station modems (MSM) that permits the attackers to get the underlying Android OS while slipping the malicious code that remained undetected into the mobile phones. In case the exploit is vulnerable and may permit the attackers to access the Android OS [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiarch.com\/blog\/new-qualcomm-chip-that-permits-the-hackers-to-monitor-android-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiarch Solutions Private Limited\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/xiarch\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-07T12:33:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-07T06:00:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/05\/qualcoom-chip-allow-hacker-to-monitor-android-image1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"526\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xiarch Security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xiarch\" \/>\n<meta name=\"twitter:site\" content=\"@xiarch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xiarch Security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/xiarch.com\/blog\/new-qualcomm-chip-that-permits-the-hackers-to-monitor-android-devices\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/new-qualcomm-chip-that-permits-the-hackers-to-monitor-android-devices\/\"},\"author\":{\"name\":\"Xiarch Security\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\"},\"headline\":\"New Qualcomm Chip that Permits the Hackers to Monitor Android Devices!\",\"datePublished\":\"2021-05-07T12:33:06+00:00\",\"dateModified\":\"2021-06-07T06:00:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xiarch.com\/blog\/new-qualcomm-chip-that-permits-the-hackers-to-monitor-android-devices\/\"},\"wordCount\":489,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"articleSection\":[\"Vulnerabilities\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/xiarch.com\/blog\/new-qualcomm-chip-that-permits-the-hackers-to-monitor-android-devices\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xiarch.com\/blog\/new-qualcomm-chip-that-permits-the-hackers-to-monitor-android-devices\/\",\"url\":\"https:\/\/xiarch.com\/blog\/new-qualcomm-chip-that-permits-the-hackers-to-monitor-android-devices\/\",\"name\":\"New Qualcomm Chip that Permits the Hackers to Monitor Android Devices! - Xiarch Solutions Private Limited\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#website\"},\"datePublished\":\"2021-05-07T12:33:06+00:00\",\"dateModified\":\"2021-06-07T06:00:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/xiarch.com\/blog\/new-qualcomm-chip-that-permits-the-hackers-to-monitor-android-devices\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xiarch.com\/blog\/new-qualcomm-chip-that-permits-the-hackers-to-monitor-android-devices\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xiarch.com\/blog\/new-qualcomm-chip-that-permits-the-hackers-to-monitor-android-devices\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xiarch.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New Qualcomm Chip that Permits the Hackers to Monitor Android Devices!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xiarch.com\/blog\/#website\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"name\":\"Xiarch Solutions Private Limited\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xiarch.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\",\"name\":\"Xiarch\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"contentUrl\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"width\":300,\"height\":300,\"caption\":\"Xiarch\"},\"image\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/xiarch\/\",\"https:\/\/twitter.com\/xiarch\",\"https:\/\/www.linkedin.com\/company\/xiarch\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\",\"name\":\"Xiarch Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"caption\":\"Xiarch Security\"},\"sameAs\":[\"https:\/\/xiarch.com\/blog\/\"],\"url\":\"https:\/\/xiarch.com\/blog\/author\/vector\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New Qualcomm Chip that Permits the Hackers to Monitor Android Devices! - Xiarch Solutions Private Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xiarch.com\/blog\/new-qualcomm-chip-that-permits-the-hackers-to-monitor-android-devices\/","og_locale":"en_US","og_type":"article","og_title":"New Qualcomm Chip that Permits the Hackers to Monitor Android Devices! - Xiarch Solutions Private Limited","og_description":"The researchers disclosed that as per the new security vulnerability present in Qualcomm\u2019s mobile station modems (MSM) that permits the attackers to get the underlying Android OS while slipping the malicious code that remained undetected into the mobile phones. In case the exploit is vulnerable and may permit the attackers to access the Android OS [&hellip;]","og_url":"https:\/\/xiarch.com\/blog\/new-qualcomm-chip-that-permits-the-hackers-to-monitor-android-devices\/","og_site_name":"Xiarch Solutions Private Limited","article_publisher":"https:\/\/www.facebook.com\/xiarch\/","article_published_time":"2021-05-07T12:33:06+00:00","article_modified_time":"2021-06-07T06:00:15+00:00","og_image":[{"width":1000,"height":526,"url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/05\/qualcoom-chip-allow-hacker-to-monitor-android-image1.jpg","type":"image\/jpeg"}],"author":"Xiarch Security","twitter_card":"summary_large_image","twitter_creator":"@xiarch","twitter_site":"@xiarch","twitter_misc":{"Written by":"Xiarch Security","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xiarch.com\/blog\/new-qualcomm-chip-that-permits-the-hackers-to-monitor-android-devices\/#article","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/new-qualcomm-chip-that-permits-the-hackers-to-monitor-android-devices\/"},"author":{"name":"Xiarch Security","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c"},"headline":"New Qualcomm Chip that Permits the Hackers to Monitor Android Devices!","datePublished":"2021-05-07T12:33:06+00:00","dateModified":"2021-06-07T06:00:15+00:00","mainEntityOfPage":{"@id":"https:\/\/xiarch.com\/blog\/new-qualcomm-chip-that-permits-the-hackers-to-monitor-android-devices\/"},"wordCount":489,"commentCount":0,"publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"articleSection":["Vulnerabilities"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xiarch.com\/blog\/new-qualcomm-chip-that-permits-the-hackers-to-monitor-android-devices\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xiarch.com\/blog\/new-qualcomm-chip-that-permits-the-hackers-to-monitor-android-devices\/","url":"https:\/\/xiarch.com\/blog\/new-qualcomm-chip-that-permits-the-hackers-to-monitor-android-devices\/","name":"New Qualcomm Chip that Permits the Hackers to Monitor Android Devices! - Xiarch Solutions Private Limited","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/#website"},"datePublished":"2021-05-07T12:33:06+00:00","dateModified":"2021-06-07T06:00:15+00:00","breadcrumb":{"@id":"https:\/\/xiarch.com\/blog\/new-qualcomm-chip-that-permits-the-hackers-to-monitor-android-devices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiarch.com\/blog\/new-qualcomm-chip-that-permits-the-hackers-to-monitor-android-devices\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/xiarch.com\/blog\/new-qualcomm-chip-that-permits-the-hackers-to-monitor-android-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiarch.com\/blog\/"},{"@type":"ListItem","position":2,"name":"New Qualcomm Chip that Permits the Hackers to Monitor Android Devices!"}]},{"@type":"WebSite","@id":"https:\/\/xiarch.com\/blog\/#website","url":"https:\/\/xiarch.com\/blog\/","name":"Xiarch Solutions Private Limited","description":"","publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiarch.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiarch.com\/blog\/#organization","name":"Xiarch","url":"https:\/\/xiarch.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","contentUrl":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","width":300,"height":300,"caption":"Xiarch"},"image":{"@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/xiarch\/","https:\/\/twitter.com\/xiarch","https:\/\/www.linkedin.com\/company\/xiarch"]},{"@type":"Person","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c","name":"Xiarch Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","caption":"Xiarch Security"},"sameAs":["https:\/\/xiarch.com\/blog\/"],"url":"https:\/\/xiarch.com\/blog\/author\/vector\/"}]}},"_links":{"self":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1790"}],"collection":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/comments?post=1790"}],"version-history":[{"count":1,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1790\/revisions"}],"predecessor-version":[{"id":1794,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1790\/revisions\/1794"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media\/1793"}],"wp:attachment":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media?parent=1790"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/categories?post=1790"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/tags?post=1790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}