Skip to main content

Millions of Android phones with Qualcomm chips are at risk: How to protect yourself

wireless emergency alert augmentation smartphone user
Tatsiana Yuralaits/123RF
A new widespread vulnerability that affects millions of Android devices around the world could allow hackers to read your SMS text messages, phone records, and perform any capabilities the radio allows.

What’s even worse is the fact that victims will have no idea if they have been hacked, and most of the affected devices won’t be patched.

Here’s a full breakdown of the hack, which phones it affects, and what you can do to protect yourself.

How it works

This hack involves the netd daemon, which is the network interface in Android. The problem arose when Qualcomm released new Application Program Interfaces (APIs) as part of the network_manager system service, which also involved the netd daemon. These APIs allowed additional tethering capabilities.

It’s not clear when exactly Qualcomm released these APIs, but it was discovered in January by Mandiant’s Red Team that the “netd service does not properly validate the interface name when a new upstream interface is added.”  Hackers could then use this invalid name for further system commands.

This vulnerability is labeled as CVE-2016-2060 with a medium risk. FireEye, a cyber security company, worked with Qualcomm to detail the vulnerability in a detailed blog post.

A hacker could exploit you with this vulnerability by having physical access to your device or by adding code to a malicious application that you install. The former would be the most unlikely situation, since the hacker would need to steal your device, and it would need to be unlocked. The latter is more likely, since millions of devices could be targeted remotely.

Unfortunately, a malicious application could interact with the API without your knowledge. You wouldn’t get any alerts and your device won’t run any slower. To make matters worse, Google Play might not flag these apps as malicious, since it would be impossible for Google’s security scanner to detect that such an app would be accessing the API for malicious reasons.

Affected devices

According to FireEye, devices dating back to Android Gingerbread are affected, but newer versions of Android aren’t. If your device is running Gingerbread, Ice Cream Sandwich, Jelly Bean, KitKat, or Lollipop, you’re likely affected if your phone has a Qualcomm processor.

According to the most recent Android distribution numbers (posted May 2, 2016), 92.4 percent of all devices have these versions of Android. However, not all of these devices have a Qualcomm processor. It’s unknown how many of them do, but it’s a safe bet that at least a half of them sport a Qualcomm chip, since it’s a popular processor. That would mean close to 50 percent of Android devices are affected or more than 500 million.

Qualcomm issues an update patch, but most users won’t get it

FireEye worked with Qualcomm starting in January 2016, which resulted in a fix by March 2016. FireEye said Qualcomm “was extremely responsive throughout the entire process” and achieved the 90 day window set to issue a fix.

Qualcomm sent the update to all manufacturers so that they can update their devices, but unfortunately, most people won’t get it since manufacturers generally stop updates within a year or two of a device’s existence.

Protecting yourself

The first thing you need to do is find out what version of Android your device is running. Head into Settings and tap on About Phone. Look under Android Version, and note the number. If it’s 5.1.x or below, you’re affected if your phone has a Qualcomm processor.

You can easily find out if you have a Qualcomm processor by installing CPU-Z from Google Play. Open the app, and it will tell you the make and model of your processor within a few seconds.

If your phone is affected, there isn’t much you can do to fully protect yourself if you continue to use your device. The best method would be to buy a newer phone that is running Android 6.0 Marshmallow, since it won’t be affected by this vulnerability.

We understand that buying a new phone might not be feasible at this time, so there are a few things you can do to lessen your chances of getting hacked, but understand there is no way to fully defend yourself other than buying a newer device.

  1. Never download third-party apps and sideload them.
  2. Pay attention to the apps you download from Google Play. If you stick with popular apps that are highly rated, you will lessen your chances of getting hacked.
  3. Download an antivirus app from Google Play such as Lookout Security and Antivirus. FireEye admits that apps like this probably won’t detect the vulnerability, but it’s not a bad idea to install one since that could change, not to mention, it might help you with other security threats.

Note: The FireEye Mobile Security app will detect the Qualcomm vulnerability, but it’s only for enterprise customers. If you have a corporate phone, check with your administrator to find out if your company subscribes to the service.

The good news is that FireEye has been monitoring the use of the API, and hasn’t found any occurrences of it being exploited. However, that could change as hackers learn of the flaw.

Looking at the big picture, it’s still more unlikely than likely that you will fall victim to an attack, but there’s always a chance no matter how small that is. If you follow the simple steps above, you will lessen your chances even more.

Editors' Recommendations

Robert Nazarian
Former Digital Trends Contributor
Robert Nazarian became a technology enthusiast when his parents bought him a Radio Shack TRS-80 Color. Now his biggest…
Qualcomm’s newest chip will supercharge budget Android phones
Qualcomm Snapdragon 7 Plus Gen 3 representation on an Android phone.

Qualcomm has introduced a new mid-tier smartphone silicon, the Snapdragon 7+ Gen 3, that will be adopted by the likes of OnePlus in the coming months. It seems like a minor upgrade over the Snapdragon 7 Gen 3, but the changes are actually quite comprehensive.

The company notes that for the first time in the Snapdragon 7 series, it is bringing generative AI features such as text-to-image creation, higher-resolution single-lens capture at up to 108-megapixels, a flagship-tier triple 18-bit ISP for image capture, and Wi-Fi 7 connectivity.

Read more
I thought I’d hate this cheap Android phone. It proved me wrong
A person holding the Nuu B30 Pro.

I like phones like the Nuu B30 Pro. Not because it’s a Samsung Galaxy S24 Ultra rival or that it does something spectacular we’ve never seen before -- it’s because it is way better than I thought it was going to be.

I admit that I may have judged the Nuu B30 Pro a little harshly before using it, but I’m also happy to admit my flash judgment was wrong. Here’s why you shouldn’t write the Nuu B30 Pro off as just another cheap Android phone to ignore.
Why did I hastily judge the Nuu B30 Pro?

Read more
Qualcomm is about to make cheap Android phones better than ever
Qualcomm Snapdragon 8s Gen 3 render.

Qualcomm is adding a new top-tier mobile chipset to its portfolio — one that takes the best bits of its flagship Snapdragon 8 Gen 3 silicon, makes some concessions, and serves it all up in a more affordable package. The result of those efforts is the Snapdragon 8s Gen 3, which is slated to appear inside phones from Xiaomi and Honor in the coming month.

Qualcomm is once again pushing generative AI capabilities for its latest silicon, touting features like image expansion, support for AI models from the likes of Meta to create an intelligent on-device assistant, and readiness for Google’s Gemini Nano model. So far, these things have remained exclusive to Google's Pixel and Samsung flagships, but it appears that the Snapdragon 8s Gen 3 will finally bring them to a larger audience.

Read more