Researchers Bypassed Android Lock Screen using Driving mode Assistant
Most modern reports unique that researchers enjoy realized a brand novel methodology to avoid the Android Lock Cloak and extract relaxed recordsdata worship photos, contacts, making an are trying historical past, shared region, and rather more.
This grunt existed on essentially the most most up-to-date variations of Android, comparable to Android 14 and 13. Moreover, Google has reported this grunt, and a security patch is but to be supplied for the affected variations.
Android Lock Cloak Bypass
A researcher named Jose Rodriguez requested a quiz about accessing Google Maps links from the lock veil veil. The quiz turned into posted on more than one platforms, including Twitter, Reddit, and Telegram, and it turned into acknowledged that his Google Pixel turned into locked.
On the opposite hand, he chanced on a draw to avoid the lock veil veil and to boot mentioned that Google has been unsleeping of this grunt for as a minimal six months. The video supplied by the researchers entails quite easy actions with which an Android tool may well also additionally be successfully bypassed to the major veil veil.
The exploit has been differentiated with two perspectives DRIVING MODE enabled and DRIVING MODE disabled.
Exploitation POC
In step with the video, the researcher worn Google Assistant within the muse for the interpreter mode. With this mode, users can translate their very have language into English.
Additionally, it also affords a keyboard for users to form their language. Android also has a feature to detect links and navigate to explicit applications with “highlighted text.” The researcher worn the keyboard to form a Google Maps link and make a choice the total text.
Once the text is highlighted, Android’s link discovery feature kicks in and detects the navigation for Google Maps. Once the user clicks on the blueprint icon above the highlighted text, the user is taken to Google Maps after some extra steps, and the Android lock veil veil is successfully bypassed.
If the DRIVING MODE is disabled, a threat actor can employ this methodology to entry most up-to-date and current areas and contacts and share areas in true time with contacts or with an e mail that the attacker can enter manually.
If the DRIVING MODE is enabled, a threat actor can combine it with one other exploit and make fleshy regulate over the Android tool and the user’s Google sage. The threat actor will want physical entry to the sufferer’s tool as a prerequisite.
Customers of Android with variations 13 and 14 are urged to support their devices secured with extra lock restrictions and make not lose their phone’s physical entry.
Source credit : cybersecuritynews.com