Hackers News Bulletin| Latest Cyber Security News Portal

Hackers News Bulletin | Latest Cyber Security News Portal
Follow us socially to get News Fast:

Android Cold War Begins Now Data will be Compromised

Posted By: Praveen Kashyap | Posted in: Exploits Flaw Vulnerability | Time Posted: March 9, 2013 at 9:13 am

Before reading any posts on HNB, we would like to tell you that every post here is for your online security, safety or for awareness, and we do not teach hacking through our articles, if you find something which is being used to damage your online property or something like that, REPORT HERE.

A new attack Inventory has been done by the Team of researchers in Germany they managed to grab stored cryptographic keys if the android device is at Frozen State for an Hour.

What this Method can do with Android Device?

  • Bypasses Google’s data scrambling encryption system

  • Reveal the phone’s hidden data

  • Revealed previously scrambled data

  • Including contact lists

  • Browsing histories

  • Photos

That Team developed a software called FROST (Forensic Recovery of Scrambled Telephones) which transfer that data from the Phone for Analysis.

 What is Abstract Saying?
We present FROST, a tool set that supports the forensic recovery of scrambled telephones. To this end we perform cold boot attacks against Android smartphones and retrieve disk encryption keys from RAM. We show that cold boot attacks against Android phones are generally possible for the first time, and we perform our attacks practically against Galaxy Nexus devices from Samsung.”

“To break disk encryption, the boot loader must be unlocked before the attack because scrambled user partitions are wiped during unlocking. However, we show that cold boot attacks are more generic and allow to retrieve sensitive information, such as contact lists, visited web sites, and photos, directly from RAM, even though the boot loader is locked.

Download FROST from here

Enhanced by Zemanta

About Praveen Kashyap

Praveen KashyapI am blogging for news related to hacking, hackers, security, tips, tricks and about many more... from 2011. Also making you aware about latest online threats, hope I am doing my best, meet me on various social platforms.
  • Follow Me:
  • google-plus twitter like button facebook like button

Rate this article:
3.00/ 5 (4 votes)
Tagged with: