SAMSUNG'S PRE-INSTALLED APPS , Are they spying?

Let's analyze the accusation through facts & figures !

Featured image

Recently, the famous multinational South Korean conglomerate SAMSUNG, came into the limelight when one many flaws were detected in some of its pre-installed apps.

Renowned cybersecurity specialist Sergey Toshin, founder of mobile security company Oversecured, found around a dozen possible vulnerabilities in some of its(Samsung) signature mobile phones, most notably Samsung Galaxy Note 20.

Bug Bounty Program for the win !

These security flaws had been possible to detect because of the company’s BUG BOUNTY Program.

Bug Bounty Program are platforms where multinational corporations and companies provide an opportunity for Hackers , Developers and Tech Enthusiasts to find bugs, errors or possible vulnerabilities in their software , programs, websites or mobile apps(as in this case), with the potential of reward, as a sign of positive reinforcement in helping the company/organistaion.

After the discovery of these critical security flaws in the mobile’s pre-installed apps, it was clear that if these vulnerabilities were exploited, it could have led to many adversaries accessing our personal data without user’s consent and maybe taking total control of the device.

Spying or not ?

So, in a worst case scenario, we could say that we may be spyed or….. maybe not? Well, why is that?

“There have been no known reported issues globally and users should be assured that their sensitive information was not at risk. We addressed the potential vulnerability by developing and issuing security patches via software update in April and May 2021 as soon as we identified this issue,”

This was an official statement released by the Samsung as a response to all the news being spread about its spying apps.

So, then this leaves us with an ambiguity in this topic. Are we being spyed or not? The answer lies somewhere in the middle. Lets find out.

Ground Reality

The bugs are part of a larger set discovered and reported responsibly by the security researcher through the company’s bug bounty program.

“The impact of these bugs could have allowed an attacker to access and edit the victim’s contacts, calls, SMS/MMS, install arbitrary apps with device administrator rights, or read and write arbitrary files on behalf of a system user which could change the device’s settings,” -says Sergey Toshin, founder of mobile security startup Oversecured.

This means that, until we(users) have not updated your Samsung device, we will still be vulnerable to attack. Breaching an unpatched device means cybercriminals could also install malicious apps with administrator rights and change the device’s default settings.

In a blog post explaining each of the flaws, Oversecure said that:

“These vulnerabilities could have led to a GDPR violation, and we are delighted that we could help Samsung identify and fix these vulnerabilities in a timely manner.”

Security researcher Sergey Toshin’s 17 CVE

Sergey Toshin reported the specific flaws to Samsung in February 2021, following which patches were issued by the manufacturer as part of its monthly security updates for April and May.

As a reward for the flaws reported, he collected a whopping $30,000 since the start of the year. There were a total of 17 total vulnerabilities that were reported.

Out of the 17, seven of them are :

The bug was patched in April. It impacted the Managed Provisioning App and now is tracked as CVE-2021-25356, thereby receiving $7000 for reporting followed by $5460 for the issue CVE-2021-25393 and another $4850 for CVE-2021-25397.

For more info about these CVE's and patches: [https://security.samsungmobile.com/securityUpdate.smsb](https://security.samsungmobile.com/securityUpdate.smsb)

WHAT CAN WE DO ABOUT IT?

If you haven’t updated your Samsung device, especially if its new, you must do so as soon as possible. Here’s how: