Why Metaphor Android phone hack isn't the Stagefright exploit you expect

Metaphor relies on poor Android patches, but users can still fend off attacks

If you're an Android owner, you have probably already heard of Metaphor - a scary-sounding exploit for the Stagefright flaw found in Google's mobile operating system last year.

The media is hyping Metaphor, discovered by researchers at Israeli security firm NorthBit, as the first reliable exploit of Stagefright, which was judged by some to be too difficult to take advantage of.

Stagefright is a media library within Android that allows the operating system to interpret various media, namely video files, audio files, and picture files.

The Stagefright bug, and later version of it, exploits integer overflow vulnerabilities in the Stagefright software library, which can allow an attacker to hijack a device.

How Metaphor works, and why it's dangerous

Unlike previous Stagefright exploits, Metaphor relies on JavaScript, rather than MMS, so users would need to be coaxed into visiting a compromised or malicious site and remaining there for some time while the attack took place.

So far, so scary. But what a lot of the reporting of this new Stagefright bug overlooks is the reason why so many Android devices are still vulnerable to this type of attack.

The problem with protecting against Metaphor, and against all Android vulnerabilities, is more to do with the way that Android is distributed than anything else. Namely, because Android is adapted and reskinned by each vendor, the roll out of new OS versions across all Android devices is painfully slow.

So, while Android Marshmallow and Lollipop both come with Stagefright patches in place, that's cold comfort to the 62 per cent of users whose phones do not run either of those operating systems.

These users are left vulnerable to attack simply because their devices do not yet support the latest operating system, even if it is relatively new.

How to beat Metaphor

However, users are not completely helpless in the face of Metaphor - not clicking on strange or unexpected links, stopping pages that try to redirect you, or exiting a page if it seems to be doing something strange could help thwart an attack, as it requires users to stay on the malicious page for up to two minutes in some cases.

But ultimately, it is up to the Android ecosystem to work out how to roll out updates faster, because leaving users as sitting ducks is not only unsafe, it's also unfair.

Featured Resources

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Security best practices for PostgreSQL

Securing data with PostgreSQL

Download now

Transform your MSP business into a money-making machine

Benefits and challenges of a recurring revenue model

Download now

The care and feeding of cloud

How to support cloud infrastructure post-migration

Watch now

Recommended

How to encrypt files and folders in Windows 10
encryption

How to encrypt files and folders in Windows 10

9 Apr 2021
The definitive guide to IT security
Whitepaper

The definitive guide to IT security

9 Apr 2021
Evidence suggests REvil behind Harris Federation ransomware attack
ransomware

Evidence suggests REvil behind Harris Federation ransomware attack

9 Apr 2021
Fujitsu taps Trend Micro to secure private 5G networks in smart factories
5G

Fujitsu taps Trend Micro to secure private 5G networks in smart factories

8 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
Data belonging to 500 million LinkedIn users found for sale on hacker marketplace
hacking

Data belonging to 500 million LinkedIn users found for sale on hacker marketplace

8 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021