Abstract

Media File Jacking (MFJ) is one security threat that affects media file usages within apps. Media files include image files, voice/audio files, video files and document files like pdf, docs, excel sheets, text files, etc. and these files easily find its place within our devices. The primary symptom of a Media File Jacking attack is that it will manipulate the media files, on transferring between users or apps. This type of malwares mainly targets mobile devices. The researchers from Symantec reported that this vulnerability has already found its way into the two top social media messaging apps namely, WhatsApp and Telegram. Not just limited to this, media file jacking can easily target mobile functioning’s whilst managing affected media files and its managed media chat apps. This analysis in detail tries to understand the vulnerabilities that devices are left exposed to via Media file jacking and how can protect Android based mobile devise with the help of existing, upcoming, configurable or programmable features. We try to cover in detail on i.) What Media file jacking attack is? ii.) How this vulnerability is created? iii.) Under which scenario this will happen iv.) What are the different types of attacks? iv.) What are the implications of this attack? v.) what are precautionary measures and how we can mark safe our mobile devices from this attack. This study mainly help to Android media app users and app develops to get a glance about the precautionary measures from media file jacking attack.

Highlights

  • Media File Jacking is one of the potential threats that social media apps are exposed to on media file transfer

  • Media file jacking is more prominent in Android Operating system and as for iOS, the environment has comparatively better memory management mechanism to prevent this threat

  • If we can keep the WhatsApp or Telegram media folders to start with a dot character, it will not be visible in media file scanning

Read more

Summary

INTRODUCTION

Media File Jacking is one of the potential threats that social media apps are exposed to on media file transfer. The whole process occurs in a short span of time, the timespan ranging between the storage of media file to the device and accessing the same by an App stored in the device. When a person sends a media file, it gets manipulated even before the recipient has to access the file. This threat is more prone in devices with Android operating system.

A FILE JACKING
Image Manipulation
Documents Manipulation
Audio Manipulation
PRECAUTIONARY MEASURES
Enable app based security features
Spread fake information
Financial theft
Scoped Storage
Avoid Media file scanning
Encryption
RESULT
Proposed methodology
CONCLUSION
Findings
Symantec
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call