Abstract
Media File Jacking (MFJ) is one security threat that affects media file usages within apps. Media files include image files, voice/audio files, video files and document files like pdf, docs, excel sheets, text files, etc. and these files easily find its place within our devices. The primary symptom of a Media File Jacking attack is that it will manipulate the media files, on transferring between users or apps. This type of malwares mainly targets mobile devices. The researchers from Symantec reported that this vulnerability has already found its way into the two top social media messaging apps namely, WhatsApp and Telegram. Not just limited to this, media file jacking can easily target mobile functioning’s whilst managing affected media files and its managed media chat apps. This analysis in detail tries to understand the vulnerabilities that devices are left exposed to via Media file jacking and how can protect Android based mobile devise with the help of existing, upcoming, configurable or programmable features. We try to cover in detail on i.) What Media file jacking attack is? ii.) How this vulnerability is created? iii.) Under which scenario this will happen iv.) What are the different types of attacks? iv.) What are the implications of this attack? v.) what are precautionary measures and how we can mark safe our mobile devices from this attack. This study mainly help to Android media app users and app develops to get a glance about the precautionary measures from media file jacking attack.
Highlights
Media File Jacking is one of the potential threats that social media apps are exposed to on media file transfer
Media file jacking is more prominent in Android Operating system and as for iOS, the environment has comparatively better memory management mechanism to prevent this threat
If we can keep the WhatsApp or Telegram media folders to start with a dot character, it will not be visible in media file scanning
Summary
Media File Jacking is one of the potential threats that social media apps are exposed to on media file transfer. The whole process occurs in a short span of time, the timespan ranging between the storage of media file to the device and accessing the same by an App stored in the device. When a person sends a media file, it gets manipulated even before the recipient has to access the file. This threat is more prone in devices with Android operating system.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have