Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Completely missing from both the article and the comments: the list of permissions these malicious apps requested. I'd really like to know whether they found a way around the permissions model, or if this is a case of users clicking 'OK' to a prompt that says "do you want to let this app root you?"


The apps included root exploits. The thread on the Android subreddit has lots of details.


Apparently, the modified binaries use a local root exploit, so they probably only required enough permissions for the local root exploit to work.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: