web analytics

Web hack can factory reset Samsung phones




If you’re using a Samsung smartphone with TouchWiz including the Galaxy S2 and some Galaxy S3 models, be aware that there’s a web hack that can trigger a factory reset on your beloved smartphone.

The web hack is actually a malicious code that is hiding inside a web page and gets triggered when visited using the stock browser (except Google Chrome) of a TouchWiz-based phone. The malicious code then spawns the dialer and enters a bad USSD code with the sole purpose of nuking your device back to its factory default. To give you a refresher on USSD codes, one example is *#06# which displays a smartphone’s default IMEI.

Here’s a more detailed example:

The USSD code to factory reset a Samsung Galaxy S3 is: *code*code#

and can be triggered from browser like: frame src=”tel:*code*code%??”


(Of course we’re not allowed to replicate the real code here)

The code can also be delivered via URL, NFC or QR codes. Watch the video below to see the code in action.

Samsung devices reported to be vulnerable are the Galaxy Beam, S Advance, Galaxy Ace, Galaxy S2 and Galaxy S3 with older firmware. However, Samsung phones running stock Android OS, like the Galaxy Nexus, are immune to this malicious code.

So if you’re using a Samsung TouchWiz phone, make sure that you update to the latest firmware and use Chrome as a preventive measure.

On the other side of the news, Samsung was also reported to be developing its own web browser that uses WebKit – the same browser engine that Apple uses in Safari, Google’s Chrome and on RIM’s BlackBerry devices. Should this come to light then Samsung Android users will get a more secure browsing experience.

{sources: 1 & 2}



This article was written by Louie Diangson, Managing Editor of YugaTech. You can follow him at @John_Louie.

You may also like...

25 Responses

  1. John says:

    Way to go, shitsung. Your ugly touchwiz matches your ugly phones.

  2. deuts says:

    Now, if you fell victim to this hack, how you’d probably wish you had iTunes that have your data and media files intact.

  3. Ramon says:

    Never liked touchwiz the day I bought my galaxy note, that’s why I’m using launcher app instead XD

    Also using dolphin browser and google chrome rather than the stock browser, so I’m not worried about this

    but I am curious if using a launcher app in a samsung phone can still activate the code?

  4. Shamesung says:

    @ramon, Even if u use other browser or launcher, it will still affect you unless you have rooted ur phone. If u use a launcher, touchwiz is still there. and even using dolphin will not exempt u from this hack. Go to androidcentral, they have a site that can check if ur samsung phone might be vulneralble to this hack. Tried mine and it is confirmed.
    Using GS2

  5. tensai says:

    question.. i have a galaxy nexus with custom rom and I installed the touchwiz UX launcher from XDA forums, will my phone be vulnerable to this kind of attack? thanks! :D NEXUS RULES!

  6. paul a. says:

    it looks like this came from… XD

    • Ramon says:

      Thanks for the link!

      So the article was right, it only affects the stock browser. It’s still safe to use chrome and dolphin :)

      But Samsung still did a lousy job of finding bugs, they should have seen this and fixed it immediately when they had the chance =/

  7. john ray says:

    The vulnerability is not only on the touchWiz devices but all devices that haven’t updated…
    The hack targets a bug in the stock Android browsers…
    http://blog.gsmarena.com/touchwiz-specific-hack-can-hard-reset-galaxy-s-iii-and-other-galaxy-phones-through-their-web-browsers/

    read the update in the lower part of the blog…

  8. jericho says:

    Tested this on stock dialer for GT-P1000 with CM9 and the “hack” works (check article on “The Verge” on how to display IMEI number to check for vulnerability). Installed exDialer instead.

Leave a Reply

Your email address will not be published. Required fields are marked *

Open

Close