If you’re using a Samsung smartphone with TouchWiz including the Galaxy S2 and some Galaxy S3 models, be aware that there’s a web hack that can trigger a factory reset on your beloved smartphone.
The web hack is actually a malicious code that is hiding inside a web page and gets triggered when visited using the stock browser (except Google Chrome) of a TouchWiz-based phone. The malicious code then spawns the dialer and enters a bad USSD code with the sole purpose of nuking your device back to its factory default. To give you a refresher on USSD codes, one example is *#06# which displays a smartphone’s default IMEI.
Here’s a more detailed example:
The USSD code to factory reset a Samsung Galaxy S3 is: *code*code#
and can be triggered from browser like: frame src=”tel:*code*code%??”
(Of course we’re not allowed to replicate the real code here)
The code can also be delivered via URL, NFC or QR codes. Watch the video below to see the code in action.
Samsung devices reported to be vulnerable are the Galaxy Beam, S Advance, Galaxy Ace, Galaxy S2 and Galaxy S3 with older firmware. However, Samsung phones running stock Android OS, like the Galaxy Nexus, are immune to this malicious code.
So if you’re using a Samsung TouchWiz phone, make sure that you update to the latest firmware and use Chrome as a preventive measure.
On the other side of the news, Samsung was also reported to be developing its own web browser that uses WebKit – the same browser engine that Apple uses in Safari, Google’s Chrome and on RIM’s BlackBerry devices. Should this come to light then Samsung Android users will get a more secure browsing experience.
YugaTech.com is the largest and longest-running technology site in the Philippines. Originally established in October 2002, the site was transformed into a full-fledged technology platform in 2005.
How to transfer, withdraw money from PayPal to GCash
Prices of Starlink satellite in the Philippines
Install Google GBox to Huawei smartphones
Pag-IBIG MP2 online application
How to check PhilHealth contributions online
How to find your SIM card serial number
Globe, PLDT, Converge, Sky: Unli fiber internet plans compared
10 biggest games in the Google Play Store
LTO periodic medical exam for 10-year licenses
Netflix codes to unlock hidden TV shows, movies
Apple, Asus, Cherry Mobile, Huawei, LG, Nokia, Oppo, Samsung, Sony, Vivo, Xiaomi, Lenovo, Infinix Mobile, Pocophone, Honor, iPhone, OnePlus, Tecno, Realme, HTC, Gionee, Kata, IQ00, Redmi, Razer, CloudFone, Motorola, Panasonic, TCL, Wiko
Best Android smartphones between PHP 20,000 - 25,000
Smartphones under PHP 10,000 in the Philippines
Smartphones under PHP 12K Philippines
Best smartphones for kids under PHP 7,000
Smartphones under PHP 15,000 in the Philippines
Best Android smartphones between PHP 15,000 - 20,000
Smartphones under PHP 20,000 in the Philippines
Most affordable 5G phones in the Philippines under PHP 20K
5G smartphones in the Philippines under PHP 16K
Smartphone pricelist Philippines 2024
Smartphone pricelist Philippines 2023
Smartphone pricelist Philippines 2022
Smartphone pricelist Philippines 2021
Smartphone pricelist Philippines 2020
John says:
Way to go, shitsung. Your ugly touchwiz matches your ugly phones.
deuts says:
Now, if you fell victim to this hack, how you’d probably wish you had iTunes that have your data and media files intact.
Ramon says:
Never liked touchwiz the day I bought my galaxy note, that’s why I’m using launcher app instead XD
Also using dolphin browser and google chrome rather than the stock browser, so I’m not worried about this
but I am curious if using a launcher app in a samsung phone can still activate the code?
Shamesung says:
@ramon, Even if u use other browser or launcher, it will still affect you unless you have rooted ur phone. If u use a launcher, touchwiz is still there. and even using dolphin will not exempt u from this hack. Go to androidcentral, they have a site that can check if ur samsung phone might be vulneralble to this hack. Tried mine and it is confirmed.
Using GS2
tensai says:
question.. i have a galaxy nexus with custom rom and I installed the touchwiz UX launcher from XDA forums, will my phone be vulnerable to this kind of attack? thanks! :D NEXUS RULES!
paul a. says:
it looks like this came from… XD
alainL says:
Looks like this is not limited to Samsung phones. http://www.androidpolice.com/2012/09/25/new-exploit-could-force-factory-reset-on-many-samsung-phones-running-touchwiz/
john ray says:
The vulnerability is not only on the touchWiz devices but all devices that haven’t updated…
The hack targets a bug in the stock Android browsers…
http://blog.gsmarena.com/touchwiz-specific-hack-can-hard-reset-galaxy-s-iii-and-other-galaxy-phones-through-their-web-browsers/
read the update in the lower part of the blog…
jericho says:
Tested this on stock dialer for GT-P1000 with CM9 and the “hack” works (check article on “The Verge” on how to display IMEI number to check for vulnerability). Installed exDialer instead.