How does it work?
Dubbed the RAMpage, the attack allows malicious applications to break out of their sandbox and access the entire operating system. This includes accessing the data stored by other applications, which the Android security model is meant to prevent.
Who discovered RAMpage?
What kind of secrets could RAMpage access?
Who is at risk of the attack?
The researchers tested their RAMpage proof-of-concept exploit successfully on an LG G4 device, but they believe that “every mobile device that is shipped with LPDDR2, LPDDR3, or LPDDR4 memory is potentially affected.” Basically, every Android Device Since 2012 Is Vulnerable To The RAMpage Attack & Can Control Your Phone.
What has been done to counter the attack?
In response, the researchers have created a defense mechanism dubbed GuardION that can block the exploit on mobile phones. You can patch your device with GuardION, but this isn’t an easy task. The instructions are advanced and have only been tested on a Pixel running Android 7.1.1 Nougat with a specific kernel. The research going into RAMpage is still quite new, but now that a spotlight is being placed on it, hopefully we’ll see Google and other OEMs do their part to get devices patched up for users around the globe.