Skip to main content

Popular Android remote app AirDroid is vulnerable to hacks

airdroid vulnerable to attack by hackers rsz 1rsz img 20161202 102606
Image used with permission by copyright holder
If you’re an Android user, you may have heard of AirDroid, a souped-up remote control app that lets you wirelessly connect to an Android phone or tablet. It’s impressively robust: you can respond to text messages directly from your PC, dismiss or answer an incoming call, silence notifications from certain apps, and even transfer files and photos simply by clicking and dragging. But it’s also frighteningly vulnerable to hacks: according to research firm Zimperium, a nasty security hole has left “tens of millions” of AirDroid’s users susceptible to data-stealing attackers.

At fault is the app’s weak method of encryption. In a blog post published Friday, Zimperium reported that AirDroid’s key — a digital passcode made up of a combination of numbers, letters, and characters — that it uses to obfuscate sensitive updates and data is both “static” and “easily detectable.” And while AirDroid uses the industry-standard HTTPS security protocol to handle most files, the app transfers crucial bits over unencrypted HTTP.

Recommended Videos

That opens the door for a reasonably skilled hacker to perform what’s known as a man-in-the-middle attack: using a third-party computer to impersonate AirDroid’s servers, deliver fraudulent app updates, and view sensitive information. In this manner, hackers could steal email addresses and passwords, surreptitiously install apps, or even replace the legitimate AirDroid application with a malicious replica.

Please enable Javascript to view this content

“A malicious party on the same network as the victim can leverage this vulnerability to take full control of their device,” Simone Margaritelli, Zimperium’s principle security researcher, told Ars Techica. “Moreover, the attacker will be able to see the user’s sensitive information … As soon as the update, or fake update, is installed the software automatically launches the updated [Android app file] without ever verifying who built it.”

Zimperium disclosed the vulnerability to AirDroid in May, but it remains present in the newest major release of AirDroid — version 4 — launched in mid-November. A subsequent patch, version 4.0.0.1, doesn’t appear to have addressed the flaw. And San Studios, the development team behind AirDroid, has yet to respond to Zimperium’s accusations.

In a statement published to the official AirDroid blog, Sand Studio said it hoped to have a fix ready within two weeks.

If you’re an active AirDroid user, your options are relatively few.

Android limits the extent to which malicious apps can modify your phone’s files, but AirDroid has more access than most. It can make app purchases, and can access contacts, text messages, device location, camera, microphone, photos, Wi-Fi connection data, device ID, and call information. And a malicious update posing as a legitimate one could request additional permissions.

A virtual private network, or VPN, is a potential — but imperfect — solution. VPNs add a layer of security to unencrypted networks, providing a measure of protection from attackers. Ars Technica notes, though, there’s no guarantee a hacker won’t work around it by employing a captive portal — the sort of web page that hotels and airlines use to collect payment and registration information — to kick a VPN user to a compromised connection.

Until the problem’s patched, you’re best off using AirDroid only on wireless networks that you know and trust. If you rely on public Wi-Fi, though, you’re safest disabling or uninstalling AirDroid until a patch is in place.

Kyle Wiggers
Former Digital Trends Contributor
Kyle Wiggers is a writer, Web designer, and podcaster with an acute interest in all things tech. When not reviewing gadgets…
The Samsung Galaxy A16 sets a new record for budget Android phones
Galaxy A16 banner Samsung

We've known that Samsung's next lineup of budget phones was on the way, especially after all of the information that leaked last week. Now, we have confirmation on several elements of the phone, but the most important of them all is the incredible (and unheard of) six years of security patches the Galaxy A16 5G will receive from launch. That means it will be fully up to date until October 31, 2030.

We reported on this possibility a couple of weeks ago, but now it's confirmed — and that's a big deal. Many budget phones only receive two years of security patches post-launch. The Galaxy A16 5G's six years of support puts it only one year behind Samsung's flagship models in the Galaxy S24 series. For a phone as cheap as the Galaxy A16, that's incredible.

Read more
A virus infected more than 11 million Android devices. Here’s what we know
A person holding an Android phone while on a bike. The display shows the Google Play Store.

According to statistics, it's expected that people will download 143 billion apps in 2026 alone. That's a lot of people and a lot of phones, so it's no surprise that bad actors have pinpointed the Play Store as an ideal distribution center. According to security researchers at Kaspersky SecureList, the infamous Necro malware has been found in Android, with more than an estimated 11 million devices infected.

The estimated download count comes from the researchers taking a look at the different infected apps. There are several that are confirmed infected, including Wuta Camera and Max Browser. There are also WhatsApp mods from unofficial sources that carry the malware, as well as a Spotify mod called Spotify Plus — yes, like the premium service. The report also touches on a number of infected mods for games like Minecraft and Melon Sandbox.

Read more
How one phone app uses your voice to detect high blood pressure
The Voice Memos app running on an iPhone 14 Pro.

The wearable segment is at a standstill right now because companies have apparently run out of sensor innovation. Microfluidics and stretchable electronics have recently emerged as hotbeds for cutting-edge wearable research, but those promising papers have yet to see commercial success.

Klick Labs, on the other hand, is looking at voice recordings as the next goldmine for biomarkers. Imagine using voice recordings from a smartphone as a monitoring tool for Type 2 diabetes or voice clips to assess glucose levels. It sounds rather factastical, but that’s what the team has been working on, and with encouraging results.

Read more