Home / Technology / Gadgets / Report says Galaxy S3 among a few Samsung devices prone to malware

Report says Galaxy S3 among a few Samsung devices prone to malware

A developer says that Samsung’s most popular devices could be more prone to getting infected by malware. The problem could lie in a security flaw in the Exynos 4 chip, which is also made by the Korean firm.

XDA Developers member, Alephzain, says that a problem was found while searching for a new method of rooting the highly popular Samsung Galaxy S3. A problem was found in the Exynos 4 chip. In theory, any malicious app will be able to extract data from the RAM. It may also inject the kernel with malware.

Alephzain writes, “RAM dump, kernel code injection and others could be possible via app installation from Play Store.” This issue could also affect the Galaxy S2 and the Galaxy Note 2.

The developer adds, “The good news is we can easily obtain root on these devices, and the bad is there is no control over it.”

The good news is, there is a way to stop the possibility of malware from infecting the code. It requires changing the code within the device. Unfortunately, this will disable the camera of the Galaxy S3. AndreiLux, another developer, says, “Removing either read or write permissions will kill the camera. I didn’t see any other deterioration in anything else.”

Samsung is taking this issue seriously. In a statement to CNET UK, the Korean firm said, “We are currently in the process of conducting an internal review.”

If the threat does exist, we’re hoping Samsung rolls out a fix as soon as possible. The issue affects three of their most popular devices and it’s likely the Korean tech giant will do everything it can to fix the problem. Otherwise, potential buyers looking to get their hands on one of the three devices will simply buy devices from Samsung’s rivals instead.

Does the possibility of a new security threat involving the Samsung Galaxy S3, Samsung Galaxy Note 2, and Samsung Galaxy S2 alarm you? Let us know what’s on your mind through a comment below.