{"id":8534,"date":"2015-03-26T05:00:09","date_gmt":"2015-03-26T12:00:09","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=8534"},"modified":"2015-03-25T12:49:54","modified_gmt":"2015-03-25T19:49:54","slug":"android-installer-hijacking","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2015\/03\/android-installer-hijacking\/","title":{"rendered":"Two Paths to a Compromised Android Device"},"content":{"rendered":"<p>Discovered by Unit 42, the <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/03\/android-installer-hijacking-vulnerability-could-expose-android-users-to-malware\/\" target=\"_blank\">Android Installer Hijacking<\/a> vulnerability <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/03\/how-android-installer-hijacking-works\/\" target=\"_blank\">exploits a flaw<\/a> in Android\u2019s \u201cPackageInstaller\u201d system service, allowing attackers to silently gain unlimited permissions in compromised devices.<!--more--><\/p>\n<p><iframe loading=\"lazy\" width=\"476\" height=\"650\" src=\"\/\/www.slideshare.net\/slideshow\/embed_code\/46277483\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Discovered by Unit 42, the Android Installer Hijacking vulnerability exploits a flaw in Android\u2019s \u201cPackageInstaller\u201d system service, allowing attackers to silently gain unlimited permissions in compromised devices.<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,131,76,108],"tags":[172,1121,316],"coauthors":[716],"class_list":["post-8534","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-malware-2","category-mobility","category-threat-prevention-2","tag-android","tag-android-installer-hijacking","tag-infographic"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8534","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=8534"}],"version-history":[{"count":8,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8534\/revisions"}],"predecessor-version":[{"id":8542,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8534\/revisions\/8542"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=8534"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=8534"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=8534"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=8534"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}