By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Times CatalogTimes CatalogTimes Catalog
  • Home
  • Tech
    • Google
    • Microsoft
    • YouTube
    • Twitter
  • News
  • How To
  • Bookmarks
Search
Technology
  • Meta
Others
  • Apple
  • WhatsApp
  • Elon Musk
  • Threads
  • About
  • Contact
  • Privacy Policy and Disclaimer
© 2025 Times Catalog
Reading: Hackers targeted Android users by exploiting zero-day bug in Qualcomm chips
Share
Notification
Font ResizerAa
Font ResizerAa
Times CatalogTimes Catalog
Search
  • News
  • How To
  • Tech
    • AI
    • Apple
    • Microsoft
    • Google
    • ChatGPT
    • Gemini
    • YouTube
    • Twitter
  • Coming Soon
Follow US
  • About
  • Contact
  • Privacy Policy and Disclaimer
© 2025 Times Catalog
Times Catalog > Blog > News > Hackers targeted Android users by exploiting zero-day bug in Qualcomm chips
News

Hackers targeted Android users by exploiting zero-day bug in Qualcomm chips

Debra Massey
Last updated: October 10, 2024 8:36 am
Debra Massey
Share
6 Min Read
A breach of a data broker’s trove of location data threatens the privacy of millions
SHARE

In a concerning development, chipmaker Qualcomm has confirmed that a zero-day vulnerability in its chipsets has been actively exploited by hackers. This vulnerability, officially identified as CVE-2024-43047, affects dozens of Qualcomm chipsets commonly found in popular Android devices, potentially exposing millions of users to serious security risks.

Contents
Limited but Targeted ExploitationWho is at Risk?Coordinated Disclosure and Ongoing InvestigationA Wake-Up Call for Device Makers and Users Alike

A “zero-day” vulnerability refers to a security flaw that is unknown to the hardware or software maker at the time it is first exploited, leaving devices unprotected and highly vulnerable. According to Qualcomm, the zero-day flaw was actively targeted before it was discovered and reported by Google’s Threat Analysis Group (TAG), which monitors global cyber threats, including state-sponsored hacking.

Limited but Targeted Exploitation

Qualcomm has disclosed that the CVE-2024-43047 vulnerability “may be under limited, targeted exploitation.” While details about the attackers and the victims remain scarce, Qualcomm’s statement hints that the exploitation was highly selective. This aligns with Google TAG’s preliminary findings, which indicate the vulnerability was likely used in precision cyberattacks rather than broad-based hacking campaigns.

Amnesty International’s Security Lab, a nonprofit dedicated to defending human rights through digital security research, confirmed Google’s assessment. Amnesty has long been at the forefront of exposing spyware and surveillance threats that target civil society, and its involvement underscores the gravity of this particular threat.

Though it is not yet known who was behind these attacks, or why specific individuals were targeted, Qualcomm’s advisory notes that the chipsets affected include high-end models such as the Snapdragon 8 (Gen 1), which powers a range of Android smartphones. Devices from major manufacturers such as Samsung, Motorola, OnePlus, Oppo, Xiaomi, and ZTE are vulnerable, highlighting the potential scale of the issue.

Who is at Risk?

While the exact scope of the campaign remains unclear, the fact that both Google and Amnesty describe the exploitation as “limited” suggests that the hackers focused on a select group of high-value targets. This raises important questions about who may have been singled out. Given TAG’s expertise in tracking government-backed hacking operations, there is speculation that the attacks may have been politically or economically motivated, although no official confirmation has been given.

Even with this seemingly limited focus, millions of Android users worldwide could still be at risk if patches are not quickly applied to vulnerable devices. Qualcomm has stressed that it has provided patches to its partners as of September 2024. However, it is now up to Android device manufacturers to push these critical updates to their customers.

Coordinated Disclosure and Ongoing Investigation

Qualcomm has publicly thanked Google Project Zero and Amnesty International Security Lab for their role in identifying and responsibly disclosing the vulnerability. Coordinated disclosure practices are critical in cybersecurity, as they give companies the opportunity to patch vulnerabilities before they are widely exploited.

Google TAG, which first flagged the issue, has remained tight-lipped for now, with spokesperson Kimberly Samra stating that TAG has no further comments to offer at this time. However, Qualcomm’s Catherine Baker pointed to TAG’s involvement as an example of how industry collaboration can mitigate security risks.

Amnesty International’s Security Lab is expected to release a detailed report on the zero-day vulnerability soon, shedding more light on the potential scale and intent behind the attacks. According to Amnesty’s spokesperson, Hajira Maryam, the nonprofit’s forthcoming research will provide a more comprehensive analysis of the threat.

A Wake-Up Call for Device Makers and Users Alike

The zero-day vulnerability CVE-2024-43047 serves as a stark reminder of the importance of timely security updates, both for device manufacturers and end users. Android device makers now bear the responsibility of rolling out patches for potentially millions of devices. Until these updates are delivered and installed, users remain exposed to the risk of exploitation.

This incident also raises the alarm about the increasing sophistication of cyberattacks. Zero-day vulnerabilities are particularly dangerous because they exploit previously unknown flaws, leaving even the most up-to-date systems vulnerable. In this case, the fact that only a select number of individuals seem to have been targeted does not lessen the urgency of the situation. Instead, it highlights the potential for more widespread attacks if the vulnerability had remained undiscovered.

As the tech community awaits more information from Google and Amnesty, the key takeaway for Android users is clear: patch your devices as soon as updates are available. The fallout from this zero-day exploit may only be beginning, and vigilance is essential.

You Might Also Like

Logitech’s MX Creative Console now supports Figma and Adobe Lightroom

Samsung resumes its troubled One UI 7 rollout

Google Messages starts rolling out sensitive content warnings for nude images

Vivo wants its new smartphone to replace your camera

Uber users can now earn miles with Delta Air Lines

Share This Article
Facebook Twitter Pinterest Whatsapp Whatsapp Copy Link
What do you think?
Love0
Happy0
Sad0
Sleepy0
Angry0
Previous Article Ring adds AI-enabled 'Smart Video Search' as part of its upcoming $20 subscription service Ring adds AI-enabled ‘Smart Video Search’ as part of its upcoming $20 subscription service
Next Article The Internet Archive is under attack, with a breach revealing info for 31 million accounts The Internet Archive is under attack, with a breach revealing info for 31 million accounts
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

144FollowersLike
23FollowersFollow
237FollowersPin
19FollowersFollow

Latest News

Pinterest is prompting teens to close the app at school
Pinterest is prompting teens to close the app at school
News Tech April 22, 2025
ChatGPT search is growing quickly in Europe, OpenAI data suggests
ChatGPT search is growing quickly in Europe, OpenAI data suggests
AI ChatGPT OpenAI April 22, 2025
social-media-is-not-wholly-terrible-for-teen-mental-health-study-says
Social media is not wholly terrible for teen mental health, study says
News April 22, 2025
Google is trying to get college students hooked on AI with a free year of Gemini Advanced
Google is trying to get college students hooked on AI with a free year of Gemini Advanced
AI Gemini Google Tech April 19, 2025
Times CatalogTimes Catalog
Follow US
© 2025 Times Catalog
  • About
  • Contact
  • Privacy Policy and Disclaimer
Welcome Back!

Sign in to your account

Lost your password?