Update: Malicious One-Liner Wipes Samsung Galaxies Clean
0Overall Score

TechRadar report the malicious code can also destroy a user’s sim card.

It appears Samsung’s TouchWiz interface is responsible for the vulnerability as it doesn’t seem to affect devices running vanilla (stock) Android. Among the infected Samsung devices are the Galaxy S3, S2, Beam, S Advance and Ace.

The code has the potential to be encoded into a NFC tag or QR code, which would see all of the data wiped off the vulnerable smartphones, with no way of stopping the factory reset.

Ravi Borgaokar revealed the hack at the Ekoparty security conference and has come under scrutiny for doing so. On the one hand, Borgoakar’s revealing of the code will see developers educated on the vulnerability and tend to it. On the other hand, hackers could become aware of the code and put it into action.

Check out the video below for a look at the code in action.

Update: Samsung’s PR Company reached out to SmartHouse with the following comment: 

“Samsung Electronics Australia is aware of the recently reported security issues that affect some of its telecommunication devices. 

We are working to provide a software update for Australian customers as soon as possible.  
Australian customers with any immediate concerns can contact Customer Service on 1300 362 603 between Monday to Friday between 8:30am – 8pm (EST) and Saturday and Sunday 9am – 5pm (EST)”