LG plugs gap exposing info of millions of G3 users
Attackers could steal personal data and images from WhatsApp and more

LG has patched a security vulnerability that had the potential to allow attackers to steal personal information from an estimated 10 million G3 smartphones users worldwide.
The vulnerability was discovered in Smart Notice, which is one of LG's pre-installed apps on every G3 handset. Smart Notice displays a selection of notifications, suggestions and reminders to user, similar to Android's own Notification Center.
Security researchers Liran Segal and Shachar Korot, who found the vulnerability, said an attacker could easily steal sensitive data from the device's SD card, including WhatsApp data and images.
But as well as removing data, cunning attackers could also inject their own malicious code into the unsecured app to mislead the user into phishing scams and drive-by attacks', the latter being a program that is automatically downloaded to the user's device without their consent or knowledge.
"We informed LG, which responded quickly to notice of the vulnerability and we encourage users to immediately upgrade their application to new Smart Notice release, which contains a patch," wrote the researchers in a blog post detailing their findings.
SNAP', as the researchers have dubbed it, exposes G3 smartphones to attack by running arbitrary JavaScript code on the devices, which can lead to the vulnerabilities mentioned, as well as others.
The researchers, who represent security firms Cynet and BugSec Group, uncovered the bug by introducing vulnerable phones to contacts that were riddled with malicious code. When notifications, such as callback prompts or birthday reminders were displayed, Smart Notice would then trigger the hidden payloads.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"With a little tweak, we were able to load external scripts from a remote host and refresh' our code every few seconds, giving us the ability to have active command and control over the LG phone and send new payloads," the researchers added.
In addition, the researchers also introduced proof-of-concept payloads to the devices to probe how severe the vulnerability was. In doing so, they were able to harvest data from the SD card, open the browser to any remote site and perform a denial-of-service attack that could cause the user's "phone to go crazy".
LG has now issued a patch, and recommends that people with vulnerable handset install the update as soon as possible.
IT Pro contacted LG for comment but had not received a response at the time of publication.
-
Capita tells pension provider to 'assume' nearly 500,000 customers' data stolen
Capita told the pension provider to “work on the assumption” that data had been stolen
By Ross Kelly
-
Gumtree site code made personal data of users and sellers publicly accessible
News Anyone could scan the website's HTML code to reveal personal information belonging to users of the popular second-hand classified adverts website
By Connor Jones
-
Pizza chain exposed 100,000 employees' Social Security numbers
News Former and current staff at California Pizza Kitchen potentially burned by hackers
By Danny Bradbury
-
83% of critical infrastructure companies have experienced breaches in the last three years
News Survey finds security practices are weak if not non-existent in critical firms
By Rene Millman
-
Identity Automation launches credential breach monitoring service
News New monitoring solution adds to the firm’s flagship RapidIdentity platform
By Praharsha Anand
-
Neiman Marcus data breach hits 4.6 million customers
News The breach took place last year, but details have only now come to light
By Rene Millman
-
Indiana notifies 750,000 after COVID-19 tracing data accessed
News The state is following up to ensure no information was transferred to bad actors
By Rene Millman
-
Pearson fined $1 million for downplaying severity of 2018 breach
News The SEC found the London-based firm made “misleading statements and omissions” about the intrusion
By Rene Millman