Android Lock exploit is a real thing and everyone knows about it. This discovery was made by the University of Austin, Texas, where a new report revealed an exploit that hackers can use a very large code to easily bypass the lock screen of Android devices. This works with devices running on Android 5.0 to Android 5.1.1 with a password-based lock, and it does not matter if you have enabled encryption on the device. Recent Google numbers put Android Lollipop versions running on 21% of all Android devices, which means they all could be easily hacked.
Hacking your Android Lollipop device could be as easy as inserting a very very long password via this Android Lock exploit. Hackers could infect a phone by simply swiping left from the lock screen in order to open the camera app and then they can access the “Settings” menu from the notifications panel. When they tap the Settings menu they would be prompted to enter a password. After introducing a long string of characters, hackers can crash the device to the home screen. There they can access different apps or take information and expose data.
There’s more than one way to go about this Android Lock exploit. Hackers can copy a large string of characters into the Android clipboard and they can paste into the password prompt. They can also use the emergency dialing field to type long lists of codes that can be used on the password prompt as well.
As luck would have it, Google took action and managed to fix the problem via a security update that began to roll-out to devices last week. You will find it in the Android build LMY48M. The fix for this Android lock exploit could take months to reach all affected devices though, as we all know carrier-locked devices take more time to update than others. Nexus devices already got this fix.