Computer Security Researcher Reveals How Meta's Virtual Reality Headset is...

Researcher Reveals How Meta's Virtual Reality Headset is Vulnerable to Ransomware Attacks

In an unprecedented exploration into the security of virtual reality headsets, researcher Harish Santhanalakshmi Ganesan has demonstrated a method to deliver malware to Meta’s Quest 3 headset, highlighting a significant new threat surface. This development marks a notable entry into the realm of spatial computing attacks, which have been relatively rare.

Ganesan’s interest was piqued by claims on Reddit asserting the difficulty of installing malware on the Quest 3 VR without enabling developer mode. Taking this as a challenge, he set out to investigate the potential vulnerabilities of the device. His findings reveal a concerning method that allows for the installation of any APK on the Quest 3, facilitated by its underlying restricted version of the Android Open Source Project (AOSP).

Through simple online research, including YouTube tutorials, Ganesan discovered that an app from Meta’s App Lab could provide access to the native Android file manager. Utilizing this, he successfully installed CovidLock ransomware on his headset. CovidLock is notorious for targeting Android devices by masquerading as a COVID-19 tracker app, gaining permissions to lock users out of their devices and display ransom notes.

The critical takeaway from Ganesan’s research is not the specific malware used but the process he unearthed, which could be exploited to deliver any malware via social engineering. In an interview with SecurityWeek, he clarified, “This research is not about a vulnerability in Meta Quest 3 but about an attack surface that allows people to sideload malware without developer options.”

Ganesan has not published the technical details of his method, yet he believes it would be relatively straightforward for malicious actors to replicate the process. He suggests that attackers could use social engineering to trick users into installing malicious apps on their Quest 3 headsets, potentially turning those apps into device administrators without needing developer mode.

Given that the issue does not stem from a technical vulnerability, it is unlikely that Meta will respond with a patch. Instead, Ganesan's research serves as a critical warning for VR users about the dangers of social engineering attacks. He advises VR users to exercise caution and avoid sideloading applications, echoing the security advice commonly given to smartphone users.

Loading...