SAN FRANCISCO – Millions of Samsung Galaxy smartphone owners may be at risk

of eavesdropping of calls, theft of data and installation of malware – and

there isn’t much they can do about it.

The flaw is found in Swiftkey keyboard software preinstalled on 600 million

of the South Korean electronics giant’s smartphones, mobile security company NowSecure said Wednesday.

Affected users are powerless to address the vulnerability because they cannot

uninstall the software.

Affected devices include the recently released Galaxy

S6, as well as the S5, S4, and S4 Mini on all major carriers, NowSecure

said.

Samsung said it will release a fix for the problem in the next few days,

accessible through its service Samsung Knox. It will come in the form of a

security policy update that can be downloaded onto the phones.

“Samsung takes emerging security threats very seriously,” Samsung

said in a statement. “In addition to the security policy update, we are

also working with Swiftkey to address potential risks going forward.”

Consumers can be forgiven for feeling whipsawed by security flaws and

breaches that compromise their data held by retailers and banks and now on the

mobile devices they use. Target in 2013 reported 40 million people had their

credit card numbers stolen from its point of sale terminals, and followed up

that report with news that another hack got the names, email addresses and

phone numbers of 70 million customers. JPMorgan Chase, the largest bank in the

country, reported last year that 76

million households and 7 million small businesses had their account information

stolen. And on Monday, password manager service LastPass announced hackers

had stolen the email addresses and master password clues of its users.

NowSecure said Samsung was notified in December 2014 of the problem.

“While Samsung began providing a patch to mobile network operators in

early 2015, it is unknown if the carriers have provided the patch to the

devices on their network,” NowSecure said in its report. All of the phones

either have no patch available or the status of the patch is unknown, according

to the list.

The phones are vulnerable to attack from a variety of fronts, according to

NowSecure’s technical analysis of the flaw. A less sophisticated hacker who’s

nearby a phone might gain access through unsecured Wi-Fi connections. Or a

serious attacker could use a more involved approach to gain access from much

farther away, according to NowSecure.

As a result, the flaw would appear to be a pervasive and serious problem

until fixed.

“To reduce your risk, avoid insecure Wi-Fi networks, use a different

mobile device and contact your carrier for patch information and timing,”

NowSecure said in its report.

However, some security professionals noted that an attack might have limited

returns for hackers.

“It appears there needs to be a lot of things in place for this to work

properly,” Nathan Collier, senior malware intelligence analyst at

Malwarebytes Labs, said in an email about NowSecure’s description of how an

intruder could break into a phone.

Noting that he didn’t expect to see anyone carrying out such an attack,

Collier said it wasn’t the typical route taken by people trying to take over

computers and devices.

“Malware authors are looking for big returns using the path of least

resistance, and having to write code for several different phone models is

quite tedious. Samsung is aware of the issue. Hopefully they will be providing

a patch for their customers shortly.”