While manufacturers have introduced more customization options and tighter security protocols to reduce these practices, rooted and jailbroken devices continue to pose serious security threats especially in enterprise environments. Security experts emphasize the importance of advanced detection methods capable of identifying not just rooted devices but also the specific tools used to achieve root access. The study found that rooted devices represent just 0.1% of total enterprise devices but are disproportionately targeted by malware and other security threats. A recent study has revealed that rooted devices are over 3.5 times more likely to be targeted by mobile malware, underscoring the risks they bring to organizations. These figures highlight the severe risks associated with using rooted or jailbroken devices in environments where sensitive corporate data is accessed. The study tracked development activity for major frameworks like Magisk and KernelSU, revealing spikes in new forks coinciding with updates or increased security measures from Android and iOS. Rooting and jailbreaking, once popular methods for customizing mobile devices, are now primarily used by power users. Enterprises must remain vigilant against these sophisticated risks, implementing robust security measures to protect sensitive data and systems from compromise. Rooted and jailbroken devices have been detected worldwide, with notable concentrations in countries like the United States and Malaysia. Development communities behind these tools are highly active, with contributors globally collaborating to refine techniques that bypass security measures. This dynamic development landscape underscores the ongoing “cat-and-mouse” game between security vendors and rooting tool developers. Magisk, for instance, uses a “systemless” rooting method that avoids modifying the system partition, making it harder for apps and the OS to detect root access. Rooting (on Android) and jailbreaking (on iOS) allow users to gain privileged access to their device’s operating system, enabling modifications that are typically restricted. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. Threats reported by rooted devices (red) vs stock devices (blue).
This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 20 Mar 2025 14:35:08 +0000