{"id":8726,"date":"2017-07-03T03:25:55","date_gmt":"2017-07-03T07:25:55","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=8726"},"modified":"2021-02-01T19:35:08","modified_gmt":"2021-02-01T15:35:08","slug":"rooting-your-android-advantages-disadvantages-and-snags","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/rooting-your-android-advantages-disadvantages-and-snags\/8726\/","title":{"rendered":"Rooting your Android: Advantages, disadvantages, and snags"},"content":{"rendered":"<p>Many users of Android devices sooner or later are tempted to root them. Here we discuss the advantages and disadvantages of having root permissions on Android devices \u2014 and if your device should be rooted at all.<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<h2>Why people root their Android devices<\/h2>\n<p>Obtaining superuser access rights, popularly known as\u00a0<em>rooting<\/em>, lets owners take full control of their devices. It is possible to do virtually anything with superuser access rights, and quite a few apps (including some in the Google Play store) require root permissions to function properly.<\/p>\n<p>Superuser access privileges are typically sought to expand regular Android capabilities. For example, you can limit network activity for some or all apps, delete annoying preinstalled apps, speed up the CPU, and more.<\/p>\n<p>We used\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/kaspersky-security-network-explained\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Kaspersky Security Network<\/a>\u00a0to compile a list of the most popular reasons that users root their Android devices.<\/p>\n<ul>\n<li><b>Install apps that hack games.<\/b>\u00a0These apps gain access to the memory where games are stored and modify parameters to allow free gameplay.<\/li>\n<li><b>Access the file system.<\/b>\u00a0Unrestricted access to the file system may be useful for recovering erased files, moving apps to an SD card, or using root explorers, which are applications with advanced file-system functions.<\/li>\n<li><b>Tweak, overclock, or clean the device.<\/b>\u00a0<em>Overclocking<\/em>\u00a0means increasing the CPU clock frequency of a device so that it works faster.<\/li>\n<li><b>Change the Android version.<\/b>\u00a0Some users flash third-party firmware ROMs (install different versions of the operating system) created by enthusiasts.<\/li>\n<\/ul>\n<h3>How people gain root privileges<\/h3>\n<p>According to our data, people use applications such as Kingroot, 360 Root, Framaroot, Baidu Easy Root, Towelroot, One Click Root, and Mgyun to gain superuser access rights. Unfortunately, many of these applications either show advertisements or\u00a0<a href=\"https:\/\/forum.xda-developers.com\/android\/general\/kingroot-malware-adware-root-t3563090\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">install adware<\/a>\u00a0on a device. Their behavior is not necessarily malicious, but nothing good comes of it.<\/p>\n<p>We do not recommend using any of those applications for rooting. Well, we don\u2019t recommend rooting at all. Here\u2019s why.<\/p>\n<h3>The dangers of rooting<\/h3>\n<p>As we said, superuser access rights grant full control over a device. Although that access has some potential advantages (mentioned above), it comes with disadvantages as well.<\/p>\n<p>It is important to understand that having a device with superuser system permissions violates Android\u2019s basic security principles. Rooting is, in effect, do-it-yourself hacking of the operating system of your tablet or smartphone.<\/p>\n<p>Normally, Android apps work in isolated environments (in so-called sandboxes) and cannot gain access to other apps or the system. However, an app with superuser access rights can venture out of its isolated environment and take full control over the device.<\/p>\n<p>With superuser access rights, apps can do whatever they like \u2014 for example, view, modify, or delete files, including those that are required for device operation.<\/p>\n<p>Also, note that rooting voids the device\u2019s warranty. Sometimes, the process of rooting can even brick a device, and in that case, you\u2019re simply out of luck; there\u2019s no way you\u2019ll get a refund for it.<\/p>\n<h3>Malicious applications and rooted Androids<\/h3>\n<p>After gaining superuser access rights, malicious applications enjoy full freedom. In fact, the first thing many Trojans for Android do is attempt to gain root access. Users rooting their own devices offer quite a gift to malware developers.<\/p>\n<p>With superuser access, mobile Trojans can:<\/p>\n<ul>\n<li>Steal passwords from a browser (as the\u00a0<a href=\"https:\/\/securelist.com\/76101\/the-banker-that-can-steal-anything\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Tordow<\/a>\u00a0banking Trojan did);<\/li>\n<li>Purchase applications surreptitiously in Google Play (the\u00a0<a href=\"https:\/\/securelist.com\/75894\/how-trojans-manipulate-google-play\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Guerrilla and Ztorg Trojans<\/a>\u00a0did that);<\/li>\n<li>Substitute URLs in a browser (as the\u00a0<a href=\"https:\/\/securelist.com\/74997\/everyone-sees-not-what-they-want-to-see\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Triada<\/a>\u00a0Trojan did);<\/li>\n<li>Install applications stealthily, including onto system partitions;<\/li>\n<li>Modify firmware so that Trojans remain on a device even after it is reset to factory settings.<\/li>\n<\/ul>\n<p>Some ransomware Trojans use superuser access rights to improve their chances of staying in the system.<\/p>\n<p>In most cases, malware is capable of gaining superuser access rights on its own by exploiting vulnerabilities in the system. But some malware applications use existing permissions. Furthermore, according to our data, approximately 5% of malware applications \u2014 for example, the Obad mobile Trojan \u2014 check devices for root permissions.<\/p>\n<h3>The geography of rooting<\/h3>\n<p>Our statistics show that rooting is most popular in Venezuela, with 26% of users having rooted smartphones. Algeria takes the lead among African countries, with 19% of smartphones operating with superuser access rights. In Asia, rooting Android is most popular in Bangladesh, with 13% of devices rooted. In Europe, Moldova, at 15%, has the lead.<\/p>\n<p>As for Russia, 6.6% of owners of Android devices use rooted smartphones, which is close to the world average percentage (7.6%). Neither North America nor Western Europe includes any top-rooting countries.<\/p>\n<p>Our statistics show that the top 10 countries where Android devices are rooted most frequently and the top 10 countries where mobile devices are successfully attacked overlaps by 60%. And 9 of the 10 countries with the largest number of rooted devices are in the top 25 countries where devices are attacked most often.<\/p>\n<p>\u00a0<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-8728\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2017\/07\/03032020\/map_EN.png\" alt=\"\" width=\"1430\" height=\"1430\"><\/p>\n<p>\u00a0<\/p>\n<h3>Does antivirus work on a rooted Android device?<\/h3>\n<p>Regrettably, although criminals can exploit the advantages of gaining superuser rights and use them to bypass security mechanisms, the good guys still have to play by the rules. In short, antivirus works on rooted devices, but superuser access doesn\u2019t increase its effectiveness.<\/p>\n<p>Of course, how well malware can take advantage of the capabilities of a rooted system varies. But the risk of a security solution letting a threat through on a rooted device is higher than on a device without superuser access rights.<\/p>\n<h2>So, should you root your Android device?<\/h2>\n<p>Using a system with superuser access rights is similar to driving a heavy truck. If you are\u00a0<em>really<\/em>\u00a0capable of handling that, then why not? But if you aren\u2019t, then get the necessary knowledge and skills first. So if you\u2019re not into IT and don\u2019t consider yourself a pro-user, then we do not recommend rooting Android.<\/p>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/app.appsflyer.com\/com.kms.free?pid=smm&amp;c=me-ar_yt\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-8729\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2017\/07\/03032105\/kisa-generic-pc-EN.jpg\" alt=\"\" width=\"1460\" height=\"300\"><\/a><\/p>\n<p>\u00a0<\/p>\n<p>A few more pieces of advice:<\/p>\n<ul>\n<li>Install applications from official stores only \u2014 but even so, don\u2019t trust them blindly. Although the Google Play store is far more trustworthy than random Internet sites,\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/ztorg-botnet\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Trojans<\/a>\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/acecard-android-trojan\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">sometimes<\/a><a href=\"https:\/\/www.kaspersky.com\/blog\/dresscode-android-trojan\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">get in<\/a>.<\/li>\n<li>Limit yourself to known apps from known developers and only those apps that are really needed.<\/li>\n<li>Scan installed apps with a reliable antivirus \u2014 for example, our free<a href=\"https:\/\/app.appsflyer.com\/com.kms.free?pid=smm&amp;c=me-ar_yt\" target=\"_blank\" rel=\"noopener nofollow\">\u00a0Kaspersky Internet Security for Android.<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Many users of Android devices sooner or later are tempted to root them. Here we discuss the advantages and disadvantages of having root permissions on Android devices \u2014 and if your device should be rooted at all.<\/p>\n","protected":false},"author":292,"featured_media":8727,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,1486,9],"tags":[2088,105],"class_list":{"0":"post-8726","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"category-tips","10":"tag-tips","11":"tag-android"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/rooting-your-android-advantages-disadvantages-and-snags\/8726\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/8726","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/292"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=8726"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/8726\/revisions"}],"predecessor-version":[{"id":14824,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/8726\/revisions\/14824"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/8727"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=8726"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=8726"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=8726"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}