Jailbreaking, rooting and unlocking are the processes of gaining unauthorized access or elevated privileges on a system. The terms are different between operating systems, and the differences in terminology reflect the differences in security models used by the operating systems vendors.
Here are just some of the dangers that you’re exposing your device to when rooting/jailbreaking it:
- Some jailbreaking methods leave SSH enabled with a well-known default password (e.g., alpine) that attackers can use for Command & Control;
- The entire file system of a jailbroken device is vulnerable to a malicious user inserting or extracting files. This vulnerability is exploited by many malware programs, including Droid Kung Fu, Droid Dream and Ikee. These attacks may also affect unlocked Windows Phone devices, depending on the achieved unlocking level;
- Credentials to sensitive applications, such as banking or corporate applications, can be stolen using keylogging, sniffing or other malicious software and then transmitted via the internet connection.
- Applications on a jailbroken device run as root outside of the iOS sandbox. This can allow applications to access sensitive data contained in other apps or install malicious software negating sandboxing functionality;
- Jailbroken devices can allow a user to install and run self-signed applications. Since the apps do not go through the App Store, Apple does not review them. These apps may contain vulnerable or malicious code that can be used to exploit a device.
- Android users that change the permissions on their device to grant root access to applications increase security exposure to malicious applications and potential application flaws;
- 3rd party Android application markets have been identified as hosting malicious applications with remote administrative (RAT) capabilities.