Close
Are you sure? Are you sure you want to report this comment? I understand, report it. Cancel

Android security hole could endanger 99% of devices

Android security hole could endanger 99% of devices

Thu 04 Jul 2013 7:33am GMT / 3:33am EDT / 12:33am PDT
Mobile

APK code loophole leaves door open for malware

A security flaw has allegedly been discovered in the APK code of android-powered devices which will allow malware to be loaded under the guise of an authentic cryptographic signature.

The loophole could affect 99 per cent of all Android devices and is essentially a security "master key" says Bluebox Security CTO Jeff Foristal. Because the modifications to the APK code do not affect an app's signature, neither handsets, tablets or the various Android marketplaces will be able to distinguish trojan programs from genuine code, meaning that data can be hijacked and hardware 'zombied'.

Forristal says that the issue dates back four years to Android 1.6, or Donut, and thus could affect nearly 900 million operating systems.

"While the risk to the individual and the enterprise is great," writes Forristal, "(a malicious app can access individual data, or gain entry into an enterprise), this risk is compounded when you consider applications developed by the device manufacturers (e.g. HTC, Samsung, Motorola, LG) or third-parties that work in cooperation with the device manufacturer (e.g. Cisco with AnyConnect VPN) - that are granted special elevated privileges within Android - specifically System UID access.

"Installation of a Trojan application from the device manufacturer can grant the application full access to Android system and all applications (and their data) currently installed. The application then not only has the ability to read arbitrary application data on the device (email, SMS messages, documents, etc.), retrieve all stored account & service passwords, it can essentially take over the normal functioning of the phone and control any function thereof (make arbitrary phone calls, send arbitrary SMS messages, turn on the camera, and record calls). Finally, and most unsettling, is the potential for a hacker to take advantage of the always-on, always-connected, and always-moving (therefore hard-to-detect) nature of these 'zombie' mobile devices to create a botnet."

Forristal will be making more details of the discovery public at the 2013 Black Hat security convention, where he's speaking later this year. Forristal says the bug was reported to Google in February, 2013.

5 Comments

Paul Shirley
Programmers

178 150 0.8
It's a pity you cut the part where they point out Google already check for and filter out this exploit in the Play store.

Just have to hope the fix doesn't bork hacking apps. Right now recovering large amounts of space is possible with any zip tool and system privileges dont depend on the signing key ;)

Posted:A year ago

#1

Paul Johnson
Managing Director / Lead code monkey

834 1,079 1.3
Popular Comment
If true, this is probably the first time any one thing has worked on 99% of all Android devices.

Posted:A year ago

#2

Nicholas Pantazis
Senior Editor

1,019 1,467 1.4
@ Paul Johnson lol, even as an Android owner, pretty funny. It's very much the new Windows.

@ Paul Shirley Indeed, this article is pretty sensationalist. I doubt the fix would have any effect on rooting apps.

Posted:A year ago

#3

Paul Johnson
Managing Director / Lead code monkey

834 1,079 1.3
Hehe, it was a cheap shot but I just couldn't resist. :)

Posted:A year ago

#4

David M Lopez
Studying Game Art and Design

8 2 0.3
What are they do about it?

Posted:A year ago

#5

Login or register to post

Take part in the GamesIndustry community

Register now