Find out how to kick start your games industry career

Get Your Free Ticket Today

Android security hole could endanger 99% of devices

APK code loophole leaves door open for malware

A security flaw has allegedly been discovered in the APK code of android-powered devices which will allow malware to be loaded under the guise of an authentic cryptographic signature.

The loophole could affect 99 per cent of all Android devices and is essentially a security "master key" says Bluebox Security CTO Jeff Foristal. Because the modifications to the APK code do not affect an app's signature, neither handsets, tablets or the various Android marketplaces will be able to distinguish trojan programs from genuine code, meaning that data can be hijacked and hardware 'zombied'.

Forristal says that the issue dates back four years to Android 1.6, or Donut, and thus could affect nearly 900 million operating systems.

"While the risk to the individual and the enterprise is great," writes Forristal, "(a malicious app can access individual data, or gain entry into an enterprise), this risk is compounded when you consider applications developed by the device manufacturers (e.g. HTC, Samsung, Motorola, LG) or third-parties that work in cooperation with the device manufacturer (e.g. Cisco with AnyConnect VPN) - that are granted special elevated privileges within Android - specifically System UID access.

"Installation of a Trojan application from the device manufacturer can grant the application full access to Android system and all applications (and their data) currently installed. The application then not only has the ability to read arbitrary application data on the device (email, SMS messages, documents, etc.), retrieve all stored account & service passwords, it can essentially take over the normal functioning of the phone and control any function thereof (make arbitrary phone calls, send arbitrary SMS messages, turn on the camera, and record calls). Finally, and most unsettling, is the potential for a hacker to take advantage of the always-on, always-connected, and always-moving (therefore hard-to-detect) nature of these 'zombie' mobile devices to create a botnet."

Forristal will be making more details of the discovery public at the 2013 Black Hat security convention, where he's speaking later this year. Forristal says the bug was reported to Google in February, 2013.

Find out how to kick start your games industry career

Get Your Free Ticket Today

More stories

GoodGame Studios launches publishing division with eyes on mobile

Company has released RTS title War Alliance from developer Magnific Games

By Danielle Partis

IronSource acquires marketing platform Bidalgo

Deal aims to “deepen” company's market presence, expanding into social and ecommerce apps

By Danielle Partis

Latest comments (5)

Paul Shirley Programmers 8 years ago
It's a pity you cut the part where they point out Google already check for and filter out this exploit in the Play store.

Just have to hope the fix doesn't bork hacking apps. Right now recovering large amounts of space is possible with any zip tool and system privileges dont depend on the signing key ;)
2Sign inorRegisterto rate and reply
Paul Johnson Managing Director / Lead code monkey, Rubicon Development8 years ago
If true, this is probably the first time any one thing has worked on 99% of all Android devices.
12Sign inorRegisterto rate and reply
Nicholas Pantazis Senior Editor, VGChartz Ltd8 years ago
@ Paul Johnson lol, even as an Android owner, pretty funny. It's very much the new Windows.

@ Paul Shirley Indeed, this article is pretty sensationalist. I doubt the fix would have any effect on rooting apps.
0Sign inorRegisterto rate and reply
Show all comments (5)
Paul Johnson Managing Director / Lead code monkey, Rubicon Development8 years ago
Hehe, it was a cheap shot but I just couldn't resist. :)
0Sign inorRegisterto rate and reply
David M Lopez Studying Game Art and Design, Art Institute of California - San Diego8 years ago
What are they do about it?
0Sign inorRegisterto rate and reply

Sign in to contribute

Need an account? Register now.