Posts Tagged ‘Android’

New Android flaw could send you to a phishing site

April 14, 2014 Leave a comment

Last week news of the Heartbleed bug broke. Initial concern concentrated on the big service providers and whether they were bleeding their users’ credentials, but attention soon turned to client devices, and in particular Android. Google said only one version of Android was vulnerable (4.11 Jelly Bean); but it’s the one that is used on more than one-third of all Android devices.

The problem is, Android simply won’t be patched as fast as the big providers. Google itself is good at patching; but Android is fragmented across multiple manufacturers who are themselves responsible for patching their users – and historically, they are not so good. It prompted ZDNet to write yesterday,

The Heartbleed scenario does raise the question of the speed of patching and upgrading on Android. Take for instance, the example of the Samsung Galaxy S4, released this time last year, it has taken nine months from the July 2013 release of Jelly Bean 4.3 for devices on Australia’s Vodafone network to receive the update, it took a week for Nexus devices to receive the update.
Heartboned: Why Google needs to reclaim Android updates

Today we get further evidence of the need for Google to take control of Android updating – information from FireEye on a new and very dangerous Android flaw. In a nutshell, a malicious app can manipulate other icons.

FireEye mobile security researchers have discovered a new Android security issue: a malicious app with normal protection level permissions can probe icons on Android home screen and modify them to point to phishing websites or the malicious app itself without notifying the user. Google has acknowledged this issue and released the patch to its OEM partners.
Occupy Your Icons Silently on Android

The danger, however, is this can be done without any warning. Android only notifies users when an app requires ‘dangerous’ permissions. This flaw, however, makes use of normal permissions; and Android does not warn on normal permissions. The effect is that an apparently benign app can have dangerous consequences.

FireEye's POC test app does not display any warning to the user

FireEye’s POC test app does not display any warning to the user

As a proof of concept attack scenario, a malicious app with these two permissions can query/insert/alter the system icon settings and modify legitimate icons of some security-sensitive apps, such as banking apps, to a phishing website. We tested and confirmed this attack on a Nexus 7 device with Android 4.4.2. (Note: The testing website was brought down quickly and nobody else ever connected to it.) Google Play doesn’t prevent this app from being published and there’s no warning when a user downloads and installs it. (Note: We have removed the app from Google Play quickly and nobody else downloaded this app.)

Google has already released a patch for Android, and Nexus users will soon be safe. But others? “Many android vendors were slow to adopt security upgrades. We urge these vendors to patch vulnerabilities more quickly to protect their users,” urges FireEye.

Categories: All, Security Issues

Android malware is no longer just about premium rate calls

March 31, 2014 Leave a comment

Experts have been warning for some time about the increasing sophistication of mobile malware. Now FireEye has discovered a new variant of Android.MisoSMS — which was already an advanced information-stealing Android Trojan.

Like the original version of the malware, the new variant sends copies of users’ text messages to servers in China. But the newest rendition adds a few features that make it harder to detect, including a new disguise, encrypted transmissions, and command-and-control (CnC) communications that are handled natively rather than over email.
FireEye — Android.MisoSMS : Its back! Now with XTEA

The latest variant seeks to communicate with its C&C server — still located in China — via a selection of hardcoded public DNS servers. This helps defeat sandbox detection and analysis since sandboxes “typically use internal DNS servers and cut off access to outside networks,” explains FireEye. “If the malware cannot access the hard-coded DNS servers, it does nothing and is therefore not detected.”

A further new sophistication is the use of encryption — a variant of the XTEA encryption algorithm — in communication with the C&C server. It is clear that it is malware designed to infiltrate and persist.


It suggests, warns FireEye, “that cyber attackers are increasingly eyeing mobile devices — and the valuable information they store — as targets. It also serves as a vivid reminder of how crucial protecting this threat vector is in today’s mobile environment.”

Categories: All, Security Issues

Are you vulnerable to the Android master key flaw?

July 10, 2013 Leave a comment

Last week Bluebox Security published details of an Android vulnerability that affects up to 99% of all Android devices. I wrote about it on Infosecurity Magazine here. It’s a code signing flaw that allows attackers to trick the device into accepting an update as an official update even when it isn’t. The fractured nature of the Android market makes it difficult to fix – different manufacturers use different versions of the operating system, and it is likely that some manufacturers won’t bother fixing it all.

The immediate workaround is to avoid side loading. It will be difficult for attackers to use the flaw for a mal-modified app via the Play store. But not – nothing ever is – impossible.

Now Bluebox has come to the rescue with a new free app. It doesn’t negate the flaw, but will help you know if you’ve been done. Firstly, it allows you to check to see if your device has been patched. But, “It will also scan devices to see if there are any malicious apps installed that take advantage of this vulnerability,” writes Jeff Forristal, Bluebox CTO, in a blog posting today.

The app is available from both Google Play and the Amazon AppStore for Android.

Categories: All, Security Issues

Facebook updates, and updates and updates its Android app

June 26, 2013 Leave a comment

Back in April Google amended its Google Play developer policy. It was a simple addition: “An app downloaded from Google Play may not modify, replace or update its own APK binary code using any method other than Google Play’s update mechanism.”

Simple, but far-reaching. At a stroke, it eliminated the growing threat of ‘silent updates’ to Android apps. At the time, many people thought it was specifically aimed at arch display advertising rival, Facebook. It probably was.

Facebook had been secretly experimenting with silent updates to its new Facebook Home app. Once an app has been installed with acceptable and accepted permissions, it is able to update itself with new and expanded permissions secretly (silent updates); that is, without telling the user what was happening, or what new permissions were being enacted.

But by forcing those updates to go via the Play Store, Google is able to stop them being ‘silent’. Good job, really. Facebook’s Android app has been updated — but provided you got it from Play, it cannot update itself silently.

Sarah A. Downey, a lawyer and privacy strategist with Abine, did a simple blog: eighteen words and a graphic compilation of three screenshots:


3 pages of Facebook permissions

3 pages of Facebook permissions


Her comment: “Really, Facebook? Three screens of permissions? No thanks. We don’t have that kind of relationship.”

Says it all really. If Google hadn’t insisted on updates via Play, you might never know about it this update. And if you side-load an app — for example, straight from Facebook — you might still never know about it.

So, two lessons: get your apps from Play; and dump Facebook anyway.

Categories: All, Security Issues

The future of spyware – 3D visual maps

October 3, 2012 Leave a comment

Years ago, when broadband first arrived, security experts warned of the dangers inherent in ‘always on’. That danger has increased exponentially with the rise of smartphones and their always-on sensors and cameras. Now a new proof of concept demonstrates the potential of 3D mobile spyware.

‘Proofs of concept’ (POCs) are developed by researchers to demonstrate what could be done in the future, in order to aid legitimate new development and to help anti-malware vendors produce defenses against less legitimate developments. What a new paper from researchers at the US Naval Surface Warfare Center in Crane, Indiana, and scientists from the University of Indiana demonstrates is spyware science fiction come true: a 3D visual map of the victim’s environment.

“We introduce,” say the researchers, “a proof-of-concept Trojan called ‘PlaceRaider’ to demonstrate the invasive potential of visual malware beyond simple photo or video uploads.” The paper describes an Android app (but suggests the concept will work equally well on iOS and Windows Phone), which it calls PlaceRaider, and “which we assume is embedded within a Trojan Horse application (such as one of the many enhanced camera applications already available on mobile app market places).” This app can then secretly and silently take photographs via the Android phone, and send them back to a C&C server for 3D processing.

PlaceRaider does three things. It collects orientation data from the Android’s sensors (“related to the accelerometers, gyroscopes, or magnetometers that a phone possesses”) in order to easily relate different photographs. It then surreptitiously takes photographs – in this case, one every 2 seconds. To remain unnoticed, it uses low resolution (so as to not use too much of the phone’s power), and temporarily mutes the shutter sound while the photo is taken. Finally, it uses a special algorithm to judge the quality of the photographs, discarding poor ones and transmitting the good ones.

Back at the main server, the received photos are compiled and used to construct a 3D map of the target’s location. Subsequent tests with volunteers showed that recognition of ‘points of interest’ is much higher from the 3D map than from static photos. However, since the original photos are of low resolution, further capabilities allow the attacker to use the orientation data to instruct the phone to take and transmit a high-resolution photo on demand – perhaps an open cheque book, or exposed documents.

space raider process

What SpaceRaider does…

place raider 2

But after locating the low-res target, you instruct the phone to take a new high res pic…

The attraction of such spyware for both intelligence agencies and criminals is obvious – but the report also shows that there are easy defenses that the OS and hardware manufacturers could implement: making it impossible to mute the shutter sound, introducing permissions for collecting data from the sensors, and ensuring that photos can only be taken by physical interaction with the user. Furthermore, “There is no logical motivation for users to intentionally take poor-quality photos that have any combination of improper focus, motion blur, improper exposure, or unusual orientations/twist” – making heuristic detection of PlaceRaider by the anti-malware vendors a distinct probability.

PlaceRaider: Virtual Theft in Physical Spaces with Smartphones

Hat tip to Daniel Gyenesse for pointing me to the story

Categories: All, Security Issues

A Microsoft-made tablet? Big mistake

August 7, 2012 Leave a comment

Microsoft once ruled a roost that is now dominated by that great cock, Apple. Apple dwarfs all other technology – in fact, all – companies. And Microsoft is jealous.

Apple’s secret is that it owns both the hardware and the software; and is a must-have brand. Microsoft owns only the software; and for many is a must-not-have brand. None of this is written in stone.

But Microsoft’s solution is just plain wrong. It is planning to build its own tablet, to compete with the iPad and Android.

This would be a mistake. Microsoft should remember its roots (software) and its history (it destroyed IBM’s PC-DOS, and the IBM PC, by making MS-DOS available to any and all hardware manufacturers; but made none itself). Google has learnt this lesson. Android is the antithesis – and possibly the ultimate nemesis – of iOS. It is open, cheap, and available to all hardware manufacturers.

Microsoft’s latest plan for its own tablet will merely hasten its own demise. Already, MS-fanboy Acer has said, “If Microsoft is going to do hardware business, what should we do? Should we still rely on Microsoft, or should we find other alternatives?” There’s some sort of advice here: if you want to rule the roost, don’t shit in your own hen-house.

Categories: All

My news stories on Infosecurity Magazine, 6/7 June 2012

June 7, 2012 Leave a comment

My news stories yesterday and today:

Meet DDSpy, the new Android spyware
NQ Mobile has issued an alert on new phone-home Android spyware it calls DDSpy – ready and waiting with an interface for GPS uploading for future development.
07 June 2012

Bieber Hackers and the Anonymous image problem
Anonymous is engaged in a war against the abuse of authority. This concept has general appeal. But the very structure of Anonymous, and the inevitable internecine strife, means it will likely lose the battle for ‘hearts and minds’.
07 June 2012

LinkedIn leak: The next chapter
Yesterday it emerged that LinkedIn, a social network for business and professionals, has been hacked – and 6.5 million hashed passwords have been posted to the internet.
07 June 2012

Flame: why was it missed for so long?
While the in-depth analysis of Flame continues, and we learn more and more about its intricacies and capabilities, one question remains: why did the AV industry fail to spot it earlier?
06 June 2012

Google warns users about state-sponsored attacks
Eric Grosse, Google’s VP security engineering, has announced that the company will start to display a warning banner for users it believes may be subject to state-sponsored attacks.
06 June 2012

EU Regulation on eSignatures Proposed
On bank holiday Monday 4 June, the European Commission adopted a proposal for a Regulation ‘on electronic identification and trust services for electronic transactions in the internal market’.
06 June 2012

Categories: All, Security News

Smartphones, the Google Wallet, and inconvenient trust

February 11, 2012 Leave a comment

Josh Ruben has shown a pretty basic security design flaw in Google’s Android Wallet. Google says it’s not really a problem and Ruben says Oh yes it is. I don’t want to go into the details of this vulnerability because I’ve written about it on Infosecurity Mag here: Google Wallet vulnerable to brute forcing the PIN. But what I do want to consider is to what extent we will choose convenience over common sense?

Common sense says we should never trust a mobile phone. We lose them. We leave them in taxis. They’re stolen. And it doesn’t matter what security they have or how secure they are supposed to be, once they are out of our control we have absolutely no way of knowing what is or can be done to them. Common sense should tell us that everything on a mobile phone is vulnerable once it is out of our control.

So how come the mobile phone is increasingly used to store personal data, banking information, and even virtual money? The answer is simple. It’s cool and convenient; especially for the young.

I think we need to accept this. Our virtual identity will increasingly migrate to the smartphone, and we won’t – and perhaps even shouldn’t – be able to stop it. The best we can do is increase and maintain a level of distrust. We may have to use this virtual wallet containing our money, our identity, our life – but we should never, ever trust it.

Categories: All, Security Issues

My news stories on Infosecurity Magazine

February 5, 2012 Leave a comment

Last week’s news stories (Jan 30 to Feb 3):

Security researchers break satellite phone encryption
German researchers have cracked 2 satellite phone encryption codes – huge implications.

EU publishes 10 Myths about ACTA
EU says ACTA ain’t bad, just misunderstood.

VeriSign repeatedly hacked in 2010
VeriSign was repeatedly hacked in 2010, and never even told its own senior management.

Science and Technology Committee publishes Malware and Cyber Crime report
Commons committee makes recommendations on how to tackle cybercrime.

New development in post-transaction banking fraud
Banking malware now seeks to divert telephone calls between banks and customers.

Counterclank is not malware, just aggressive adware
Contrary to Symantec’s initial claim, Android’s Counterclank (Apperhand) is not a trojan.

Major UK companies still not blocking porn namesakes
UK companies remain open to cybersquatting by

New Forrester Report: Big Data Risks
Forrester describes how to secure Big Data.

Resilience is the key to security says World Economic Forum
WEF suggest an holistic view of resilience to risk rather than an isolated view of prevention.

A call for a new standard in infosec training and awareness
We need a new standard to improve security awareness in users.

IE6 users: no longer caught between a rock and a hard place
A new product allows legacy IE6 applications to run in new versions of the browser.

75% of all new malware are trojans
PandaLabs 2011 report is full of facts, figures and information.

Spam and phishing are growing problems: DMARC has the answer
A new standard is being developed to help stop spam and phishing.

CSO Interchange: Cloud concerns are largely propaganda
Misunderstandings about the cloud make it seem a problem rather than an opportunity.

Up to five million Androids infected with Counterclank
Android’s largest ever infection reported by Symantec.

I’m not behind Kelihos botnet, claims Sabelnikov
Man named by Microsoft says I didn’t do it, guv.

Categories: All, Vendor News

Absinthe – jailbreaking the Apple 4S

January 23, 2012 Leave a comment

There is a new jailbreak for the Apple 4S called Absinthe (a strong alcoholic drink prepared from wormwood and largely banned for its toxicity). I have written about this for Infosecurity Magazine here.

But what I want to consider now is perhaps more philosophic: is a jailbroken iPhone basically an Android? Opinions vary.

David Harley, the independent researcher behind the Mac Virus website, thinks ‘not really’. Jailbreaking alters the Apple’s kernel. If this is done you would get no further support from Apple. As a result, software that really requires co-operation between the developer of the software and the developer of the hardware would be at a disadvantage. Anti-virus software running on a jailbroken Apple, for example, would suffer. “So no,” he says, “jailbreaking isn’t precisely analogous to an unrooted Android: while most Android AV is pretty patchy in performance, you can get AV that could be described as commercial standard.”

Luis Corrons, PandaLabs

Luis Corrons

But yes, thinks Luis Corrons of PandaLabs. “At the end of the day, the main difference between both platforms is that Android gives me, as a user, the option to decide what applications I want to install.” Confirming his view, Luis has a jailbroken iPad 1 and used to use a jailbroken iPhone 3GS (which he has now replaced with an Android Galaxy SII).

David Emm

David Emm

Kaspersky’s David Emm has a similar view. “It’s the commercial models taken by Apple and Google that are different.” The result of these commercial differences is that a jailbroken Apple has access to hundred of thousands of secure apps plus a few hundred unknown apps from Cydia Store. Android users have access to hundreds of thousands of unknown apps. The inference I draw, unstated by David, is that a jailbroken iPhone remains more secure, albeit more restricted, than an Android.

So what can we conclude? Not a lot really. If you jailbreak an iPhone you can technically gain the freedom inherent in an Android – but since most users will still be limited to third-party apps, you don’t gain many more. And you lose the security of the iPhone. In the final analysis, you simply pay your money and take your choice: Apple if you want security; Android if you want freedom. Jailbreaking seems to give you neither.
Absinthe download (unchecked, unverified)

Categories: All, Security Issues

Get every new post delivered to your Inbox.

Join 139 other followers