• Portal
  • Search
  • Member List
  • Help
  • Random Thread
  • Thread Rating:
    • 0 Vote(s) - 0 Average
    • 1
    • 2
    • 3
    • 4
    • 5

    Tech Discussion: Uncovering Android Master Key That Makes 99% of Devices Vulnerable
    #1
    Quote:The Bluebox Security research team – Bluebox Labs – recently discovered a vulnerability in Android’s security model that allows a hacker to modify APK code without breaking an application’s cryptographic signature, to turn any legitimate application into a malicious Trojan, completely unnoticed by the app store, the phone, or the end user. The implications are huge! This vulnerability, around at least since the release of Android 1.6 (codename: “Donut” ), could affect any Android phone released in the last 4 years1 – or nearly 900 million devices2– and depending on the type of application, a hacker can exploit the vulnerability for anything from data theft to creation of a mobile botnet.

    While the risk to the individual and the enterprise is great (a malicious app can access individual data, or gain entry into an enterprise), this risk is compounded when you consider applications developed by the device manufacturers (e.g. HTC, Samsung, Motorola, LG) or third-parties that work in cooperation with the device manufacturer (e.g. Cisco with AnyConnect VPN) – that are granted special elevated privileges within Android – specifically System UID access.

    Installation of a Trojan application from the device manufacturer can grant the application full access to Android system and all applications (and their data) currently installed. The application then not only has the ability to read arbitrary application data on the device (email, SMS messages, documents, etc.), retrieve all stored account & service passwords, it can essentially take over the normal functioning of the phone and control any function thereof (make arbitrary phone calls, send arbitrary SMS messages, turn on the camera, and record calls). Finally, and most unsettling, is the potential for a hacker to take advantage of the always-on, always-connected, and always-moving (therefore hard-to-detect) nature of these “zombie” mobile devices to create a botnet.

    Read more here: Uncovering Android Master Key That Makes 99% of Devices Vulnerable

    Never underestimate the power of human stupidity.
    - Robert A. Heinlein
    Reply



    Possibly Related Threads...
    Thread / Author Replies Views Last Post
    1,459
    Last Post by LZA
    08-06-2014, 02:47 PM
    0
    1,202
    Last Post by velvetfog
    01-13-2014, 04:10 PM
    4
    5,146
    Last Post by velvetfog
    01-08-2014, 06:50 PM



    Users browsing this thread: 1 Guest(s)