Vulnerabilities / Threats

11:01 AM

Hack 99% Of Android Devices: Big Vulnerability

Critical vulnerability that affects almost all Android devices now in operation could allow attackers to use exploit code to easily infect devices with a Trojanized version of a legitimate app.

9 Android Apps To Improve Security, Privacy
9 Android Apps To Improve Security, Privacy
(click image for larger view)
A critical vulnerability that affects an estimated 99% of the Android devices now in operation could allow attackers to use exploit code to easily infect devices with a Trojanized version of a legitimate app.

"This vulnerability makes it possible to change an application's code without affecting the cryptographic signature of the application -- essentially allowing a malicious author to trick Android into believing the app is unchanged even if it has been," said Jeff Forristal, CTO of information security research firm Bluebox Labs, in a blog post. Malware disguised using this technique would have full access to any data or applications on the device. As a result, it could not only steal and send data to an attacker, but also be used to post messages via the device owner's Facebook or Twitter accounts.

Bluebox discovered the Android master key vulnerability and "responsibly disclosed" it to Google in February, before publicly revealing the existence of the bug -- sans any technical details -- last week. "This vulnerability, around at least since the release of Android 1.6 [codename Donut], could affect any Android phone released in the last four years -- or nearly 900 million devices -- and depending on the type of application, a hacker can exploit the vulnerability for anything from data theft to creation of a mobile botnet," said Forristal.

[ Meanwhile, Microsoft issues a flurry of fixes for Windows. Read Microsoft Patch Tuesday Fixes Six Critical Bugs. ]

Dubbed "Android bug security bug 8219321," the vulnerability allows attackers to inject malicious code into otherwise legitimate apps. While the technique has long been used by attackers to repackage legitimate apps as malware, they previously needed to change both the application and publisher name and also sign any Trojanized app with their own digital signature, according to a Symantec Security Response blog post. Such changes left telltale signs of malicious intent, such as the fact that the app wouldn't have been distributed by its legitimate publisher.

Thanks to the new vulnerability, however, Symantec said it's "extremely simple" for attackers to disguise malware as a legitimate app: "Now that attackers no longer need to change these digital signature details, they can freely hijack legitimate applications and even an astute person could not tell the application had been repackaged with malicious code."

Furthermore, over the weekend, full information on the exploit was discovered and detailed on the forums of CyanogenMod, which is community-built Android 4.1 firmware.

Subsequently, a "quick & dirty PoC" -- proof-of-concept -- exploit for the vulnerability, comprising just 32 lines of shell script, was posted to Github Monday by viaForensics mobile security engineer Pau Oliva. Software engineer Ryan Welton then refined the exploit code and posted "a slightly more resilient tool."

Oliva also addressed criticism that he'd put Android users at risk or preempted the "One Root To Own Them All" presentation scheduled to be delivered by Bluebox's Forristal next month at the Black Hat conference in Las Vegas. "Details about the bug [were] already public in CyanogenMod's bug report & patch, I just wrote a PoC," tweeted Oliva.

When it comes to the vulnerability, the good news -- according to Symantec -- is that based on its scans of 4 million Android applications, no attacker has yet exploited the vulnerability to create malicious applications. That said, the security firm did discover what appears to be inadvertent use of the technique by a number of apps. "These apps are all built using a common popular build tool chain, which may have a bug resulting in malformed APK [Android] files," Symantec stated.

Unfortunately, the vast majority of Android devices remain unpatched against the vulnerability, although Google did quietly patch the related flaw in February in the Android codebase, reported Android Police. Pending a patch, however, Android users should beware downloading APK files -- Android apps -- from anywhere but the official Google Play app store.

Forristal told Threatpost that Google had originally planned to issue a patch via the Android Open Source Project and to release firmware fixes for Nexus devices in June. That would have been just 90 days after he filed his bug report. But Forristal said Google recently told him that it had pushed back the scheduled release to Aug. 1, which is the date of his Black Hat presentation.

A Google spokesman didn't immediately respond to an emailed request for a status update on Google's patch-distribution timeline. But regardless of when Google releases a fix, if history is any guide, most Android users will have to wait months -- if not forever -- to see a related patch from their handset manufacturer or carrier.

Android Police did report, however, that all Samsung Galaxy S4 and HTC One devices running Android 4.2.2 or above have a related patch for the master key vulnerability. But it said that the majority of HTC One devices are only running Android 4.1.2, and thus remain vulnerable.

Another patching option is available via the third-party Android firmware CyanogenMod, as the developers behind the project not only worked out full technical details of the vulnerability, but have updated their Android 4.1 firmware with a fix. Installing CyanogenMod isn't for everyone, as it requires flashing a device's ROM. Still, anyone using an Android device that's no longer supported by handset manufacturers -- but is compatible with CyanogenMod -- should consider adopting the firmware as a way to safeguard their device against numerous types of exploits. In many cases, the firmware also makes devices on which it's installed run faster.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
New Cold Boot Attack Gives Hackers the Keys to PCs, Macs
Kelly Sheridan, Staff Editor, Dark Reading,  9/13/2018
Yahoo Class-Action Suits Set for Settlement
Dark Reading Staff 9/17/2018
RDP Ports Prove Hot Commodities on the Dark Web
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2018
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
How Data Breaches Affect the Enterprise
How Data Breaches Affect the Enterprise
This report, offers new data on the frequency of data breaches, the losses they cause, and the steps that organizations are taking to prevent them in the future. Read the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2018-09-19
An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_all function in mm/vmacache.c mishandles sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations...
PUBLISHED: 2018-09-19
Bitcoin Core 0.14.x before 0.14.3, 0.15.x before 0.15.2, and 0.16.x before 0.16.3 and Bitcoin Knots 0.14.x through 0.16.x before 0.16.3 allow a remote denial of service (application crash) exploitable by miners via duplicate input. An attacker can make bitcoind or Bitcoin-Qt crash.
PUBLISHED: 2018-09-18
Bypassing password security vulnerability in McAfee Application and Change Control (MACC) 7.0.1 and 6.2.0 allows authenticated users to perform arbitrary command execution via a command-line utility.
PUBLISHED: 2018-09-18
Accessing, modifying, or executing executable files vulnerability in Microsoft Windows client in McAfee Application and Change Control (MACC) 8.0.0 Hotfix 4 and earlier allows authenticated users to execute arbitrary code via file transfer from external system.
PUBLISHED: 2018-09-18
An unprivileged user can delete arbitrary files on a Linux system running ENSLTP 10.5.1, 10.5.0, and 10.2.3 Hotfix 1246778 and earlier. By exploiting a time of check to time of use (TOCTOU) race condition during a specific scanning sequence, the unprivileged user is able to perform a privilege escal...