Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

12/17/2014
04:20 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Millions Of Android Phones In China Have Backdoor

An Android backdoor is the topic of one of two advisories this week on mobile threats.

Millions of Android smartphones sold by Coolpad, China's third-largest mobile phone manufacturer, may contain a backdoor that gives the company extensive access to device information and functions.

Researchers from Palo Alto Networks' Unit 42 threat intelligence group found the backdoor, dubbed CoolReaper, installed on at least 24 Coolpad models, including high-end devices, sold exclusively in China. Ryan Olson, intelligence director at Unit 42, says 10 million Coolpad devices may have the backdoor installed on them.

Palo Alto decided to investigate the issue after reviewing numerous complaints on Chinese message boards about problems that Coolpad users were having with their devices, Olson says. Security researchers downloaded copies of ROMs used in Coolpad smartphones and discovered that almost all of them had the backdoor.

Unlike the usual software that smartphone manufacturers sometimes add on top of the Android OS to customize their devices or to add new functions, CoolReaper enables almost total remote control of the device, he says. The backdoor allows Cooplad to push out advertisements, install third party-software, and gather device and usage information.

In the hands of a malicious attacker, CoolReaper can be used to upload data about the device, location, application usage, and calling history. It can also be used to clear user data, uninstall applications, disable functions, send arbitrary SMS or MMS messages to the phone, and install applications without user consent.

"What we are seeing them use this for so far is mostly benign stuff," like serving up advertisements, Olson says, but the danger for misuse should not be underestimated. For instance, this year a Chinese security researcher reported finding a security flaw in a website that appears to be one used by Coolpad to manage CoolReaper. An attacker who exploited the vulnerability would potentially have access to CoolReaper and could use it for malicious purposes.

Palo Alto's alert on CoolReaper is one of two advisories issued today on mobile security threats. Akamai warned of an Xsser mobile remote access Trojan (Xsser mRAT) that attackers are using to target users of certain Android and jailbroken iOS devices in China.

The Trojan is being distributed via sophisticated man-in-the-middle attacks, phishing campaigns, and application impersonation. "In addition, the use of cell phone signal interception technology may have been used when targeting victims," Akamai said in its advisory.

Attackers appear to be intercepting cellphone signals and data in order to pinpoint a user's approximate location, eavesdrop on communications, modify incoming transmissions, and take other actions before dropping the Xsser RAT on a target Android system.

The Trojan, originally targeted purely at Android users, made its first appearance disguised as an Android application in September. The malware targeted activists participating in the pro-democracy Occupy Central movement in Hong Kong and was designed to access browsing histories, contact information, location, text messages, and other data from infected systems.

In September, Lacoon Mobile Security discovered a modified version of the same remote access Trojan targeted at users of iOS devices. In the case of iOS devices, the malware is installed via a rogue repository on Cydia, a third-party application store that many owners of jailbroken iOS devices use to download applications outside of Apple's App Store.

Once the malware is installed on a system, it becomes extremely hard to remove from the system and can be used to siphon data from the device and execute malicious commands. Rod Soto, principal security researcher at Akamai's PLXsert team, says those behind the Xsser mRAT campaign have demonstrated a high degree of sophistication so far in carrying out the attacks.

The point of the Akamai advisory is to highlight both the cross-platform nature of the threat and the level of sophistication being employed by whoever is being the campaign, Soto says.

The latest advisories once again highlight the growing threat that smartphone users in Asia especially seem to be facing from new mobile malware. This month, the mobile security vendor Lookout Research warned of "DeathRing" a mobile Trojan that it found pre-installed on several Android smartphones sold in Asia and Africa by second- and third-tier manufacturers.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
10 Ways to Keep a Rogue RasPi From Wrecking Your Network
Curtis Franklin Jr., Senior Editor at Dark Reading,  7/10/2019
The Security of Cloud Applications
Hillel Solow, CTO and Co-founder, Protego,  7/11/2019
Where Businesses Waste Endpoint Security Budgets
Kelly Sheridan, Staff Editor, Dark Reading,  7/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Jim, stop pretending you're drowning in tickets."
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13623
PUBLISHED: 2019-07-17
In NSA Ghidra through 9.0.4, path traversal can occur in RestoreTask.java (from the package ghidra.app.plugin.core.archive) via an archive with an executable file that has an initial ../ in its filename. This allows attackers to overwrite arbitrary files in scenarios where an intermediate analysis r...
CVE-2019-13624
PUBLISHED: 2019-07-17
In ONOS 1.15.0, apps/yang/web/src/main/java/org/onosproject/yang/web/YangWebResource.java mishandles backquote characters within strings that can be used in a shell command.
CVE-2019-13625
PUBLISHED: 2019-07-17
NSA Ghidra before 9.0.1 allows XXE when a project is opened or restored, or a tool is imported, as demonstrated by a project.prp file.
CVE-2019-3571
PUBLISHED: 2019-07-16
An input validation issue affected WhatsApp Desktop versions prior to 0.3.3793 which allows malicious clients to send files to users that would be displayed with a wrong extension.
CVE-2019-6160
PUBLISHED: 2019-07-16
A vulnerability in various versions of Iomega and LenovoEMC NAS products could allow an unauthenticated user to access files on NAS shares via the API.