Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

12/17/2014
04:20 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Millions Of Android Phones In China Have Backdoor

An Android backdoor is the topic of one of two advisories this week on mobile threats.

Millions of Android smartphones sold by Coolpad, China's third-largest mobile phone manufacturer, may contain a backdoor that gives the company extensive access to device information and functions.

Researchers from Palo Alto Networks' Unit 42 threat intelligence group found the backdoor, dubbed CoolReaper, installed on at least 24 Coolpad models, including high-end devices, sold exclusively in China. Ryan Olson, intelligence director at Unit 42, says 10 million Coolpad devices may have the backdoor installed on them.

Palo Alto decided to investigate the issue after reviewing numerous complaints on Chinese message boards about problems that Coolpad users were having with their devices, Olson says. Security researchers downloaded copies of ROMs used in Coolpad smartphones and discovered that almost all of them had the backdoor.

Unlike the usual software that smartphone manufacturers sometimes add on top of the Android OS to customize their devices or to add new functions, CoolReaper enables almost total remote control of the device, he says. The backdoor allows Cooplad to push out advertisements, install third party-software, and gather device and usage information.

In the hands of a malicious attacker, CoolReaper can be used to upload data about the device, location, application usage, and calling history. It can also be used to clear user data, uninstall applications, disable functions, send arbitrary SMS or MMS messages to the phone, and install applications without user consent.

"What we are seeing them use this for so far is mostly benign stuff," like serving up advertisements, Olson says, but the danger for misuse should not be underestimated. For instance, this year a Chinese security researcher reported finding a security flaw in a website that appears to be one used by Coolpad to manage CoolReaper. An attacker who exploited the vulnerability would potentially have access to CoolReaper and could use it for malicious purposes.

Palo Alto's alert on CoolReaper is one of two advisories issued today on mobile security threats. Akamai warned of an Xsser mobile remote access Trojan (Xsser mRAT) that attackers are using to target users of certain Android and jailbroken iOS devices in China.

The Trojan is being distributed via sophisticated man-in-the-middle attacks, phishing campaigns, and application impersonation. "In addition, the use of cell phone signal interception technology may have been used when targeting victims," Akamai said in its advisory.

Attackers appear to be intercepting cellphone signals and data in order to pinpoint a user's approximate location, eavesdrop on communications, modify incoming transmissions, and take other actions before dropping the Xsser RAT on a target Android system.

The Trojan, originally targeted purely at Android users, made its first appearance disguised as an Android application in September. The malware targeted activists participating in the pro-democracy Occupy Central movement in Hong Kong and was designed to access browsing histories, contact information, location, text messages, and other data from infected systems.

In September, Lacoon Mobile Security discovered a modified version of the same remote access Trojan targeted at users of iOS devices. In the case of iOS devices, the malware is installed via a rogue repository on Cydia, a third-party application store that many owners of jailbroken iOS devices use to download applications outside of Apple's App Store.

Once the malware is installed on a system, it becomes extremely hard to remove from the system and can be used to siphon data from the device and execute malicious commands. Rod Soto, principal security researcher at Akamai's PLXsert team, says those behind the Xsser mRAT campaign have demonstrated a high degree of sophistication so far in carrying out the attacks.

The point of the Akamai advisory is to highlight both the cross-platform nature of the threat and the level of sophistication being employed by whoever is being the campaign, Soto says.

The latest advisories once again highlight the growing threat that smartphone users in Asia especially seem to be facing from new mobile malware. This month, the mobile security vendor Lookout Research warned of "DeathRing" a mobile Trojan that it found pre-installed on several Android smartphones sold in Asia and Africa by second- and third-tier manufacturers.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
The Problem with Proprietary Testing: NSS Labs vs. CrowdStrike
Brian Monkman, Executive Director at NetSecOPEN,  7/19/2019
RDP Bug Takes New Approach to Host Compromise
Kelly Sheridan, Staff Editor, Dark Reading,  7/18/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-14248
PUBLISHED: 2019-07-24
In libnasm.a in Netwide Assembler (NASM) 2.14.xx, asm/pragma.c allows a NULL pointer dereference in process_pragma, search_pragma_list, and nasm_set_limit when "%pragma limit" is mishandled.
CVE-2019-14249
PUBLISHED: 2019-07-24
dwarf_elf_load_headers.c in libdwarf before 2019-07-05 allows attackers to cause a denial of service (division by zero) via an ELF file with a zero-size section group (SHT_GROUP), as demonstrated by dwarfdump.
CVE-2019-14250
PUBLISHED: 2019-07-24
An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. simple_object_elf_match in simple-object-elf.c does not check for a zero shstrndx value, leading to an integer overflow and resultant heap-based buffer overflow.
CVE-2019-14247
PUBLISHED: 2019-07-24
The scan() function in mad.c in mpg321 0.3.2 allows remote attackers to trigger an out-of-bounds write via a zero bitrate in an MP3 file.
CVE-2019-2873
PUBLISHED: 2019-07-23
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.32 and prior to 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox...