One Hacked Android User Can Lead To An Enterprise Breach
Google Android's single sign-on feature 'weblogin' convenient but risky to an organization's Google Apps, DEF CON researcher shows
August 6, 2013
DEF CON 21 – Las Vegas – Weaknesses in a single sign-on feature for Google Android devices can lead an attacker to compromise an entire organization via its Google Apps domain, a security researcher revealed here over the weekend.
Craig Young, senior security researcher with Tripwire, discovered multiple attack vectors that would allow a bad guy to target just one Android device to gain a foothold into the victim's Google cloud applications. The weak link is the so-called "weblogin" token used by Android to allow users to sign on once for all Google services, and it can be cheated when the attacker grabs the weblogin token and gains control of the access domain control panel.
"I can fully compromise Google Apps. It only takes one token," Young told the DEF CON 21 audience.
Young, who previously demonstrated how Android could be used to bypass Google's two-step authentication, says he had been curious about the risks of using Android in conjunction with Google Apps.
Android's weblogin feature basically uses cookies rather than passwords for accessing Google services. But the feature's convenience comes with tradeoffs: if an attacker uses it to access the domain control panel, he then can reset passwords, perform "data dumps," and download drive documents, Young said.
"The reason I [went] with this token research is I bought an Android tablet about a year ago and realized Chrome auto-signed me into Google's websites, which made me very unhappy. At that time, I hadn't realized Google Apps control panel was exposed this way, too: it was a real revelation," Young said in an interview with Dark Reading. "I had used Google Apps domain for a while now, and had always logged in using that admin account."
But after realizing the potential dangers, Young stopped that practice and launched his latest research.
[Ten Russia-based crime gangs are behind the majority of text-messaging toll fraud campaigns that can net affiliate marketers of the scams up to $12,000 a month. See Anatomy Of A Russian Cybercrime Ecosystem Targeting Android .]
Young says the best way to prevent such attacks is to avoid using an admin account on Android and to be suspicious of token requests. And the usual due diligence: shop only at trusted app stores and from trusted vendors, and run antivirus to look for root exploits.
"Companies using Google for the cloud need to make sure that their IT admins who need to have admin access to the Google Apps control panel do so but not necessarily from their [Android] phones. If they do, then they need to enter a password," he says.
Google was notified of Young's findings earlier this year. Google as of this posting had not responded to a request for comment on Young's research.
"Google has addressed some things," Young says. "They told me everything would and should be fixed, but it's not ... They need to block off access to the Google Apps control panel."
Young says a bad guy can access an Android user's weblogin or token, using a root exploit or rigged app. "Then they can access your Gmail and read all [of your mail] and contacts and start resetting your passwords for sites that you use for that account. That's a scary thing," he told the DEF CON audience. "You might not recognize that someone else is using your account," either.
Even if an attacker doesn't grab the admin phone token, he can still grab the weblogin token and access all of the documents the Android user has accessed, he said.
Young tested just how easy it would be for an attacker to plant a malicious app in the Google Play store. He created a phony app selling for $150 called "Stock Viewer" that sat undetected for about a month, even with the description: "This application provides quick access to your Google Stock Portfolio while completely compromising your privacy. If you prefer convenience over security then this app is for you! This application is currently under testing and should not be installed by anyone EVER."
The app didn't contain a root exploit, but Young says if it had, he's confident that Google would have caught the malicious code. Even so, Play and even Apple's store aren't foolproof. "They're not doing source-code review—they just look at the stuff in binary format. So you can't assign trust to Google or Apple for their stores" in actuality, Young contends.
Additional technical details of Young's research is available in his DEF CON presentation slides (PDF).
Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.
About the Author
You May Also Like
Cybersecurity Day: How to Automate Security Analytics with AI and ML
Dec 17, 2024The Dirt on ROT Data
Dec 18, 2024