Thursday, October 30, 2014
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Sharp To Produce New Backlight-free LCD Panel For Wearables
New Cameras Boost GoPro's Quarterly Profit
Panasonic AX800 4K ULTRA HD TVs Update Adds Compatibility With Netflix 4K Streaming
YouTube Now Supports 60fps Videos
Samsung Brings Gear S to U.S. Next Week
Corsair Introduces Sabre RGB Mice For Gamers
Ubisoft's Assassin's Creed Unity Included with Purchase of Samsung UD590 Monitor or 850 PRO Series SSD
Apple's Tim Cook Declares His Sexual Orientation
Active Discussions
Copied dvd's say blank in computer only
Made video, won't play back easily
New Features In Firefox 33
updated tests for dvd and cd burners
How to generate lots of different CDs quickly
Yamaha CRW-F1UX
help questions structure DVDR
Questions durability monitor LCD
 Home > News > Mobiles > Uncover...
Last 7 Days News : SU MO TU WE TH FR SA All News

Thursday, July 04, 2013
Uncovered 'Master key' Makes Android Phones Makes Vulnerable


Security research firm BlueBox has discovered a vulnerability that could allow cyber-thieves to turn any legitimate Android application into a Trojan, completely unnoticed by the phone user.

The vulnerability in Android?s security model allows a hacker to turn any legitimate application into a malicious Trojan. The vulnerability has been around at least since the release of Android 1.6 and could affect any Android phone released in the last 4 years - or nearly 900 million devices. According to BlueBox, depending on the type of application, a hacker can exploit the vulnerability for anything from data theft to creation of a mobile botnet.

Installation of a Trojan application from the device manufacturer can grant the application full access to Android system and all applications (and their data) currently installed. The application then not only has the ability to read arbitrary application data on the device (email, SMS messages, documents, etc.), retrieve all stored account & service passwords, it can essentially take over the normal functioning of the phone and control any function thereof (make arbitrary phone calls, send arbitrary SMS messages, turn on the camera, and record calls). Finally, and most unsettling, is the potential for a hacker to take advantage of the always-on, always-connected, and always-moving (therefore hard-to-detect) nature of these "zombie" mobile devices to create a botnet.

The vulnerability involves discrepancies in how Android applications are cryptographically verified & installed, allowing for APK code modification without breaking the cryptographic signature.

All Android applications contain cryptographic signatures, which Android uses to determine if the app is legitimate and to verify that the app hasn't been tampered with or modified. This vulnerability makes it possible to change an application's code without affecting the cryptographic signature of the application - essentially allowing a malicious author to trick Android into believing the app is unchanged even if it has been.

While the risk to the individual and the enterprise is great, this risk is compounded when you consider applications developed by the device manufacturers (e.g. HTC, Samsung, Motorola, LG) or third-parties that work in cooperation with the device manufacturer (e.g. Cisco with AnyConnect VPN) - that are granted special elevated privileges within Android - specifically System UID access.

Google had no comment to make on BlueBox's discovery.


Previous
Next
Samsung Introduces The WB110 Camera with 26x Optical Zoom        All News        Huawei, London college To Cooperate On Big Data Technologies
Sony "my Xperia" Phone Location Service Rolling Globally     Mobiles News      Motorola Starts Promoting New Moto X Smartphone

Get RSS feed Easy Print E-Mail this Message

Related News
Google Announces New Android Lollipop, Nexus 6 Smartphone, Nexus 9 Tablet And Nexus Player Streamer
Android L To Support Encryption By Default
First Low-cost Android One Phone Unveiled
First Android Apps Coming to Chromebooks
Android Gaming Consoles on the Horizon
Your Android Phone Is Telling the World Where You've Been
Selfmite SMS Worm Attacks Android Devices
Android, Windows Phones To Feature Kill Switches
Google To Enter The Living Room Battle With Android TV
Android Silver Devices Coming Next Year: report
Law Firm Files Antitrust Class-action Lawsuit Against Google
Apple Remains Top Smartphone Maker In February, Yahoo Expands Mobile Audience Reach

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2014 - All rights reserved -
Privacy policy - Contact Us .