Printed from http://www.electronista.com

Bluebox finds Android cryptological app 'master key' security flaw

updated 08:03 pm EDT, Wed July 3, 2013

Attack allows for privilege escalation, unlocks all data for malicious app

Mobile security research firm Bluebox labs discovered (and reported to Google) a serious security issue with Android in February that, according to a new announcement, remains unpatched. The discovered flaw allows a miscreant to modify APK code without breaking an app's cryptographic signature. The modification of code can allow a coder to make an app pass through Google's security precautions unnoticed, and elevate permissions allowing malicious code to be executed. The flaw has existed since Android OS v1.6.

Every Android contains a cryptographic signature to ensure to the kernel of the device that an app has not been tampered with. The vulnerability inserts code into an extant app without changing the signature of the app, in essence tricking Android into believing that an app is unchanged from initial installation.

According to Bluebox, the Trojan attack has special significance. The research firm believes that "while the risk to the individual and the enterprise is great (a malicious app can access individual data, or gain entry into an enterprise), this risk is compounded when you consider applications developed by the device manufacturers (e.g. HTC, Samsung, Motorola, LG) or third-parties that work in cooperation with the device manufacturer (e.g. Cisco with AnyConnect VPN) that are granted special elevated privileges within Android -- specifically, System UID access."

Using this elevated access granted by manufacturer-specific apps, a Trojan-attacked app can then read any information on the device, recall all stored passwords, and "essentially take over the normal functioning of the phone and control any function thereof" including, but not limited to, phone calls, SMS messaging, camera use, and call recording.

Bluebox reported the issue to Google earlier this year, but it is believed that no manufacturers have implemented the fix, including Google itself. Full specifics on the assault methodology will be released to the public at the Black Hat 2013 conference.



By Electronista Staff
Post tools:

TAGS :

toggle

Comments

Login Here

Not a member of the MacNN forums? Register now for free.

toggle

Network Headlines

toggle

Most Popular

Sponsor

Recent Reviews

Adesso Compagno X Bluetooth keyboard

The shift from typing on physical keyboards to digital versions on smartphones and tablets hasn't been an easy for many consumers. Fro ...

Polk Audio 4 Shot headset

Sound quality and design are two of the biggest areas of focus for manufacturers when coming up with a new gaming headset. Depending o ...

Patriot Supersonic Phoenix USB 3.0 drive

USB thumb drives aren't the end all solutions for data transfer and traveling needs. Sometimes people want something with a little mor ...

Sponsor

toggle

Most Commented

 
toggle

Popular News