Feeds

Android bugs let attackers install malware without warning

No permissions necessary

Providing a secure and efficient Helpdesk

Researchers have disclosed bugs in Google's Android mobile operating system that allow attackers to surreptitiously install malware on users' handsets.

The most serious of the two flaws was poignantly demonstrated on Wednesday in a proof-of-concept app that was available in the Google-sanctioned Market. Disguised as an expansion for the popular game Angry Birds, it silently installs three additional apps that without warning have access to a phone's contacts, location information and SMS functionality and can transmit their data to a remote server.

It took Google about six hours to pull the bogus app, said Scio Security CTO Jon Oberheide, one of the two researchers to discover and exploit the vulnerability. What will be harder to lock down are the special security tokens the web giant uses to authenticate Android users so they don't have to expose their passwords to third-party services. The proof-of-concept works by exploiting weaknesses in that Android token system.

“It abuses that token to perform the same actions the legitimate Market app would perform, but without asking for permission,” Oberheide told The Register. “Through some of the research, we realized we could use this one specific token for the Android service to bypass the restrictions on the permission system.”

Zach Lanier, a senior consultant at Intrepidus Group, also worked to discover the bypass bug. He and Oberheide plan to provide more details at an internal security conference scheduled for Thursday at Intel's Oregon campus.

"We've begun rolling out a fix for this issue, which will apply to all Android devices," a Google spokesman said. "As always, we advise users to only install applications they trust."

Oberheide said that his disclosure came the same day that a researcher with Basingstoke, UK-based MWR InfoSecurity demonstrated a separate bug in the Android browser that lets attackers install malware on a fully patched HTC Legend running Android 2.1. Although the most recent Android version is 2.2, figures supplied by Google show that 64 percent of users have yet to be upgraded to it.

Nils, who doesn't disclose his surname to journalists, didn't respond to emails seeking comment. He is scheduled to present his findings on Thursday at the Blackhat security conference in Abu Dhabi.

Oberheide is same researcher who in June forced Google to wield Android's then-secret remote kill switch when he released a pair of applications to demonstrate how easy it is to use Market to bootstrap a rootkit onto Android phones.

The two most recent attacks “operate entirely in userspace and leverage weaknesses present in the Android platform ad common HTC handsets to achieve their goals,” Oberheide said. They came the same week that attack code exploiting a browser vulnerability in older Android phones was released. ®

New hybrid storage solutions

More from The Register

next story
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
Google recommends pronounceable passwords
Super Chrome goes into battle with Mr Mxyzptlk
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
Reddit wipes clean leaked celeb nudie pics, tells users to zip it
Now we've had all THAT TRAFFIC, we 'deplore' this theft
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
TorrentLocker unpicked: Crypto coding shocker defeats extortionists
Lousy XOR opens door into which victims can shove a foot
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.