Feeds

Android malware attacks show perils of Google openness

Is there a vetter in the house?

Build a business case: developing custom apps

This week's discovery of malware that hijacked tens of thousands of Android cellphones shows the pitfalls of Google's decision to make the operating system the Wikipedia of mobile platforms that offers apps written by virtually anyone.

A couple years ago, the choice helped the OS gain traction against Apple's more entrenched iPhone by quickly building out the number of apps available in the Android Market. Once developers pay a $25 registration fee, Google gives them “complete control over when and how they make their applications available to users.” Contrast that with Apple's App Store, which the company rules with an iron fist.

The recent discovery of some 55 malware-tainted apps available in the Android Market shines a bright light on the dark side of its openness. The malware hid in legitimate titles that had been repackaged and distributed by three developers. Once installed, the apps exploited known vulnerabilities that gave the malware root access to a phone's most sensitive functions, according to this analysis from Lookout, which provides antimalware apps for Android, Blackberry and Windows Mobile handsets.

A separate analysis provided by antivirus firm Kaspersky Labs said that DreamDroid, as the malware has been dubbed, connected to a server controlled by the attackers, where it appeared to access “a list of applications to download and install on the already infected device.” In other words, DreamDroid is a classic trojan backdoor downloader. The infected apps were downloaded by phones that numbered in the tens of thousands to hundreds of thousands, according to Market figures.

The mass infections are already prompting commentary comparing Android to Microsoft Windows.

“The openness of the platform and the availability of alternative application markets makes Android-based devices more difficult to secure,” security researcher Vanja Svajcer wrote on Sophos's Naked Security blog. “The whole situation reminds me of Windows some years ago. One keeps wondering if history is repeating again?”

If there's any vetting of apps submitted to the Android Market, there's no mention of it on Google's webpages, and the company's PR department didn't respond to questions asking about what kind of scrutiny it gives to software available in its Market. As The Reg has reported before, Google can remotely remove apps on users' Android phones, but by then a handset would already be infected.

And besides, as Lookout CTO and co-founder Kevin Mahaffey noted to The Reg: “The really nasty thing about root exploits is that once you're root you can do things that disable the remote removal tool.” In other words, Google's kill switch can itself be killed.

The episode demonstrates the ugly predicament confronting consumers of smartphone apps. One choice is to opt for the heavy-handed control exercised by Apple's App Store. You may not be able to run Flash-based software, use the alternative browser of your choice, or do any number of other things you want to do, but so far the marketplace, despite being around a lot longer, hasn't presented the kind of security menace we saw this week in Google's apps bazaar.

The Android Market's freewheeling nature, on the other hand, is more appealing to many because it feels more more. More like a stroll down the streets of New York, as opposed to a parade in a Steve Jobs version of Disney Land. Yeah, Android's openness is fun, but only until someone gets hurt. ®

Endpoint data privacy in the cloud is easier than you think

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
They're not emails, they're business records, says court
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
Plug and PREY: Hackers reprogram USB drives to silently infect PCs
BadUSB instructs gadget chips to inject key-presses, redirect net traffic and more
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?