Critical Security Flaw Discovered in Android Smartphones
A so-called "master key" for Android smartphones has been
discovered by a security firm which is warning that it could give almost
unfettered access to any Android phone, regardless of its security settings.
The loophole, discovered by BlueBox has been used in every Android OS since at
least version 1.6.
Bluebox's CTO, Jeff Forristal said that the vulnerability allows a hacker to
modify APK code without breaking an application's cryptographic signature, and
to turn any legitimate application into a malicious Trojan, completely unnoticed
by the app store, the phone, or the end user.
All Android applications contain signatures, which Android uses to determine
if the app is legitimate and to verify that the app hasn't been tampered with
or modified.
The loophole makes it possible for a hacker to change an application's code
without affecting the signature of the application - essentially allowing a
malicious author to trick Android into believing the app is unchanged even if it
has been.
BlueBox says that it handed details of the Android security flaw to Google in
February 2013.
Technical details of how to exploit the security flaw will be revealed at the
Black Hat USA 2013 conference at the end of this month.
At the moment, there is no evidence that the exploit has been discovered by
malicious hackers, although with the details due to be revealed at the
conference, Google and Android handset manufacturers have just a few weeks to
repair the problem.
The other issue that makes the exploit harder to use is that the hacker would
have to encourage users to download a malicious app in the first place. While
unlikely via Google's own app store, there are a number of -- mainly Chinese --
app stores that are known to be less stringent in security checks.
On the web: BlueBox
No comments:
Post a Comment