Thursday, July 4, 2013

Android: 99% of mobiles are vulnerable to malicious software - Tecmundo

 Android: 99% of mobiles are vulnerable to malicious software The bug may allow the creation of Trojans. (Image Source: Playback / EveryTotorials)

A team of researchers from Bluebox Security has discovered a vulnerability in the Android security model. The flaw allows hackers access to the code of mobiles APK without breaching any signature encrypted applications. Thus, “any legitimate app can be transformed into a malicious Trojan” as well explains Jeff Forristal, lead researcher responsible for pointing out the error in such an operating system developed by Google.

And yet in the words of Forristal, “the implications are enormous”. This is because the vulnerability in the Android system has existed for at least four years (the time when version 1.6 OS launched in check out). Thus, it is estimated that about 900 million mobiles are currently unprotected – and vulnerable, so the “bug 8219321″ (name given to the fault found).


Implications

Depending on the application, a hacker can “exploit the vulnerability to anything, as [to] the theft of data and creation of a mobile botnet” (collection of software that run automatically), according clarifies Jeff Forristal. These malicious programs are able to access personal information, achieving, for example, codes or passwords has informed the unit.  Android: 99% of mobiles are vulnerable to malicious software unwanted functions can be activated. (Image Source: Playback / I.Imgur)

Furthermore, unwanted functions can also be activated: send arbitrary messages, making calls random activation “secret” of the camera and even recording conversations are some of the actions that an application can run Trojan. In summary, and as explained by the very research coordinator who discovered the bug, “an application Trojan [" undercover "]‘s own device manufacturer may request full access to the Android system.”


the bug works?

All Android apps have cryptographic signatures – resource used to determine the legitimacy and validity of apps installed. The vulnerability discovery, then, makes it possible to alter the code in any application without the encrypted record is broken (or affected in any way).

Soon, it becomes quite difficult to detect the existence of a Trojan endowed with such capabilities. It may be, for example, a malicious author “cheat” and invades the Android system sneaky way – without being noticed.


What to do?

bug 8219321 was reported to Google in February this year. The solution proposed by the researchers seems simple: the idea is to make all device manufacturers mobiles (and using, of course, the Android system) to develop and deliver firmware able to fix this vulnerability.

 Android: 99% of mobiles are vulnerable to malicious software careful when downloading apps. (Image Source: Playback / OneClickRoot)

However, the time for “provision of such updates can vary widely, [once] depends upon the manufacturers and models concerned,” as explained again Forristal.

For now, the recommendations suggested by the research team at Bluebox are as follows:

  • Be cautious when downloading any applications, and
  • Keep your phone updated and stay connected on the firmware provided by the manufacturer of your mobile.

More details about the vulnerability found will be presented by Jeff Forristal the 27th of this month at the Black Hat USA 2013 event. To see more detailed information about bug 8219321, click here.

No comments:

Post a Comment