Username Password

Join Now!

«

»

Android ‘Master Key’ hack raises Security Risk

Bluebox Security research team uncovered a vulnerability in android security model. It claims to discover a ‘Master Key’ that can allow a hacker to modify APK code without breaking an application’s cryptographic signature, which can turn a legitimate application to turn into a malicious Trojan, completely unnoticed by phone, end user or app store. By this hacker can gain the access to individual’s data.Android

According to blog written by Jeff Forristal, Bluebox CTO, the implications are huge! This vulnerability, around at least since the release of Android 1.6 (codename: “Donut” ), could affect any Android phone released in the last 4 years1 – or nearly 900 million devices2– and depending on the type of application, a hacker can exploit the vulnerability for anything from data theft to creation of a mobile botnet.

According to Bluebox Security research team installation of a Trojan application from the device manufacturer can grant the application full access to Android system and all applications (and their data) currently installed. The application then not only has the ability to read arbitrary application data on the device (email, SMS messages, documents, etc.), retrieve all stored account & service passwords, it can essentially take over the normal functioning of the phone and control any function thereof (make arbitrary phone calls, send arbitrary SMS messages, turn on the camera, and record calls).

How it works :

All Android applications contain cryptographic signatures, which Android uses to determine if the app is legitimate and to verify that the app hasn’t been tampered with or modified. This vulnerability makes it possible to change an application’s code without affecting the cryptographic signature of the application – essentially allowing a malicious author to trick Android into believing the app is unchanged even if it has been.

Recommendations by Bluebox :

  • Device owners should be extra cautious in identifying the publisher of the app they want to download.
  • Enterprises with BYOD implementations should use this news to prompt all users to update their devices, and to highlight the importance of keeping their devices updated.
  • IT should see this vulnerability as another driver to move beyond just device management to focus on deep device integrity checking and securing corporate data.

Leave a Reply

Your email address will not be published. Required fields are marked *