• IP addresses are NOT logged in this forum so there's no point asking. Please note that this forum is full of homophobes, racists, lunatics, schizophrenics & absolute nut jobs with a smattering of geniuses, Chinese chauvinists, Moderate Muslims and last but not least a couple of "know-it-alls" constantly sprouting their dubious wisdom. If you believe that content generated by unsavory characters might cause you offense PLEASE LEAVE NOW! Sammyboy Admin and Staff are not responsible for your hurt feelings should you choose to read any of the content here.

    The OTHER forum is HERE so please stop asking.

Attackers could take over Android devices by exploiting built-in remote support apps

MacLeod

Alfrescian
Loyal
Joined
Sep 3, 2014
Messages
73
Points
0

Attackers could take over Android devices by exploiting built-in remote support apps


Many smart phone manufacturers preload remote support tools on their Android devices in an insecure way, providing a method for hackers to take control of the devices through rogue apps or even SMS messages.

By Lucian Constantin | 4 hours ago

security2_thumb800.jpg


Many smart phone manufacturers preload remote support tools on their Android devices in an insecure way, providing a method for hackers to take control of the devices through rogue apps or even SMS messages.

The vulnerability was discovered by researchers from security firm Check Point Software Technologies, who presented it Thursday at the Black Hat security conference in Las Vegas. According to them, it affects hundreds of millions of Android devices from many manufacturers including Samsung Electronics, LG Electronics, HTC, Huawei Technologies and ZTE.

Most of the flagship phones from different vendors come preloaded with remote support tools, Check Point researchers Ohad Bobrov and Avi Bashan said. In some cases they are installed by the manufacturers themselves, while in other cases by mobile carriers, they said.

These tools function as system applications, have a lot of powerful permissions and are digitally signed with manufacturers' certificates. They allow the technical support staff from device makers or carriers to troubleshoot problems with the devices by taking control of their screens remotely and interacting with them.

Unless they've had an issue with their devices that required this sort of interaction, users are probably not even aware that such tools exist on their phones, because they have no user interfaces, the researchers said.

The tools are made up of two components: a system plug-in that has the powerful privileges and permissions necessary for such tasks and an app that talks to it. While the plug-in is typically part of the firmware, the apps that are allowed to interact with it could be either preinstalled or downloaded later.

Because Android does not provide a native way for apps to verify each other, manufacturers had to implement the functionality themselves and in most cases made errors that could allow other apps to masquerade as the legitimate ones and interact with the plug-in, the researchers said.

These errors include hash collisions, certificate forging and inter-process communication (IPC) abuse that allow an attacker to create malware capable of taking complete control of a victim's device. The malicious apps could abuse the remote support functionality to steal personal data, track device locations, record conversations through the microphone and much more.

These rogue apps would need only minimal permissions, like access to the Internet, making it harder to flag them as malicious, the researchers said. They could pose as fully functional games or other legitimate applications and could abuse the remote support functionality in the background without any indication to the user, they said.

In one case the researchers found that the server where a particular tool was configured to connect in order to initiate a remote support session could be changed with a simple text message, enabling an even more direct attack.

Check Point reported the vulnerability, which it calls Certifi-gate, to Google and the affected manufacturers and some of them have already started releasing patches.

However, because the system plug-in is signed with a manufacturer's certificate, the problem can't easily be fixed, the researchers said. Such certificates cannot be revoked because that would cause all other apps added by those manufacturers to stop working as well. So, an attacker could trick users to install an older and vulnerable version of the plug-in, which would replace the patched one, re-enabling the attack, they said.

During a separate talk at the Black Hat security conference Wednesday, Adrian Ludwig, Google's lead engineer for Android security, described multiple defenses built into the OS that could potentially be used to detect such an attack.

Android has a feature called Verify Apps that acts like a built-in antivirus and an inter-application firewall that could be used to detect and block malicious interactions between applications, he said.

In an emailed statement, Google thanked the researchers and noted that the company's Nexus devices are not affected and it hasn't seen any exploitation attempts so far.

"The issue they've detailed pertains to customizations OEMs make to Android devices and they are providing updates which resolve the issue," a Google representative said. "In order for a user to be affected, they'd need to install a potentially harmful application which we continually monitor for with VerifyApps and SafetyNet. We strongly encourage users to install applications from a trusted source, such as Google Play."

Samsung did not immediately respond to a request for comment about the remote support tool issue, but the company announced Wednesday that it plans to start releasing monthly security updates for its Android devices.


 
Re: Attackers could take over Android devices by exploiting built-in remote support a


Android faces SECOND patching crisis, on the same scale as Stagefright


‘Certifi-gate’ vuln could allow unrestricted device access


rsz_eca128fc7c.jpg


6 Aug 2015 at 18:31, John Leyden

Hours after Google and smartphone makers promised an imminent patch for the infamous Stagefright vulnerability another critical flaw in Android is being outed.

The “Certifi-gate” vulnerability allows applications to gain illegitimate privileged access rights, typically reserved for remote support applications that are either pre-installed or personally installed on Android devices.

Attackers can exploit Certifi-gate to gain unrestricted device access, allowing them to steal personal data, track device locations, turn on microphones to record conversations, and much more.

The vulnerability allows an attacker to take advantage of insecure apps certified by OEMs and carriers to gain unrestricted access to any device, including screen scraping, key logging, private information exfiltration, and back door app installation.

The root causes of these vulnerabilities include hash collisions, IPC abuse and certificate forging, which allow an attacker to grant their malware complete control of a compromised device.

The flaw affects hundreds of millions of Android devices from vendors including LG, Samsung, HTC and ZTE, according to security researchers at Check Point. The latest mega-flaw isn’t related to Stagefright, but it’s on the same scale in terms of numbers of devices (Android smartphones and tablets) affected.

All affected vendors were notified by Check Point about Certifi-gate and have begun releasing updates. Even so, fixing Certifi-gate may be even trickier than resolving the Stagefright vulnerability1.

For one thing the Certifi-gate vulnerability can only be resolved after a new software build is pushed to the device – a notoriously slow process. Even smartphones and tablets running the latest version of Android (Lollipop) are at risk.

Worse yet, resolving Certifi-gate involves updating multiple components and mobile remote support tool (mRST) plugins, according to Check Point researcher Avi Bashan.

The Certifi-gate patching process is fragmented as it relies on multiple updates from a range of different vendors (Google, OEMs and developers, especially those that make mRSTs) pushing updates.


 
Back
Top