Friday, March 27, 2015

Dangerous hole in Android – Computerworld


 
 
 Google, Samsung and Amazon already made available the relevant amendments eliminating the threat, but close to 49.5% of users with Android devices is still susceptible to attacks based on this hole, although Google announces that it has not detected the attack attempts to exploit the vulnerability.

After that, when you install on a mobile device, a malicious application – that uses the vulnerability known as “Android Installer Hijacking” – a hacker gets full access to the device and has the ability to read from it confidential information such as user names and passwords.

See also:

The company Palo Alto Networks has developed two exploits that take advantage of the hole. Malware installed on the mobile device can modify and to swap only the applications installed on the mobile device that have been downloaded from independent software vendors. Therefore, experts advise to always just download the software from these sources, which we trust.

A malicious application downloaded from an independent software vendor pushes his APK installation files in unprotected storage-enabled mobile device, such as eg. The card SD. Comes into play when the system PackageInstaller program, which completes the installation. If your device is in a hole, APK file may be modified or replaced to another.

The attack might look like this: the user gets an application, and this is obtained from the Android permission to install. And that’s when it can be modified or replaced to another, because the software does not work PackageInstaller as it should and has no control over the operation. So after you click “Install” you do not realize that just installed a completely different, a malicious application.

After the discovery of this threat in January 2014 nearly 90% of all Android devices contain this vulnerability . Today it is better, but almost every other device further has not been patched and still contains this dangerous hole.

Palo Alto Networks announces that it is in the following versions of Android: 2.3, 4.0.3 and 4.0. 4, 4.1.xi 4.2.x. Android 4.4 is safe. Hole can also be present in some devices running on Android 4.3.

Google released a patch eliminating the gap here and Palo Alto Ntworks offers a tool that checks whether the Android device is vulnerable to such attacks.
 
 
 
 
 

LikeTweet

No comments:

Post a Comment