News

Android’s “Fake ID” Issue Could Allow Hackers to Steal Data from Millions of Devices

A security company by the name of Bluebox Security has been throwing warning out there in regards to a major flaw in Android operating systems that would potentially allow hackers to steal sensitive information from millions of devices without the user noticing it.

The company stated that the most affected users would be the ones owning an old Android handset that stopped receiving software updates. However, Android users should note that not all Android users are affected by the flaw at hand.

The “Fake ID” vulnerability, as Bluebox describes it, consists of the way the Android operating system processes the digital signature identities attached to apps from various vendors. The OS is said to be configured to automatically accept Adobe apps for example, or other vendors including the device management outfit 3LM. In addition, some apps bearing the latter vendor signatures can automatically plug into other apps in ways other apps cannot.

What is more worrying is that since Android 2.1, the Android package installer is said not to have properly checked the identity certificates, therefore apps claiming to come from trusted vendors could eventually end up being from another ‘vendor’.

“For example, an attacker can create a new digital identity certificate, forge a claim that the identity certificate was issued by Adobe Systems, and sign an application with a certificate chain that contains a malicious identity certificate and the Adobe Systems certificate. Upon installation, the Android package installer will not verify the claim of the malicious identity certificate, and create a package signature that contains… both certificates. This, in turn, tricks the certificate-checking code in the webview plugin manager (who explicitly checks the chain for the Adobe certificate) and allows the application to be granted the special webview plugin privilege given to Adobe Systems – leading to a sandbox escape and insertion of malicious code, in the form of a webview plugin, into other applications.” a Bluebox expert stated.

This way, hackers could have easily impersonate a 3LM signature and allow malware to take control of many devices, functions and apps, including Google Wallet features. Bluebox is stated to have notified Google of the security breach back in April.

However, up until now, Motorola is stated to have rolled out a patch for some of its devices. The experts say that there is no recorded breach of security using the above technique. Even so, a good practice is to only allow app installations from trusted sources and be weary of schemes that try to install specific ‘dodgy’ applications.

Thank you Gigaom for providing us with this information
Image courtesy of Gigaom

Gabriel Roşu

Disqus Comments Loading...

Recent Posts

NZXT LIFT 2 STARFIELD Symmetrical Optical Gaming Mouse

The NZXT Lift 2 is an symmetrical mouse that goes the distance. Its lightweight design…

2 hours ago

MSI MAG B650 TOMAHAWK WiFi + AMD 7800X 3D + MSI MAG CORELIQUID E240 AIO Bundle

The MAG B650 TOMAHAWK WIFI is a gaming oriented ATX motherboard constructed around the latest…

2 hours ago

Sapphire AMD Radeon RX 7800 XT NITRO+ 16GB Graphics Card

Experience incredible performance, visuals, and efficiency when gaming and streaming with the AMD Radeon™ RX…

2 hours ago

AMD Ryzen 5 7600X 6 Core AM5 CPU/Processor

Welcome to the new era of performance. AMD Ryzen 7000 Series ushers in the speed…

2 hours ago

MSI Intel Z790 GAMING PLUS DDR5 PCIE 5 WIFI ATX Motherboard

Take a step into the future with the Z790 Gaming Plus Wifi motherboard, designed and…

3 hours ago

Samsung 990 EVO 2TB M.2 NVMe PCIe 5.0/4.0 NVMe SSD/Solid State Drive

The 990 EVO offers enhanced sequential read/write speeds up to 5,000/4,200 MB/s, and random read/write…

3 hours ago