BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Create custom audits for Android devices. Come on, all the cool kids are doing it.

Posted July 18, 2012    Carter Jones

Have you ever wanted to root your Android device, so you could be like all the other cool kids on the block? If you did your research, you learned that it makes it easier for attackers to keep their malware on your device, if it were to be infected, through the use of a rootkit. Therefore, in the interest of security, you made the choice not to root your device. Well, that’s a good first step, but it won’t protect you from all rootkits.

Researchers have managed to find and exploit a vulnerability in the Launcher component of the Android framework. This varies from the normal type of rootkit that would typically exploit a component of the core operating system. In a demonstration video of their work, the researchers show how a UI redressing attack can be performed by hijacking the Android Launcher. A UI redressing attack (aka: clickjacking attack) is a way for attackers to get you to click on something that looks legitimate in nature, but is actually tricking you into performing some other action of the attacker’s choosing. In the case of this rootkit, the clickjacking technique can be used to hide malicious apps from the user, so that the user has no idea something nefarious is on their device.

It needs to be made clear that 1) this does not involve any rooting of the device, 2) no privilege escalation is taking place, 3) no modifications to userland or the kernel are made, and 4) no processes other than the Launcher are controlled. This makes it very different from certain types of malware that rely on a phone being rooted in order to take over the mobile device.

There’s your security, but now we’ll put it in context.

This is a technique that researchers have discovered. It was not reported as something observed in the wild. The researchers are “working on ways to protect against attacks like these” (we hope this means that they will be working directly with the Android framework developer team). Details of the how the researchers managed to hijack the Launcher are non-existent at this point in time, so malware authors have very little to work with.

To help you stay secure, we’ve built the ability to create custom audits for Android devices into Retina. Once further information becomes available about this Android vulnerability, you’ll be able to audit your Android devices, so you can defend against this vulnerability, helping to maintain a strong security posture for you and your organization.

Tags:
, , , , , , ,

Leave a Reply

Additional articles

Are Your Data Security Efforts Focused in the Right Area?

Posted January 28, 2015    Scott Lang

Vormetric Data Security recently released an insider threat report, with research conducted by HarrisPoll and analyzed by Ovum. Based on the survey responses, it is apparent that there is still a great deal of insecurity over data. However, the results also show that there may be misplaced investments to address those insecurities. I will explain…

Tags:
ghost

GHOST Vulnerability…Scary Indeed

Posted January 28, 2015    BeyondTrust Research Team

A vulnerability discovered by Qualys security researchers has surfaced within the GNU C Library that affects virtually all Linux operating systems. The vulnerability lies within the various gethostbyname*() functions and, as such, has been dubbed “GHOST.” GHOST is particularly nasty considering remote, arbitrary code execution can be achieved. In an effort to avoid taxing DNS lookups, glibc developers introduced…

Tags:
,
dave-shackleford-headshot

Your New Years Resolution: Controlling Privileged Users

Posted January 27, 2015    Dave Shackleford

Is 2015 the year you get a better handle on security? The news last year was grim – so much so, in fact, that many in the information security community despaired a bit. Really, the end-of-the-year infosec cocktail parties were a bit glum. OK, let’s be honest, infosec cocktail parties are usually not that wild…

Tags:
, , ,