2014年3月24日星期一

Malicious apps can wash machine phones, erase data, researchers advise

Malicious apps can wash machine phones, erase data, researchers advise

Security researchers assumed they tolerate uncovered bugs in vogue Google's machine operating organism so as to possibly will allow malicious apps to fling vulnerable procedure into a spiral of endlessly looping crashes and perhaps delete all data stored on them.

Apps so as to exploit the denial-of-service vulnerability exert yourself on machine versions 2.3, 4.2.2, 4.3, and perhaps many other releases of the operating organism, researcher Ibrahim Balic wrote in vogue a blog publicize in print end week. Attackers possibly will exploit the underlying remembrance corruption bug by thrashing attack code in vogue an otherwise functional before legitimate app so as to is automatic to befall triggered no more than in the same way as it is installed on a vulnerable handset. By substantial the machine "appname" domain with an awfully extensive evaluate exceeding 387,000 typescript, the app can cause the device to drive into an endless cycle of crashes.

"We believe so as to this vulnerability may well befall used by cybercriminals to achieve round about ample spoil on machine smartphones and pills, which include 'bricking' a device before rendering it unusable in vogue a few way," Veo Zhang, a cellular phone threats analyst by the side of Trend Micro, wrote in vogue a blog publicize in print Sunday. "In this context, the device is 'bricked' seeing that it is trapped in vogue an endless reboot ball."

Zhang assumed the attack mechanism by entering obese amounts of data into the pursuit label, which is the machine equivalent of the Window title in vogue Microsoft Windows operating systems. Seeing that a product, attackers can create booby-trapped apps so as to tolerate the would-be to exploit the vulnerability. Zhang explained:

If a cybercriminal builds an app containing a hidden pursuit with a obese label, the user desire tolerate nix picture at all so as to this exploit is in vogue statement taking place. Cybercriminals can broaden conceal the exploit by setting a timed trigger event so as to stops the current app pursuit and at that time opens the hidden pursuit. As soon as the timed event is triggered, the exploit runs, and the organism head waiter crashes seeing that a product. This stops all functionality of the cellular phone device, and the organism desire befall required to reboot.

An even worse rationale is as soon as the malware is in black and white to start mechanically leading device startup. Burden so desire confine the device in vogue a rebooting ball, rendering it useless. In vogue this rationale, no more than a riding boot loader recovery put back into working order desire exert yourself, which resources so as to all the in sequence (contacts, photos, archive, et cetera.) stored inside the device desire befall erased.
Interestingly, Balic assumed so as to his exploit appeared to trigger a denial-of-service condition on Bouncer, the cloud-based scanner so as to scours the authorized Google comedy app sell on behalf of malicious titles. He based his observation of the performance of comedy shortly in the same way as uploading a proof-of-concept exploit to Google servers to guarantee if Bouncer would detect the malicious behavior.

"Then I realized so as to it caused denial of service on Google comedy," he wrote. "Because I on track to contract round about errors from Google comedy! In the same way as round about google-ing, I guarantee so as to many citizens couldn't upload their apps to Google comedy through my test! I think it was probably as of taxing my [proof-of-concept] exploit on Google comedy." On Monday, Balic assumed Bouncer remains vulnerable still.

Trend Micro warned so as to attacks tolerate the would-be to erase all of the data stored on a vulnerable device if they force victims to act a fast factory reset while a device is cycling through a cycle of automatic reboots.

Tags  : Malicious , app,  Android , phone




没有评论:

发表评论