{"id":146968,"date":"2022-12-03T13:02:10","date_gmt":"2022-12-03T13:02:10","guid":{"rendered":"https:\/\/harchi90.com\/android-phone-makers-encryption-keys-stolen-and-used-in-malware\/"},"modified":"2022-12-03T13:02:10","modified_gmt":"2022-12-03T13:02:10","slug":"android-phone-makers-encryption-keys-stolen-and-used-in-malware","status":"publish","type":"post","link":"https:\/\/harchi90.com\/android-phone-makers-encryption-keys-stolen-and-used-in-malware\/","title":{"rendered":"Android Phone Makers’ Encryption Keys Stolen and Used in Malware"},"content":{"rendered":"
While Google develops<\/span> its open source Android mobile operating system, the \u201coriginal equipment manufacturers\u201d who make Android smartphones, like Samsung, play a large role in tailoring and securing the OS for their devices. But a new finding that Google made public on Thursday\u200b reveals that a number of digital certificates used by vendors to validate vital system applications were recently compromised and have already been abused to put a stamp of approval on malicious Android apps.<\/p>\n As with almost any computer operating system, Google’s Android is designed with a \u201cprivilege\u201d model, so different software running on your Android phone, from third-party apps to the operating system itself, are restricted as much as possible and only allowed system access based on their needs. This keeps the latest game you’re playing from quietly collecting all your passwords while allowing your photo editing app to access your camera roll, and the whole structure is enforced by digital certificates signed with cryptographic keys. If the keys are compromised, attackers can grant their own software permissions it shouldn’t have. <\/p>\n Google said in a statement on Thursday that Android device manufacturers had rolled out mitigations, rotating keys and pushing out the fixes to users’ phones automatically. And the company has added scanner detections for any malware attempting to abuse the compromised certificates. Google said it has not found evidence that the malware snuck into the Google Play Store, meaning that it was making the rounds via third-party distribution. Disclosure and coordination to address the threat happened through a consortium known as the Android Partner Vulnerability Initiative.<\/p>\n \u201cWhile this attack is quite bad, we got lucky this time, as OEMs can quickly rotate the affected keys by shipping over-the-air device updates,\u201d says Zack Newman, a researcher at the software supply-chain security firm Chainguard, which did some analysis of the incident. <\/p>\n Abusing the compromised \u201cplatform certificates\u201d would allow an attacker to create malware that is anointed and has extensive permissions without needing to trick users into granting them. The Google report, by Android reverse engineer \u0141ukasz Siewierski, provides some malware samples that were taking advantage of the stolen certificates. They point to Samsung and LG as two of the manufacturers whose certificates were compromised, among others.<\/p>\n LG did not return a request from WIRED for comment. Samsung acknowledged the compromise in a statement and said that \u201cthere have been no known security incidents regarding this potential vulnerability.\u201d<\/p>\n Though Google seems to have caught the issue before it spiraled, the incident underscores the reality that security measures can become single points of failure if they aren’t designed thoughtfully and with as much transparency as possible. Google itself debuted a mechanism last year called Google Binary Transparency that can act as a check of whether the version of Android running on a device is the intended, verified version. There are scenarios in which attackers could have so much access on a target’s system that they could defeat such logging tools, but they are worth deploying to minimize damage and flag suspicious behavior in as many situations as possible.<\/p>\n As always, the best defense for users is to keep the software on all their devices up to date. <\/p>\n \u201cThe reality is, we will see attackers continue to go after this type of access,\u201d Chainguard’s Newman says. \u201cBut this challenge is unique to Android, and the news is that security engineers and not good building solutions researchers have made significant progress that prevent, detect, and enable recovery from these attacks.\u201d<\/p>\n<\/div>\n .<\/p>\n","protected":false},"excerpt":{"rendered":" While Google develops its open source Android mobile operating system, the \u201coriginal equipment manufacturers\u201d who make Android smartphones, like Samsung, play a large role in tailoring and securing the OS for their devices. But a new finding that Google made public on Thursday\u200b reveals that a number of digital certificates used by vendors to validate …<\/p>\n