Most malware requires some form of active user interaction in order to infect a device -- a click on Watch Lost Bullet Onlinea link in a phishing email, or the installation of software from an unverified source.
But a new type of attack, dubbed Cloak and Dagger, can basically take over your Android phone without your (conscious) help. Worse, no major version of Android is safe at this time.
SEE ALSO: Whoops. Millions of Android phones are wide open to hackersDescribed by a team of researchers from the University of California and the Georgia Institute of Technology, Cloak and Dagger relies on the way Android UI handles certain permissions.
If an app is downloaded from Google's Play Store, researchers claim, it is automatically granted the SYSTEM_ALERT_WINDOW permission, aka "draw on top." You've likely seen this permission in action -- it's used by Facebook's chat heads, which float over other content on your screen.
This can be used to hijack the user's clicks and lure her into giving the app another permission, called BIND_ACCESSIBILITY_SERVICE or a11y, which can be used for stealing your passwords and pins, for example.
A hacker that combines both these vulnerabilities could silently install a "God-mode" app with all permissions enabled, including access to your messages and calls.
Even though a lot of this is intended behavior and not an actual exploit, it can definitely be used to take over someone's device. The researchers claim they tested it on 20 human subjects, none of which had realized what was going on.
The one thing that protects users right now is the fact that to do all this, the malicious app must be downloaded from Google's official Play Store, meaning that it has to pass Google's security checks. But from past examples we know it's definitely possible for malicious hackers to slip in a malware-infested app into Play Store.
"It is trivial to get such an app accepted on the Google Play Store."
"A quick experiment shows that it is trivial to get such an app accepted on the Google Play Store," the researchers claim. "We submitted an app requiring these two permissions and containing a non-obfuscated functionality to download and execute arbitrary code (attempting to simulate a clearly-malicious behavior): this app got approved after just a few hours (and it is still available on the Google Play Store)," they wrote.
While Google has partially fixed the issue in the latest version of Android (7.1.2), the researchers claim it's still fully possible to take advantage of the vulnerabilities described above. According to the researchers, these aren't "simple bugs" but "design-related issues," meaning it will take more time to fix them; moreover, Google considers some of these issues as features, and does not currently plan to fix them.
To protect their devices, the only thing users can do right now is check which apps have access to the "draw on top" and a11y permissions. The steps to do this vary in different versions of Android; they are listed here.
"We've been in close touch with the researchers and, as always, we appreciate their efforts to help keep our users safer. We have updated Google Play Protect -- our security services on all Android devices with Google Play -- to detect and prevent the installation of these apps. Prior to this report, we had already built new security protections into Android O that will further strengthen our protection from these issues moving forward," a Google spokesperson toldMashable.
Topics Android Cybersecurity
(Editor: {typename type="name"/})
LA Galaxy vs. Tigres 2025 livestream: Watch Concacaf Champions Cup for free
HP announces a security flaw (and fix) for many laser printers
Bangladesh vs. India 2025 livestream: Watch ICC Champions Trophy for free
Best gaming laptop deal: Get $600 off the Acer Predator Helios Neo 14
You won't see Elon Musk smoking weed in public again, NASA admin says
Best gaming laptop deal: Get $600 off the Acer Predator Helios Neo 14
Real Madrid vs. Manchester City 2025 livestream: Watch Champions League for free
Free Pokémon trading card event: How to get free Pikachu promo card on Feb. 22
The EPA axed its climate change websites, but NASA's are still intact
'Severance' Season 2, episode 6: What's with those documents Mr. Drummond finds?
Analyzing Graphics Card Pricing: October 2018
Meta execs likely to receive major bonuses following company layoffs
接受PR>=1、BR>=1,流量相当,内容相关类链接。