All the latest UK technology news, reviews and analysis


First active Google Android Master Key exploit discovered in the wild

24 Jul 2013
Google Android Malware

A wave of attacks exploiting a Master Key vulnerability in Google's Android OS has been discovered.

Symantec researchers confirmed detecting two cases where legitimate applications have been warped into malware-spreading tools using the Master Key vulnerability.

"Norton Mobile Insight – our system for harvesting and automatically analysing Android applications from hundreds of marketplaces – has discovered the first examples of the exploit being used in the wild. Symantec detects these applications as Android.Skullkey. We found two applications infected by a malicious actor. They are legitimate applications distributed on Android marketplaces in China to help find and make doctor appointments," read the statement.

"Using the vulnerability, the attacker has modified the original Android application by adding an additional classes.dex file (the file which contains the Android application code) and also adding an additional Android manifest file (the file which specifies permissions)."

Symantec warned that the apps are designed for a variety of malicious purposes and expects to see further attacks leveraging the vulnerability. "An attacker has taken both of these applications and added code to allow them to remotely control devices, steal sensitive data such as IMEI [International Mobile Equipment Identity] and phone numbers, send premium SMS messages, and disable a few Chinese mobile security software applications by using root commands, if available," read the report.

"We expect attackers to continue to leverage this vulnerability to infect unsuspecting user devices. Symantec recommends users only download applications from reputable Android application marketplaces."

The Master Key vulnerability was first uncovered by Bluebox Security. Google has released a patch for the vulnerability to carriers and hardware partners. It is currently up to the partners to distribute the fix, a cycle that can take several months.

The news comes during a wider boom in the number of cyber attacks targeting Android. Most recently security firm BitDefender reported detecting a spike in the number of finance industry-focused attacks and ransomware levels targeting the ecosystem.

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Alastair Stevenson
About

Alastair has worked as a reporter covering security and mobile issues at V3 since March 2012. Before entering the field of journalism Alastair had worked in numerous industries as both a freelance copy writer and artist.

View Alastair's Google+ profile

More on Security
What do you think?
blog comments powered by Disqus
Poll

BYOD vs CYOD vs BYOC poll

Which approach is your firm taking to managing employees' mobile devices?
20%
13%
5%
21%
29%
12%

Popular Threads

Powered by Disqus
Galaxy S5 vs Xperia Z2 home screen

Xperia Z2 vs Galaxy S5

We break down the strengths and weaknesses of the two Android heavyweights

Updating your subscription status Loading
Newsletters

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button
hpv33

Data protection: the key challenges

Deduplication is a foundational technology for efficient backup and recovery

rdc2

iPad makes its mark in the enterprise

The iPad can become a supercharged unified communications endpoint, allowing users to enhance their productivity

SAS Insight Analyst / Macro / Base / SQL Server

SAS Insight Analyst / Macro / Base / SQL Server...

Design & Implementation Network Engineer – CCNP / CCIP / MPLS

Cisco Design & Implementation Network Engineer at...

Application Support Analyst (Technical Support, Trading System)

Application Support Analyst (Technical Support, Trading...

IT Business Partner

Are you an excellent communicator capable of working...
To send to more than one email address, simply separate each address with a comma.