EletiofeAndroid Phone Makers’ Encryption Keys Stolen and Used in...

Android Phone Makers’ Encryption Keys Stolen and Used in Malware


- Advertisment -

While Google develops its open source Android mobile operating system, the “original equipment manufacturers” who make Android smartphones, like Samsung, play a large role in tailoring and securing the OS for their devices. But a new finding that Google made public on Thursday​ reveals that a number of digital certificates used by vendors to validate vital system applications were recently compromised and have already been abused to put a stamp of approval on malicious Android apps.

As with almost any computer operating system, Google’s Android is designed with a “privilege” model, so different software running on your Android phone, from third-party apps to the operating system itself, are restricted as much as possible and only allowed system access based on their needs. This keeps the latest game you’re playing from quietly collecting all your passwords while allowing your photo editing app to access your camera roll, and the whole structure is enforced by digital certificates signed with cryptographic keys. If the keys are compromised, attackers can grant their own software permissions it shouldn’t have. 

Google said in a statement on Thursday that Android device manufacturers had rolled out mitigations, rotating keys and pushing out the fixes to users’ phones automatically. And the company has added scanner detections for any malware attempting to abuse the compromised certificates. Google said it has not found evidence that the malware snuck into the Google Play Store, meaning that it was making the rounds via third-party distribution. Disclosure and coordination to address the threat happened through a consortium known as the Android Partner Vulnerability Initiative.

“While this attack is quite bad, we got lucky this time, as OEMs can quickly rotate the affected keys by shipping over-the-air device updates,” says Zack Newman, a researcher at the software supply-chain security firm Chainguard, which did some analysis of the incident. 

Abusing the compromised “platform certificates” would allow an attacker to create malware that is anointed and has extensive permissions without needing to trick users into granting them. The Google report, by Android reverse engineer Łukasz Siewierski, provides some malware samples that were taking advantage of the stolen certificates. They point to Samsung and LG as two of the manufacturers whose certificates were compromised, among others.

LG did not return a request from WIRED for comment. Samsung acknowledged the compromise in a statement and said that “there have been no known security incidents regarding this potential vulnerability.”

Though Google seems to have caught the issue before it spiraled, the incident underscores the reality that security measures can become single points of failure if they aren’t designed thoughtfully and with as much transparency as possible. Google itself debuted a mechanism last year called Google Binary Transparency that can act as a check of whether the version of Android running on a device is the intended, verified version. There are scenarios in which attackers could have so much access on a target’s system that they could defeat such logging tools, but they are worth deploying to minimize damage and flag suspicious behavior in as many situations as possible.

As always, the best defense for users is to keep the software on all their devices up to date

“The reality is, we will see attackers continue to go after this type of access,” Chainguard’s Newman says. “But this challenge is not unique to Android, and the good news is that security engineers and researchers have made significant progress in building solutions that prevent, detect, and enable recovery from these attacks.”

Latest news

Lots of People Make Money on Fanfic. Just Not the Authors

Of the 12.5 million works currently hosted on the fan fiction hub Archive of Our Own, SenLinYu’s Manacled ranks...

Biden Executive Order Bans Sale of US Data to China, Russia. Good Luck

US president Joe Biden will sign an executive order on Wednesday aimed at preventing a handful of countries, including...

Amazon Just Got Banned From the EU Parliament

Amazon has become the second company ever to have its lobbyists banned from the European Parliament, amid accusations the...

Emergency Planners Are Having a Moment

Also, in a disaster, there are no good decisions, there are only least-worse decisions. Every decision will come with...
- Advertisement -

Dictators Used Sandvine Tech to Censor the Internet. The US Finally Did Something About It

When the Egyptian government shut down the internet in 2011 to give itself cover to crush a popular protest...

Shut Up During Argument With Your Husbands – Minister Warns Women

Uju Kennedy-Ohaneye, the Minister for Women Affairs, has issued an advice to women.She advised women in the country not to...

Must read

Lots of People Make Money on Fanfic. Just Not the Authors

Of the 12.5 million works currently hosted on the...

Biden Executive Order Bans Sale of US Data to China, Russia. Good Luck

US president Joe Biden will sign an executive order...
- Advertisement -

You might also likeRELATED
Recommended to you