Android apps with millions of downloads are vulnerable to serious attacks

Android apps with a whole bunch of thousands and thousands of downloads are susceptible to assaults that enable malicious apps to steal contacts, login credentials, personal messages, and different delicate data. Safety agency Test Level mentioned that the Edge Browser, the XRecorder video and display screen recorder, and the PowerDirector video editor are amongst these affected.

The vulnerability truly resides within the Google Play Core Library, which is a group of code made by Google. The library permits apps to streamline the replace course of by, as an example, receiving new variations throughout runtime and tailoring updates to a person app’s particular configuration or a particular cellphone mannequin the app is working on.

A core vulnerability

In August, safety agency Oversecured disclosed a safety bug within the Google Play Core Library that allowed one put in app to execute code within the context of every other app that relied on the susceptible library model.

The vulnerability stemmed from a listing traversal flaw that allowed untrusted sources to repeat recordsdata to a folder that was presupposed to be reserved just for trusted code acquired from Google Play. The vulnerability undermined a core safety constructed into the Android working system that forestalls one app from accessing knowledge or code belonging to every other app.

This is a picture that illustrates how an assault would possibly work:

Test Level

Google patched the library bug in April, however for susceptible apps to be mounted, builders should first obtain the up to date library after which incorporate it into their app code. Based on analysis findings from Test Level, a nontrivial variety of builders continued to make use of the susceptible library model.

Test Level researchers Aviran Hazum and Jonathan Shimonovich wrote:

After we mix common functions that make the most of the Google Play Core library, and the Native-Code-Execution vulnerability, we will clearly see the dangers. If a malicious software exploits this vulnerability, it might probably achieve code execution inside common functions and have the identical entry because the susceptible software.

The chances are restricted solely by our creativity. Listed here are only a few examples:

  • Inject code into banking functions to seize credentials, and on the identical time have SMS permissions to steal the Two-Issue Authentication (2FA) codes.
  • Inject code into Enterprise functions to achieve entry to company sources.
  • Inject code into social media functions to spy on the sufferer, and use location entry to trace the system.
  • Inject code into IM apps to seize all messages, and presumably ship messages on the sufferer’s behalf.

Seeing is believing

To exhibit an exploit, Test Level used a proof-of-concept malicious app to steal an authentication cookie from an previous model of Chrome. With possession of the cookie, the attacker is then capable of achieve unauthorized entry to a sufferer’s Dropbox account.

Account Takeover exploiting vulnerability in Android’s Play Core Library Code – Demo.

Test Level recognized 14 apps with mixed downloads of just about 850 million that remained susceptible. Inside just a few hours of publishing a report, the safety agency mentioned that builders of a few of the named apps had launched updates that mounted the vulnerability.

Apps recognized by Test Level included Edge, XRecorder, and the PowerDirector, which have mixed installations of 160 million. Test Level supplied no indication that any of those apps had been mounted. Ars requested builders of all three apps to touch upon the report. This publish will likely be up to date in the event that they reply.


Please enter your comment!
Please enter your name here