Vulnerability Affects Users Downloading Android Applications from Third-party Sources
Dubai, United Arab Emirates - Wednesday, March 25th 2015 [ME NewsWire]
Palo Alto Networks® (NYSE: PANW), the leader in enterprise security, today revealed details of a widespread vulnerability in Google’s Android mobile operating system that allows attackers to hijack the installation of a seemingly safe Android application -- Android Package File (APK) -- on user devices, replacing it with an app of the attacker’s choice, without user knowledge.
Saeed Agha, General Manager Middle East, Palo Alto Networks shared ahead of the release: “Exploitation of this vulnerability, which is estimated to affect about 49.5 percent of current Android device users, allows attackers to potentially distribute malware, compromise devices and steal user data.”
Palo Alto Networks today also released an application to help potentially affected Android users diagnose their devices.
Vulnerability Allows Stealth Bait & Switch
Discovered by Palo Alto Networks Unit 42 threat researcher Zhi Xu, the vulnerability exploits a flaw in Android’s “PackageInstaller” system service, allowing attackers to silently gain unlimited permissions in compromised devices. Specifically:
During installation, Android applications list the permissions requested to perform their function, such as a messaging app requesting access to SMS messages, but not GPS location.
This vulnerability allows attackers to trick users by displaying a false, more limited set of permissions, while potentially gaining full access to the services and data on the user’s device, including personal information and passwords.
While users believe they are installing a flashlight app, or a mobile game, with a well-defined and limited set of permissions, they are actually running potentially dangerous malware.
Unit 42, the Palo Alto Networks threat intelligence team, has worked with Google and Android device manufacturers such as Samsung and Amazon to help protect users and patch this vulnerability in affected versions of Android.
QUOTE:
“This Android vulnerability means users who think they’re accessing legitimate applications with approved permissions may instead be exposed to data theft and malware. We urge users to take advantage of the diagnostic application provided by Palo Alto Networks to check their devices, and we thank Google, Samsung and Amazon for their cooperation and attention.”
Ryan Olson, Intelligence Director, Unit 42, Palo Alto Networks
View the full release to:
See the video
Download Infographic
Gain background information or fixes
http://tiny.cc/PANdatatheft
Contacts
NettResults for Palo Alto Networks, +971-50-728-6803
Anu.Bhatnagar@NettResults.com
Permalink: http://www.me-newswire.net/news/14113/en
Dubai, United Arab Emirates - Wednesday, March 25th 2015 [ME NewsWire]
Palo Alto Networks® (NYSE: PANW), the leader in enterprise security, today revealed details of a widespread vulnerability in Google’s Android mobile operating system that allows attackers to hijack the installation of a seemingly safe Android application -- Android Package File (APK) -- on user devices, replacing it with an app of the attacker’s choice, without user knowledge.
Saeed Agha, General Manager Middle East, Palo Alto Networks shared ahead of the release: “Exploitation of this vulnerability, which is estimated to affect about 49.5 percent of current Android device users, allows attackers to potentially distribute malware, compromise devices and steal user data.”
Palo Alto Networks today also released an application to help potentially affected Android users diagnose their devices.
Vulnerability Allows Stealth Bait & Switch
Discovered by Palo Alto Networks Unit 42 threat researcher Zhi Xu, the vulnerability exploits a flaw in Android’s “PackageInstaller” system service, allowing attackers to silently gain unlimited permissions in compromised devices. Specifically:
During installation, Android applications list the permissions requested to perform their function, such as a messaging app requesting access to SMS messages, but not GPS location.
This vulnerability allows attackers to trick users by displaying a false, more limited set of permissions, while potentially gaining full access to the services and data on the user’s device, including personal information and passwords.
While users believe they are installing a flashlight app, or a mobile game, with a well-defined and limited set of permissions, they are actually running potentially dangerous malware.
Unit 42, the Palo Alto Networks threat intelligence team, has worked with Google and Android device manufacturers such as Samsung and Amazon to help protect users and patch this vulnerability in affected versions of Android.
QUOTE:
“This Android vulnerability means users who think they’re accessing legitimate applications with approved permissions may instead be exposed to data theft and malware. We urge users to take advantage of the diagnostic application provided by Palo Alto Networks to check their devices, and we thank Google, Samsung and Amazon for their cooperation and attention.”
Ryan Olson, Intelligence Director, Unit 42, Palo Alto Networks
View the full release to:
See the video
Download Infographic
Gain background information or fixes
http://tiny.cc/PANdatatheft
Contacts
NettResults for Palo Alto Networks, +971-50-728-6803
Anu.Bhatnagar@NettResults.com
Permalink: http://www.me-newswire.net/news/14113/en
No comments:
Post a Comment