【】TopicsAndroidCybersecurity

  发布时间:2024-09-20 07:55:37   作者:玩站小弟   我要评论
Most malware requires some form of active user interaction in order to infect a device -- a click on 。

Most malware requires some form of active user interaction in order to infect a device -- a click on a link in a phishing email, or the installation of software from an unverified source.。

But a new type of attack, dubbed Cloak and Dagger, can basically take over your Android phone without your (conscious) help. Worse, no major version of Android is safe at this time. 。

SEE ALSO:Whoops. Millions of Android phones are wide open to hackers 。

Described by a team of researchers from the University of California and the Georgia Institute of Technology, Cloak and Dagger relies on the way Android UI handles certain permissions.。

If an app is downloaded from Google's Play Store, researchers claim, it is automatically granted the SYSTEM_ALERT_WINDOW permission, aka "draw on top." You've likely seen this permission in action -- it's used by Facebook's chat heads, which float over other content on your screen.。

Mashable Games

This can be used to hijack the user's clicks and lure her into giving the app another permission, called BIND_ACCESSIBILITY_SERVICE or a11y, which can be used for stealing your passwords and pins, for example. 。

Mashable Light SpeedWant more out-of-this world tech, space and science stories?Mashable Light SpeedWant more out-of-this world tech, space and science stories?Sign up for Mashable's weekly Light Speed newsletter. 。By signing up you agree to our Terms of Use and Privacy Policy.。

Thanks for signing up! 。

A hacker that combines both these vulnerabilities could silently install a "God-mode" app with all permissions enabled, including access to your messages and calls. 。

Even though a lot of this is intended behavior and not an actual exploit, it can definitely be used to take over someone's device. The researchers claim they tested it on 20 human subjects, none of which had realized what was going on. 。

The one thing that protects users right now is the fact that to do all this, the malicious app must be downloaded from Google's official Play Store, meaning that it has to pass Google's security checks. But from past examples we know it's definitely possible for malicious hackers to slip in a malware-infested app into Play Store.。

"It is trivial to get such an app accepted on the Google Play Store." 。

"A quick experiment shows that it is trivial to get such an app accepted on the Google Play Store," the researchers claim. "We submitted an app requiring these two permissions and containing a non-obfuscated functionality to download and execute arbitrary code (attempting to simulate a clearly-malicious behavior): this app got approved after just a few hours (and it is still available on the Google Play Store)," they wrote. 。

While Google has partially fixed the issue in the latest version of Android (7.1.2), the researchers claim it's still fully possible to take advantage of the vulnerabilities described above. According to the researchers, these aren't "simple bugs" but "design-related issues," meaning it will take more time to fix them; moreover, Google considers some of these issues as features, and does not currently plan to fix them. 。

To protect their devices, the only thing users can do right now is check which apps have access to the "draw on top" and a11y permissions. The steps to do this vary in different versions of Android; they are listed here. 。"We've been in close touch with the researchers and, as always, we appreciate their efforts to help keep our users safer.  We have updated Google Play Protect -- our security services on all Android devices with Google Play -- to detect and prevent the installation of these apps. Prior to this report, we had already built new security protections into Android O that will further strengthen our protection from these issues moving forward," a Google spokesperson told 。


Mashable.。

Mashable. 。

Featured Video For You 。TopicsAndroidCybersecurity 。
  • Tag:

相关文章

  • Xiaomi accused of copying again, this time by Jawbone

    Imitation is not always the best form of flattery.。 SEE ALSO:Xiaomi's MacBook Air clone is called, w
    2024-09-20
  • 豉汁培根金針卷的做法

    很多人都不會做飯 ,這個在現代社會很正常。畢竟現代餐飲業的繁榮  ,我們可以在飯店吃飯。可是很多時候自己親手做的,味道真的不一樣 ,關於豉汁培根金針卷的做法,你可以自己動手做一下 ,然後自己品一下,相信味道絕對
    2024-09-20
  • Wordle today: The answer and hints for June 22

    Oh hey there! If you're here, it must be time for Wordle. As always, we're serving up our daily hint
    2024-09-20
  • 三文魚扒伴蛇皮果的做法

    每逢佳節倍思親,身在他鄉工作的你肯定想家.想親人了吧 。還有幾天,你就可以一解相思之苦了 。而見到親人 ,如果你能親手做上一頓可口的飯菜 ,他們肯定無比欣慰。那麽 ,下麵就讓小編先來教您如果做好三文魚扒伴蛇皮果
    2024-09-20
  • Singapore rolls out video

    SINGAPORE -- Getting stuff done at the bank often involves having to waste part of your day standing
    2024-09-20
  • 原創 英超14輪賽事前瞻

    原創 英超14輪賽事前瞻_足球 - 世界杯,歐洲杯 ,天下體育 ,足球,世界杯,籃球,羽球 ,乒乓球 ,球類, 棒球 ( 本賽季,伯恩 )www.ty42.com 日期:2023-03
    2024-09-20

最新评论