When someone other than the device manufacturer has a “platform certificate,” it can be used to verify an app’s authenticity, making it dangerous.
Although Google is the mastermind behind Android, “original equipment manufacturers” have a considerable say in how it will be used for their devices. These companies like Samsung take google’s open source and mould it to fit their own purposes.
But on Thursday, Google revealed a new finding: many digital certificates vendors used to confirm vital system applications were already compromised and abused to approve malicious Android apps.
Almost every computer system, including Google’s Android, is designed with a “privilege” model. In other words, different software running on your phone–from third-party apps to the operating system itself—are restricted access to parts of the system only necessary for their specific purposes.
Using digital certificates signed with cryptographic keys will keep the latest game you’re playing from being able to secretly collect all your passwords while still allowing access to your camera roll for photo editing apps. If an attacker gets ahold of your keys, they can give their software elevated permissions that it shouldn’t have.
On Thursday, Google revealed that Android device manufacturers had already pushed out fixes to users’ phones and rotated the keys to mitigating the threats.
Furthermore, the company has included detections for scanner any malware trying to take advantage of the infiltrated certificates. Google stated that it hadn’t found proof that the malware secretly entered the Google Play Store, meaning it was being circulated via external distribution. The Android Partner Vulnerability Initiative is a group that helps to both mediate and coordinate disclosure between companies.
Zack Newman, a researcher at the software supply-chain security firm Chainguard, analysed the incideCnt and said, “This was a serious attack, but we were lucky as OEMs can quickly change the affected keys by sending over-the-air device updates.”
By abusing the passwords of platform certificates, malicious individuals could create malware that wouldn’t need to trick users into permitting it. This would then allow the malware more freedom and capabilities.
The Google report published by Android reverse engineer Łukasz Siewierski provides malware samples that exploit stolen certificates. The report cites Samsung and LG as two manufacturers whose security certificates were compromised, among others.
Despite being contacted, LG did not provide a comment. However, Samsung issued a statement saying that “there have been no known security incidents regarding this potential vulnerability.”
More Stories
Killnet and AnonymousSudan Collaborate to Launch Cyber Attacks on Western Organisations
In recent news, it has been reported that two Russia-sympathetic hacktivist groups, Killnet and AnonymousSudan, have allegedly launched a series...
$4000 Gone In An Instant: Mother Defrauded in Facebook Marketplace Car Deal
A mother of four is warning others to be cautious after believing she had purchased a safe and dependable car...
Shocking Scam: Sydney Family Loses $200K Life-Savings in Suncorp Spoofing Fraud
A family from Sydney has lost their life savings worth $200,000 due to a fraudulent scam. Peter and Madison, who...
Mysterious Money Transfer Leaves Couple Speechless: How They Got an Unsolicited $4000
A young couple in Melbourne claims their bank is making up a personal loan they do not understand. Ashley and...
Phishing + AI + Voice Cloning= Big Trouble: The New Way Criminals are Stealing Your Money
New Alert: Criminals use AI and voice cloning to trick you out of your money. Earlier this year, Microsoft unveiled...
‘Impossible to Spot’ Delivery Scam Email Targets Australia Post Customers – Don’t Fall Victim!
Unsuspecting shoppers should be cautious as a parcel delivery scam that is hard to distinguish targets Australia Post customers. Email...