Android hijacking bug may allow attackers to install password-stealers

Roughly half of all Android handsets are vulnerable to a newly discovered hack that in some cases allows attackers to surreptitiously modify or replace seemingly benign apps with malicious ones that steal passwords and other sensitive data.

The “Android installer hijacking” vulnerability, as it has been dubbed by researchers from Palo Alto Networks, works only when apps are being downloaded from third-party app stores or when a user clicks on an app promotion advertisement hosted by a mobile advertisement library. Technically, it’s based on what’s known as a Time-of-check to time-of-use vulnerability. Affected devices fail to verify that the app being installed at the time of use was the one the end user approved during the time of check, which occurs when a user approves app permissions such as network access or access to the contacts database. The bug involves the way the system application called PackageInstaller installs app files known as APKs.

“A vulnerability exists in this process because while the user is reviewing this information, the attacker can modify or replace the package in the background,” Palo Alto Networks researcher Zhi Xu wrote in a blog post published Tuesday. “Verified with Android OS source code posted in AOSP [Android Open Source Project], it shows that the PackageInstaller on affected versions does not verify the APK file at the ‘time of use.’ Thus, in the “time of use’ (i.e., after clicking the ‘install button), the PackageInstaller can actually install a different app with an entirely different set of permissions.”

Read 2 remaining paragraphs | Comments

Despite Privacy Policy, RadioShack Customer Data Up for Sale in Auction

RadioShack is trying to auction off its customer data on some 117 million customers as part of its court-supervised bankruptcy.

The data in question, according to a legal challenge (PDF) launched by Texas regulators on Friday and joined by the state of Tennessee on Monday, includes “consumer names, phone numbers, mailing addresses, e-mail addresses, and, where allowed, activity data.”

The states say the sale breaches the 94-year-old chain’s promises to its in-store and online customers that it would not sell their personal identifying information (PII) data.

Read 8 remaining paragraphs | Comments

Malicious User Hides Trojan Links in Cloned Steam Greenlight Pages

A malicious user exploited the somewhat open submission structure of Steam’s Greenlight section over the weekend to briefly hide malware links in cloned versions of legitimate game pages.

Polygon reports that a Steam user going by the handle bluebunny14 posted copies of pages for five games to the Steam’s Greenlight section over the weekend. The cloned pages copied the text, screenshots, and videos of existing Greenlight games, including Melancholy Republic and The Maze, to look exactly like legitimate titles seeking attention in Steam’s fan-voting area. But the cloned versions of the pages also included links to purported “beta version” links for the games that instead linked users to what Polygon calls “a known Trojan.”

After being posted Sunday, the malicious links were reportedly removed by early Monday, and the cloned game pages themselves reportedly removed by Monday afternoon. “Community members alerted us of the situation over the weekend by flagging the content,” said Valve’s Doug Lombardi in a statement. “Our Community Moderators responded quickly by removing all malicious links from the fake Greenlight material and then we banned the submissions. We are taking further steps to deal with anyone involved in posting the links. We’d like to thank those who reported the issue in addition to our Community Moderators, and we encourage everyone to report any suspicious activity in the future by using the flag icon located throughout the Steam Community.”

Read 4 remaining paragraphs | Comments

Google Warns of Unauthorized TLS Certificates Trusted by Almost All OSes [Updated]

In the latest security lapse involving the Internet’s widely used encryption system, Google said unauthorized digital certificates have been issued for several of its domains and warned misissued credentials may be impersonating other unnamed sites as well.

The bogus transport layer security certificates are trusted by all major operating systems and browsers, although a fall-back mechanism known as public key pinning prevented the Chrome and Firefox browsers from accepting those that vouched for the authenticity of Google properties, Google security engineer Adam Langley wrote in a blog post published Monday. The certificates were issued by Egypt-based MCS Holdings, an intermediate certificate authority that operates under the China Internet Network Information Center (CNNIC). The Chinese domain registrar and certificate authority, in turn, is included in root stores for virtually all OSes and browsers.

The issuance of the unauthorized certificates represents a major breach of rules established by certificate authorities and browser makers. Under no conditions are CAs allowed to issue certificates for domains other than those legitimately held by the customer requesting the credential. In early 2012, critics blasted US-based CA Trustwave for doing much the same thing, and Langley noted an example of a France-based CA that has also run afoul of the policy.

Read 7 remaining paragraphs | Comments

Machine Consciousness: Big Data Analytics and the Internet of Things

During my visit to General Electric’s Global Research Centers in San Ramon, California, and Niskayuna, New York, last month, I got what amounts to an end-to-end tour of what GE calls the “Industrial Internet.” The phrase refers to the technologies of cloud computing and the “Internet of Things” applied across a broad swath of GE’s businesses in an effort to squeeze better performance and efficiency from the operations of everything from computer-controlled manufacturing equipment to gas turbine engines and power plants. It’s an ambitious effort that GE is hoping to eventually sell to other companies as a cloud service—branded as Predix.

GE is not alone in trying to harness cloud computing and apply it to the rapidly growing universe of networked systems in energy, manufacturing, health care, and aviation. IBM has its own Internet of Things cloud strategy, and other companies—including SAP, Siemens, and startups such as MachineShop—are hoping to tie their business analytic capabilities to the vast volumes of data generated by machines and sensors. That data could fuel what some have called the next industrial revolution: manufacturing that isn’t just automated, but is driven by data in a way that fundamentally changes how factories work.

Eventually, analytical systems could make decisions about logistics, plant configuration, and other operational details with little human intervention other than creativity, intuition, and fine motor skills. And even in industries where there is no production plant, analytics could make people more efficient by getting them where they need to be at the right time with the right tools.

Read 12 remaining paragraphs | Comments