Android flaw lets attackers modify apps without breaking signatures

Discussion in 'other security issues & news' started by asr, Jul 3, 2013.

Thread Status:
Not open for further replies.
  1. asr

    asr Registered Member

    Full Read Here: http://www.computerworld.com/s/arti...pps_without_breaking_signatures?taxonomyId=17
     
  2. siljaline

    siljaline Registered Member

  3. J_L

    J_L Registered Member

    So it's a smarter trojan blocked by Google Play. Should I worry about my manufacturer's updates? Or compromised SIM's? Cause I only really care about prevention, which doesn't seem so hard in this case.
     
  4. x942

    x942 Guest

    Yeah as I posted in the duplicate thread This attack vector has been known for a long time now and won't effect 99% of most people. I don't know why these companies spread such FUD. It only effects you if you use third-party markets or apps from unknown providers.
     
  5. ronjor

    ronjor Global Moderator

    Google patches critical Android threat as working exploit is unleashed

    http://arstechnica.com/security/201...droid-threat-as-working-exploit-is-unleashed/
     
  6. siljaline

    siljaline Registered Member

    Google: Critical Android security flaw won't harm most users.
    http://www.cso.com.au/article/514457/google_critical_android_security_flaw_won_t_harm_most_users/

    Determine if your device is affected: https://play.google.com/store/apps/details?id=com.bluebox.labs.onerootscanner
     
  7. Noob

    Noob Registered Member

    Interesting.
     
  8. roger_m

    roger_m Registered Member

    The latest release of Qihoo's 360 Mobile Security protects against this.
     
  9. Hermescomputers

    Hermescomputers Registered Member

    99% of Android's are wide open!

    Hi

    Holala!
    I'm encrypting, I'm complex pass-wording... and now this!

    Uncovering Android Master Key That Makes 99% of Devices Vulnerable
    http://bluebox.com/corporate-blog/bluebox-uncovers-android-master-key/

    Here's a techcrunch articles on it
    http://techcrunch.com/2013/07/04/android-security-hole/

    Proactively here is the scan to check your phone from BlueBox:
    https://play.google.com/store/apps/details?id=com.bluebox.labs.onerootscanner

    The above scanner tells you if your phone is patched or not... and which applications are protected from the scan...

    Now for those who failed the check like me...
    I would recommend you do a Root Check to see if the phone was not rooted by any potential visitor...

    As for all those doing exploits on anything the next step for any exploit on devices is to gain root access...

    You can check if you are rooted with this tool:
    https://play.google.com/store/apps/...GwsMSwxLDEsImNvbS5qb2V5a3JpbS5yb290Y2hlY2siXQ..
     
    Last edited: Jul 12, 2013
  10. SirDrexl

    SirDrexl Registered Member

    Re: 99% of Android's are wide open!

    Maybe that's why Marvin is so depressed.
     
  11. siljaline

    siljaline Registered Member

  12. J_L

    J_L Registered Member

    Re: 99% of Android's are wide open!

    Yay, another duplicate! Overblown issue as usual.
     
  13. Hermescomputers

    Hermescomputers Registered Member

    Re: 99% of Android's are wide open!

    Well, yes... Noted!

    As far as being overblown however take note of the posting of the appropriate tools to demystify the actual impact, which arguably is not entirely clear.

    However as with everything security these days the impact is never entirely clear until something actually happens to you then the impact is brilliantly clear, albeit too late.
     
  14. siljaline

    siljaline Registered Member

  15. lotuseclat79

    lotuseclat79 Registered Member

    Android's very real 'Master Key' vulnerability.

    -- Tom
     
  16. siljaline

    siljaline Registered Member

  17. TheKid7

    TheKid7 Registered Member

    Anatomy of another Android hole - Chinese researchers claim new code verification bypass:
    http://nakedsecurity.sophos.com/201...searchers-claim-new-code-verification-bypass/
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice