unix and linux commands - unix shell scripting

Android Insecurity

 
Thread Tools Search this Thread
# 1  
Old 01-23-2010
Android Insecurity

Late last year, a nefarious banking app was discovered on the Android phone marketplace.  This, I'm afraid, is just the beginning.

Doing some Android phone development recently, I have gotten somehands-on experience with how an application is deployed to the AndroidMarketplace.  One big difference between the Google and Apple mobilesoftware stores is that Apple vets and approves each app before it ismade available for public download.  With Android, anyone who pays the$25 registration can upload an application to the marketplace.

To upload an application, it first must be signed with your own digitalsignature.  This signature need not be certified--you can create oneyourself and it is just as valid as one issued by Verisign.  Signingyour application is the only security requirement that must be metbefore uploading to the marketplace.  The information your submit tocreate your Android developer account is also not reviewed orverified. 

If your application is free, then anyone with a compatible Androidphone can begin downloading and using it.  If the application needs toconnect to the internet, then during the installation the user isnotified "This application has access to the following:  Networkcommunication, full Internet access," to which the user clicks OK toproceed with the install.

There are no alerts about the digital signature coming from untrustedor unknown source.  All applications are implicitly trusted.  MyAndroid phone has 800 Mhz processor with 256MB RAM, a worth addition toany botnet. 

The current protections for mobile applications remind me of web sitesin the mid to late 90s when e-commerce was just starting to get off theground and viruses and botnets weren't daily news (and desktop PCsdidn't have the same power that we now carry in our pocket.)  Peoplejust trusted anything they clicked, and bad guys realized this andquickly developed ways to exploit this blind trust.  Now that cybercrime has become much more savvy and organized, they working feverishlyto exploit this new mobile vector. 

I know mobile apps still have that wow factor, but we have to learnfrom the past and treat all Internet enabled devices as attractivetargets for attack today.  These mobile OSes need to have the sameprotections we apply to desktop PCs.  We should not continue blindlyassuming that the focus of attack is the desktop PC and not mobiledevices, even though they all have similar hardware specs and areconnected to the same Internet.  Otherwise, this is security byobscurity, which does little else but to give us a false sense ofsecurity.

Image
Image

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

9 More Discussions You Might Find Interesting

1. Android

Android (operating system)

From Wikipedia (FYI): (0 Replies)
Discussion started by: Neo
0 Replies

2. Android

Device Names on Android

Hi, I have a program that logs serial port data. In order to do so it requires the full device name in linux (e.g. /dev/ttyUSB0) and a baudrate. Does anyone know how I can find out the device name in the terminal? I am trying to port this application to Android and cant figure it out. ... (22 Replies)
Discussion started by: fedora18
22 Replies

3. Android

My road towards a NEW Android app'...

This thread is about an attempt by me to _build_ an application for the Android platform. This first upload will be more of a blog rather than anything else so here goes. (Apologies for any typos.) Firstly I ought to introduce myself and what I do. My name is Barry Walker and I live in the... (0 Replies)
Discussion started by: wisecracker
0 Replies

4. Android

Basic commands for android!!

Hi, I have a n android phone and just rooted it. I access it using 'terminal Emulator'. I performed many basic linux-like commands in the terminal like rm,ls,df,reboot etc and they are working fine. But many of them are not like man <something>, clear,du etc. Can any of you please help to... (20 Replies)
Discussion started by: shekhar_4_u
20 Replies

5. Red Hat

How to use android App in Linux?

Hi, I want to use android Apps like whats up with my linux pc. Can any one give some steps or way how to do the same ? (1 Reply)
Discussion started by: Priy
1 Replies

6. Solaris

Openindiana + Android permissions

Hi, I use Openindiana with napp-it. I am able to access and modify the zfs folders from windows but not from android. I ve used several apps like ES File Exporer and AnsSMB with no success. I can see the server but when I try to login it complains about wrong credentials. Any help will be very... (5 Replies)
Discussion started by: iliakos
5 Replies

7. Android

Android Scripting Environment: Shell Scripting and Android

I just upgraded to Android 2.2 from 2.1. The GPS issue that was troublesome in 2.1 seems to have been fixed. Some of web browsing seems faster, but it could just be my connection is better today ;) Flash works in some browsers but not very good and it is too slow for Flash apps designed for... (0 Replies)
Discussion started by: Neo
0 Replies

8. Android

Android is Linux (and Java)

In case you did not know, Android 2.1, Éclair, runs on the 2.6.29 Linux kernel. However, the user space it is built atop Dalvik, a Google-designed custom JVM (Java virtual machine). This is pretty interesting, when you think about it. The core of Android is the linux kernel, and the standard... (5 Replies)
Discussion started by: Neo
5 Replies

9. Android

Example Linux Commands on Android

In case you are interested, here is a partial list of linux-like commands on Android OS: /sbin adbd devmgr recovery dfta init dfta.sh fat.format redbend_ua /system/bin (partial list) sh date netstat mount umount (0 Replies)
Discussion started by: Neo
0 Replies
Login or Register to Ask a Question