furbearingmammal
Super Moderator
With a "potential" or "alleged" security hole of this magnitude, I think reposting the information in the news section is a Good Thing. Thanks CK!
I did. There updates to this story long before it was posted here yet the main topic, which is viewable on the front page still has false information. So how is that jumping the gun?Would be too much for you to update this with correct information
Would it be to much for you to read the thread before jumping the gun?
Because if people read the thread they will see the updates. We dont have an AP style news ticker. And as far as it being old news, the update one here was posted within minutes of Lookpout posting the following:
Update and Clarification of Analysis of Mobile Applications at Blackhat 2010
July 29
This week at Blackhat, we released the first findings from the App Genome Project. Our goal with this research is to help make people aware of the capabilities of mobile apps so that they can be vigilant while downloading.
Mobile applications on all platforms–iPhone, BlackBerry, Android, and Symbian–can potentially gather sensitive data from users and we think it’s important that both developers and users act responsibly. The Android permission model, for example, takes steps to inform users of the capabilities of apps, including what personal data the app could be accessing, thus empowering users to evaluate the apps they download and make good decisions.
During our research, we found series of wallpaper applications in the Android Market are gathering seemingly unnecessary data. The wallpaper applications that we analyzed transmitted several pieces of sensitive data to a server over an unencrypted network connection. The data included the device’s phone number, subscriber identifier (e.g. IMSI), and the currently entered voicemail number on the phone (see below for technical details). While this sort of data collection from a wallpaper application is certainly suspicious, there’s no evidence of malicious behavior.
There have been cases in the past on other mobile platforms where well-intentioned developers are simply over-zealous in their data gathering, without having malicious intent.
The wallpaper apps that we analyzed came from two developers “jackeey,wallpaper” (whose developer name has changed to “callmejack” since we originally released our research) and “IceskYsl@1sters!”. According to androlib, applications from “jackeey,wallpaper” are estimated to have been download 1-4 million times.
Nearly all of the wallpaper applications that we analyzed (more than 80) by “jackeey,wallpaper” and “IceskYsl@1sters!” requested the permission “android.permission.READ_PHONE_STATE” which grants the application access to APIs to access the device’s phone number, subscriber id, and more. Interestingly enough, a few of the wallpaper apps by “IceskYsl@1sters!” did not request access to the phone state permission.
Looking closer at the applications using disassembly tools, we’re able to inspect what’s actually happening inside of the app. We found that apps from both developers shared common code inside of a class named “SyncDeviceInfosService”. Here’s an excerpt from one of the app’s implementation of the class. Because the “getDevice_info” method is quite long, we’ve only included the calls to sensitive APIs.
.method protected getDevice_info()Ljava/lang/String;
...
invoke-virtual {v7}, Landroid/telephony/TelephonyManager;->getDeviceId()Ljava/lang/String;
...
invoke-virtual {v7}, Landroid/telephony/TelephonyManager;->getLine1Number()Ljava/lang/String;
...
invoke-virtual {v8}, Landroid/telephony/TelephonyManager;->getSimSerialNumber()Ljava/lang/String;
...
invoke-virtual {v8}, Landroid/telephony/TelephonyManager;->getSubscriberId()Ljava/lang/String;
...
invoke-virtual {v8}, Landroid/telephony/TelephonyManager;->getVoiceMailNumber()Ljava/lang/String;
As you can see, there is code in the wallpaper applications that accesses sensitive data. It’s important to note that not all applications that access sensitive data actually transmit it off of the device. In order to see what sort of information the wallpaper applications transmit to the internet, we analyzed the network traffic generated by the application. When we used the application, one request in particular stood out, an unencrypted HTTP request to a server named “imnet.us”. Below is the raw request:
POST /api/wallpapers/log/device_info?locale=en-rUS&version_code=422&w=320&h=480&... [Note: irrelevant parameters removed]
Content-Length: 1146
Content-Type: application/x-www-form-urlencoded
Host: Home - Jokes Paltform,funny lift for your
Connection: Keep-Alive
User-Agent: Apache-HttpClient/UNAVAILABLE (java 1.4)
Expect: 100-Continue
uniquely_code=000000000000000&device_info=device_id%3D000000000000000%26device_software_version%3D
null%26build_board%3Dunknown%26build_brand%3Dgeneric%26build_device%3Dgeneric%26build_display%3Dsdk-eng+2.2+FRF42+36942+test-keys%26build_fingerprint%3D
generic%2Fsdk%2Fgeneric%2F%3A2.2%2FFRF42%2F36942%3Aeng%2Ftest-keys%26build_model%3Dsdk%26build_product%3Dsdk%26build_tags%3D
test-keys%26build_time%3D1273720406000%26build_user%3Dandroid-build%26build_type%3Deng%26build_id%3DFRF42%26build_host%3De-honda.mtv.corp.google.com%26build_version_release%3D2.2%26build_version_sdk_int%3D
8%26build_version_incremental%3D36942%26density%3D1.0%26height_pixels%3D480%26scaled_density%3D
1.0%26width_pixels%3D320%26xdpi%3D160.0%26ydpi%3D160.0%26line1_number%3D15555218135%26network_country_iso%3D
us%26network_operator%3D310260%26network_operator_name%3DAndroid%26network_type%3D3%26phone_type%3D
1%26sim_country_iso%3Dus%26sim_operator%3D310260%26sim_operator_name%3DAndroid%26sim_serial_number%3D
89014103211118510720%26sim_state%3D5%26subscriber_id%3D310260000000000%26voice_mail_number%3D
%2B15552175049%26imsi_mcc%3D310%26imsi_mnc%3D260%26total_mem%3D35885056
Decoding the data in the POST request, we can see that several pieces of sensitive data are being sent to a server:
sim_serial_number=89014103211118510720
subscriber_id=310260000000000
line1_number=15555218135
voice_mail_number=+15552175049
While the data this app is accessing is certainly suspicious coming from a wallpaper app, we want to be clear that there is no evidence of malicious behavior. There have been cases in the past where applications are simply a little overzealous in their data gathering practices, but not because of any ill intent.
We’ve been working with Google to investigate these apps and they’re on top of it.
Overall, our goal is to help users and developers alike across all mobile platforms to be responsible and vigilant in ensuring a safe mobile experience.
Update and Clarification of Analysis of Mobile Applications at Blackhat 2010 | The Official Lookout Blog
Personal information...what is everyone hiding? The only thing, and correct me if I'm wrong, that was really sensitive is that it could've stolen your voicemail password if you had entered it as one of your contacts...like *86,,[password]
Personal information...what is everyone hiding? The only thing, and correct me if I'm wrong, that was really sensitive is that it could've stolen your voicemail password if you had entered it as one of your contacts...like *86,,[password]
Really!?!?! your just kidding asking this right?
I consider personal information:
My phone #, email, address (not that its in my phone but the ability is there), friends/family numbers/email, websites visited, passwords, logins, you name it.
Lets take for example a replacement keyboard app. It could theoretically log every keystroke, see my phone number, address, email, the possibilities are endless. A cell phone is way less secure than a pc with a good antivirus and is a hub of personal information with what smart phones can do today.
I did not think to check too closely during all the updates that followed.