As users await permanent fixes, researchers help address Android "master key" vulnerabilities

Share this article:
Many Android users still awaiting patches for two dangerous "master key" bugs discovered.
Many Android users still awaiting patches for two dangerous "master key" bugs discovered.

A number of patches are being announced or released for two “master key” Android vulnerabilities discovered back-to-back this month, one which could affect 99 percent of users.

Mobile security vendor Bluebox discovered the initial “master key” vulnerability earlier this month and a second similar “master key” bug was discovered less than a week later by a Chinese individual or group referred to as Android Security Squad.

The way each vulnerability works is a bit different, but the outcome is essentially the same: Malicious users are able to alter the way Android apps work without affecting its signature. This means any changes made to an app will go undetected.  

In a Thursday interview with SCMagazine.com, Bluebox CTO Jeff Forristal made a theoretical example of the Gmail application. A person could manipulate the application and gain access to one's email account, he said, or the hacker could take it a step further and gain complete control of the device.

Forristal said Google, owner and manager of the Android operating system, has addressed the issues and released patches for most authorized Android devices. Those users who have received no update will have to reach out wait for their phone manufacturer or cellular carrier to push a fix.

“To a large extent, Google makes the source code, vendors compile it and carriers release it,” Forristal said, explaining it is a cooperative effort, and even one group can delay or prevent an update release.

Forristal speculated that Google has yet to release a patch for some phones, including their own Nexus, because Android 4.3 is right around the corner.

He meanwhile offered some mobile safety tips for users yet to receive a patch, including only downloading applications from more trustworthy outlets such as Google Play and Amazon.

Forristal also suggested downloading the free Bluebox Security Scanner application on the Google Play store, which determines if a mobile is vulnerable to “master key” flaws and if a malicious application is taking advantage of the weaknesses.

Users more comfortable with the ins and outs of their device and the Android operating system might be interested in downloading ReKey, an application designed by Northeastern University and Duo Security that recognizes the “master key” vulnerability and provides a patch.

Bluebox will go more into exactly how it uncovered the “master key” vulnerability at the Black Hat conference later this month, but Forristal said he initially encountered the bug as part of a separate, yet related investigation.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

President signs Executive Order to improve payment security

President signs Executive Order to improve payment security

President Obama signed an Executive Order at the Consumer Financial Protection Bureau calling for enhanced security measures, including microchips and PINs.

Security, tech firm coalition fights Hikit actors, other advanced groups

Security, tech firm coalition fights Hikit actors, other ...

The coalition began as an effort to stop the spread of the Hikit trojan, previously known for targeting U.S. defense contractors.

Phishing email delivers keylogger malware, also takes screenshots

Phishing email delivers keylogger malware, also takes screenshots

The malware has various features, including the ability to start persistently, take screenshots and bypass user access controls.