|
Home | Switchboard | Unix Administration | Red Hat | TCP/IP Networks | Neoliberalism | Toxic Managers |
(slightly skeptical) Educational society promoting "Back to basics" movement against IT overcomplexity and bastardization of classic Unix |
|
|
If you think of your smartphone as just a phone, rather than a very powerful mini-computer that happens to be able to make phone calls, think again. And the OS used on them, such as Android does not have a stellar security record. Also any security system is only as good as its weakest link, and humans are the weakest link.
Now smartphone is the greatest spying machine invented by mankind. And like Pc and tablet that you own it is spying on you in several areas, not limited to your shopping preferences (Google has this delusional idea that if they know more about you, you will click their ads more often ;-). What banal evil works in the hearts of men? What sites did you visited? What's on your Google Calendar? In Gmail inbox? What applications you downloaded and/or bought? The inquiring people from Google and three letter agencies want to know!
At the same time the amount of sensitive data many people store on their smartphones is truly staggering. In Eastern Europe smartphone often are used for direct access to bank accounts. As passwords are difficult to type the smartphone stores passwords to Facebook, Twitter, and our email accounts. The phone numbers and email addresses of all our friends and colleagues are readily available in the contacts directory and are open for grabs from Google (who provides backup), you telecom provider (which also offer a backup), government and malware on your phone.
Think about consequences if a thief gets his hands on all that data... And smartphone itself and smartphone data in particular aren’t especially hard to steal. Moreover smartphones are often simply lost. If one is not protected by password, then all data are exposed. Annually, thousands of smartphones are left in the backseat of a taxi, in Walmart and other stores, slip out the pocket when you are sitting somewhere, left in the seat pocket of a plane, in the bar, by the hotel pool, or on a conference table after a meeting.
But the most common security threat for Android devices is compromise via Windows-style infection of your phone OS by some malware. Often downloaded and installed on our phone by unsuspecting you. Android malware is a reality. Google does not release the number of infected smartphones, but it is expected to be in millions. Rooted phones are especially susceptible, as they are owned by people who try more things on the phone then an average Joe User.
Recently (2013) there was information about a botnet on Android phones. That means that Google fell under the spell of "Windows curse". And there is no easy way out of this trap.
Of course any user can easily wipe out their smartphone via "return to factory settings" operation available, but few do that unless the phone badly malfunction. The problem is that there is no clear segregation between user data and program in Android, like there is none in Unix. And wipe out of programs often means wipe out of all you data. Actually contacts are the easiest part to save by a user, as there is an export operation in Android contacts application.
Android made several things right
What mistakes Android developers did
Updates are extremely weak spot of Android. Here Microsoft generally wipes the floor with Android developers. In comparison with Android, Windows 8 update process works like a clock. You can complain about quantity and quality, but there is no questions that in Windows patching mechanism is pretty robust and well debugged. Of course it can be hijacked, but that is mainly domain of three latter agencies. Parches are provided for Windows for free by Microsoft itself.
In Android this task is offloaded to the vendors. Google does not provide a patching framework and does not provide patches. Everything need to be done via vendors. And vendors are simply not interested. Some are better then others but generally with the average two-three year device update cycle there is a strong tendency to cut corners in order to save costs. And carries do not want to subsidize this process, unless absolutely necessary.
Sad status of Android updates by many Android smartphone and tablets vendors such as produced by Samsung has been widely criticized by consumer groups and the technology media. Backwards compatibility is a problem for other smartphone OSes, but it's worst on Android.
Some commentators have noted that the industry has a financial incentive not to update their devices, as the lack of updates for existing devices speed up the purchase of newer ones. Kind of "accelerated obsolesce" play... As the Guardian noted that the bizarre complicated method of distribution for updates is mainly due to the fact that manufacturers and carriers have great difficulties to cope with the extreme diversity of Android phones hardware. Acceptance testing it to make sure everything works on the phone after the update is an expensive and slow process. Cases when a perfectly good phone became unstable after the update from 4.0.x to 4.1.x are plenty.
In 2011, Google partnered with a number of industry players to announce an "Android Update Alliance", pledging to deliver timely updates for every device for 18 months after its release. As of 2013, this alliance has never been mentioned since (Ars Technica). The companies were happy to make noises about co-operating to make the situation better, they had no real incentives to do so.
A Nathan Eddy noted (Android Security Threats Rise, Online Banking Malware Jumps, EWeek, Aug 8, 2013)
"Due to the fractured nature of the Android network, it is very difficult for patches to reach all users in an effective timeframe. In some cases, users will never get patches as vendors leave their customers at risk of attack," JD Sherry, vice president of technology and solutions at Trend Micro, said in a statement. "Until we have the same urgency to protect mobile devices as we have for protecting PCs, this very real threat will continue to grow rapidly. At the rate this malware is accelerating–almost exponentially–we appear to be reaching a critical mass. To fight this, Android users need to take great care when using their devices and take the simple, but effective, step of adding security software to all mobile devices." - See more at: http://www.eweek.com/small-business/android-security-threats-rise-online-banking-malware-jumps#sthash.iIk4jLdy.dpuf"Due to the fractured nature of the Android network, it is very difficult for patches to reach all users in an effective timeframe. In some cases, users will never get patches as vendors leave their customers at risk of attack," JD Sherry, vice president of technology and solutions at Trend Micro, said in a statement.
"Until we have the same urgency to protect mobile devices as we have for protecting PCs, this very real threat will continue to grow rapidly. At the rate this malware is accelerating–almost exponentially–we appear to be reaching a critical mass. To fight this, Android users need to take great care when using their devices and take the simple, but effective, step of adding security software to all mobile devices."
Here is one apt comment from Arstechnica forum:
Eventually the lack of security updates *is* going become an issue - at which point the whole ecosystem is going to be in serious trouble. Google is clearly buying into the "your phone is your wallet" metaphor - and "your phone is your wallet that practically anyone can steal from" isn't nearly as appealing a notion ;-)
Many users resent absence of root access to their devices and consider this to be an attempt to replicate Apple-style ecosystem: completely closed ecosystem that has implicit purpose to extract more money from users. I myself consider this situation unacceptable as you can't fully backup and restore the device yourselves. The only option availble for users is to restore the device to factory defaults. Which is better then nothing but far cry from modern OS standard capabilities.
Going to factory defaults for obvious reasons is "the last resort" solution although you can adapt to it backing up "user space" and reinstalling applications. The latter can be scripted. But like any situation with the severe restriction on user behavior it create similar to "Apple hate" wave of "Google hate" among advanced users.
As users are not allowed access to root, Android users have became hostages of malware developers. Backup and restore on android devices are primitive and are severely handicapped in comparison with Linux or Windows.
So restrictions to root access does not help unsophisticated users, who fall victims of malware anyway, and really handicap sophisticated users limiting their ability to backup and restore the system and fight malware. That's why rooting Android devices instead of hacker entertainment became a necessity for sophisticated users.
"Windows effect" means that as soon as OS became dominant in particular segment of the market, it became favorite target for malware attacks and hacking. At this point it became difficult to "defend the castle" independently of its technical qualities (not that Windows has a good security architecture). The rule 2:1 of regular warfare probably is applicable here: if the number of fighters on one side is at least twice larger then the amount of fighters on the other side, this numerically inferior side is in trouble.
Like for Microsoft in the past Google primary objective of initial Android development was gaining market share, security be damned. In other words Google from the beginning sold its soul to the devil ;-).
And if the major contingent of a complex and powerful OS are unsophisticated users, then the task of providing good security is really formidable and requires new architectural vision, and innovative solutions. Android make a few steps in a right direction, but generally it is bound by its Unix origin. The initial architectural compromises were structured for devices with very restricted computational capabilities. Then the situation drastically changes and devices became powerful enough to run full version of Unix. This is kind of replay of similar historical relationship between DOS and Unix.
As for really innovative solutions, Android has none. Moreover it is generally understood by users much worse then Windows 8, which creates additional security risks. Recently Dr. Web found a botnet that existed on Android smartphones. That information needs to be independently verifies buy it is not surprising to have all types of malware developed for Windows migrated to Android.
Google does not manually check applications before they get to the Google Play Store. Automatic checks are insufficient barrier for malware. In 2012 company removed nearly 60K malicious applications. Many Android applications are of dubious quality and/or contain spyware.
"The Federal Trade Commission announced on Thursday that it settled with the maker of 'Brightest Flashlight Free,' a popular Android mobile application, over charges that the company used deceptive advertising to collect location and device information from Android owners. Recently the top downloaded Android application was busted by FTC as spyware:
The FTC says the company failed to disclose wanton harvesting and sharing of customers' locations and mobile device identities with third parties. Brightest Flashlight Free, which allows Android owners to use their phone as a flashlight, is a top download from Google Play, the main Android marketplace.
Statistics from the site indicate that it has been downloaded more than one million times with an overall rating of 4.8 out of 5 stars.
The application, which is available for free, displays mobile advertisements on the devices it is installed on.
However, the device also harvested a wide range of data from Android phones which was shared with advertisers, including what the FTC describes as 'precise geolocation along with persistent device identifiers.'
As part of the settlement with the FTC, Goldenshores is ordered to change its advertisements and in-app disclosures to make explicit any collection of geolocation information, how it is or may be used, the reason for collecting location information and which third parties that data is shared with."
The problem with Android is that if your phone or tablet is "owned", you can do nothing other then restore it to factory defaults as you do not have access to root.
If the major contingent of a complex and powerful OS are unsophisticated users, then the task of providing good security is really formidable and requires new architectural vision |
Some promising security approaches within the framework of classic Unix kernel design and some outside it are available, but were never used. For example, it would cost almost nothing (probably less then $5 per tablet) to provide all Android tablets with hardware-based token, implementing SecurID style authentication scheme. That was not done, and this fact enables banking fraud. So, if you bank does not support SecurID style authentication, you better do not access its Web portal from Android devices. Some banks try compensate for this sending SMC messages which initiate smart token functionality, but if the your smartphone or tablet is owned by some type of powerful malware this might be not enough. But it is definitely better then nothing.
In other words in its current form Android is unsecure for Web banking. As simple as that. Without such a token, interception of the passwords means the compromise of the account.
As Android kernel was based on Linux kernel 2.6 (and now 3.0) some vectors of attacks are related to this heritage. For example linux kernel like any classic Unix kernel has all-powerful root and underpowered regular user accounts. That means that process which, for example, needs to access low port (below 1024) need to became root at least on temporary basis to perform this part of the task.
In a similar way the ability to access Web and Web-based search engines expose Android user to malicious sites. Some of which can be created specifically to target popular smartphones such as Samsung Galaxy S III.
Being open source also does not help in this regard. It actually hurts as instead of disassembly you can just study the available codebase and try to invent some nasty exploit that allows you to become root. So in Android you from the beginning has capability which in Windows world have only three letter agencies and employees of large corporations which get Windows source code.
Instead of analyzing code trying to find exploit yourself you can buy a zero day exploit on the black market. Such a market exists for the most popular devices, and Android is no exception. Possession of not yet patched zero day exploit (and Android vendors are slow in providing patches) means that you are in, if the user replicates the conditions necessary for this exploit, for example access a certain ("inflected") Web site. As we discussed above, the problems with patching of Android are severe due to decentralization of the process.
Around 2012 Google realizes the situation with Android security is bad and can get worse. That's why it put in the kernel SE Linux framework. It's already exist in Android 4.2.2 but works in permissive mode. It is badly needed, although I would prefer Google to support AppArmor instead. SELinux is difficult to configure and that means troubles for both Android developers and Android users. AppArmor is a more elegant, more understandable and more robust way to provide SE-linux style functionality.
Any application that runs on the Android operating system must be signed. Android uses the certificate of individual developers in order to identify them and establish trust relationships among the various applications running in the operating system. The operating system does not allow an unsigned application to execute. At the same time, the use of a central certification authority to sign the certificate is not required, and Android will happily run any application that has been signed with a self-signed certificate.
The unlocking (rooting) and "hackability" of smartphones and tablets remains a source of great tension between the community and industry.
Android applications run in a sandbox, an isolated area of the system that does not have access to the rest of the system's resources, unless access permissions are explicitly granted by the user when the application is installed. Before installing an application, the Play Store displays all required permissions: a game may need to enable vibration or save data to an SD card, for example, but does not need the ability to read SMS messages or access the phonebook. After reviewing these permissions, the user can choose to accept or refuse them, installing the application only if they accept.
This scheme is deeply defective and does not work for unsophisticated users. They are by definition are too naive to understand consequences of their actions. Theoretically both the sandboxing and permissions system lessens the impact of vulnerabilities and bugs in applications, but huge percentage of unsophisticated users creates an effect of "a second Windows". Moreover the developer confusion and limited documentation has resulted in applications routinely requesting unnecessary permissions and users happily granting them, reducing security to a minimum.
In a way Google proved to be completely incompetent to solve this difficult and important problem and decided just to "go with the flow". As a result Google by-and-large replicated the situation with malware that exists on Windows on a new platform.
Security industry already sensed the opportunity and the necessity to protect Android users from design defects inherent in attempt to provide powerful OS for unsophisticated users and from growing spectrum of Android malware. We can expect that generally there is will be a "security tax" on Android users, similar to "Windows insecurity tax."
Several Windows AV products vendors have already released antivirus software for Android devices. They need to run as root as otherwise sandboxing also applies to such applications
As Android became the mobile equivalent of Windows for hackers, there are several types of Android malware in the wild, with some closely resembling Windows malware.
Premium service abuse. It is probably the most common type of Android malware, where text messages are sent from infected phones to premium-rate telephone numbers without the consent or even knowledge of the user.
F-Secure said PremiumSMS, an SMS Trojan family with 21 new variants, was identified in the fourth quarter of 2012. "The users will be completely unaware of these activities until the charges appear on their bills," the firm said.(crn.com)
F-Secure also documented two new information-stealing Trojans. Android/InfoStealer.A masquerades as a legitimate application, but steals device details, the victim's email address phone number and location to a remote MySQL server. Android/MaleBook.A has similar functionality, collecting more device-specific information and sending it to a remote server. Both Trojans surfaced in Asia and are connected to aggressive advertising services.
Google engineers were caught without pants by recent revelation about banking Trojans on Android. They have argued that the malware and virus threat on Android is being exaggerated by security companies for commercial gains. They accused the security industry of playing on fears to sell virus protection software to users. Which is of course right take ;-). Google maintains that dangerous malware on Android is actually extremely rare (but then why they never disclose the data about the number of infections?). But the can't deny that it exists and is growing.
Google currently uses their Google Bouncer malware scanner to scan the Google Play store apps. It is intended to flag up suspicious apps and warn users of any potential issues with an application before they download it. Still there have been cases when Google has allowed infected apps into their store. So the fact that the majority of apps on Google Play are reasonably safe means nothing. But existence of malware in Google Play store serves and an indication Google vulnerability and impotence of Android designers to solve this problem. Now they need to confront the threat.
Android 4.1 (Jelly Bean) has enhanced security features, including a malware scanner built into the system, which works in combination with Google Play. It can scan apps installed from third party sources as well. There is also an alert system which notifies the user when an app tries to send a premium-rate text message, blocking the message unless the user explicitly authorizes it.
Android 4.2.2 and forthcoming version 4.4 includes SELinux in the kernel. It might be too little too late as ecosystem is pretty mature and bringing all the applications under SELinux umbrella is a formidable task.
The Android operating system remains a prime target for cyber-criminals, as Android’s user base expands but security remains weak. - See more at: http://www.eweek.com/small-business/android-security-threats-rise-online-banking-malware-jumps#sthash.iIk4jLdy.dpuf
The Android operating system remains a prime target for cyber-criminals, as Android’s user base expands but security remains weak. - See more at: http://www.eweek.com/small-business/android-security-threats-rise-online-banking-malware-jumps#sthash.iIk4jLdy.dpufThe Android operating system remains a prime target for cyber-criminals, as Android’s user base expands but security remains weak. Trend Micro (not a disinterested party ;-) projected that at the end of the year there will be around a million malicious and high-risk Android apps.
Trend Micro projected.Smartphones and tablets are increasingly used to access banking portals. According to the Federal Reserve Board report “Consumers and Mobile Financial Services 2013,” in the United States “48 percent of smartphone owners have used mobile banking in the past 12 months, up from 42 percent in December 2011.” Of that 48 percent,
“Nearly half of mobile banking users appear to be using mobile apps to conduct their banking transactions, as 49 percent have installed such applications on their phones.”
Eset revealed that a bad app it discovered in September 2013 -- Hesperbot -- is actually a mobile banking Trojan along the lines of Zeus and SpyEye, but with significant implementation differences that make it a new malware family (Computerworld, Sept. 9, 2013)
According to F-secure (crn.com)
A banking Trojan believed to have stolen millions from victims' accounts also has surfaced on Android devices. The Carberp Trojan steals online banking credentials or usernames and passwords for other websites.
The mobile version, called Citmo.A, monitors incoming SMS and steals the mobile Transaction Authentication Number (mTAN) that banks send to customers to validate an online banking transaction. The cybercriminals behind the malware then use the stolen mTAN to drain victims' accounts, F-Secure said.
The technique is similar to the Zeus Man in the Mobile (Mitmo), an extension of the Windows-based Zeus Trojan, which records the mTAN number sent to Android users. The mobile version of Zeus surfaced in 2010. To get the malware on the user's device, the malware writers inject a phony security notice into the banking session asking the customer for their phone model and number. An SMS link is sent to the victim adding the malware component to the device, F-Secure said.
According to McAfee in June 2013 an Android banking Trojan that replaces popular South Korean banking apps with malware was found in the wild.
This threat steals sensitive information and banking credentials to perform financial fraud. Like other mobile threats in South Korea (like Smsilence), this one uses “smishing” (SMS phishing) attacks that employ fake messages from the Financial Services Commission asking users to install new antimalware protection. However, when the user clicks on the shortened URL, what it is being downloaded is in fact malware, which masquerades as the Google Play app, using the same icon (but without a label).
If the victim executes the malware, it checks whether any of the following South Korean banking apps are installed: KB Kookmin Card (from the biggest credit card company in the country), IBK (Industrial Bank of Korea), Shinhan Bank, Nonghyup Bank, Woori Bank, SC First Bank (currently not available in Google Play), Hana Bank and KFCC (Korean Federation of Community Credit Cooperatives). If the malware finds one or more of them, it whether the device is rooted–to perform a silent uninstall of the banking application by executing the following commands with root (superuser) privileges:
- mount -o remount rw /data (remount the data partition as read/write)
- chmod 777 /data/app/<package_name_banking_app>.apk (changes permissions of APK file)
- pm uninstall <package_name_banking_app> (silently removes the application)
If the user does not have the device rooted (the su binary is not present), the fake Google Play app asks to uninstall the legitimate banking app and, in exchange, offers the installation of another app (even if the user already granted root privileges) with the same icon but requesting very suspicious permissions:
Android smartphones are very powerful devices and abuse of those devices capabilities both by the major players such as Google, Facebook, etc for their private gain and government, are serious concerns.
Stamrtphones have the ability to record the location of Wi-Fi access points, encountered as phone users move around, to build databases containing the physical locations of hundreds of millions of such access points. These databases form electronic maps to locate smartphones, allowing them to run apps like Foursquare, Google Latitude, Facebook Places, and to deliver location-based ads. Third party monitoring software such as TaintDroid, an academic research-funded project, can, in some cases, detect when personal information is being sent from applications to remote servers.
Recently another source of security problems for Android was revealed via publication of some materials about Prism program by Snowden. That undermines confidence in the platform as there is no guarantee that all your voice and data streams are not written on some remote NSA server and, adding insult to injury, not without Google help. That violates the idea of "no arbitrary searches", which is a cornerstone of Western law system.
That does not increase the confidence about the platform, but two other major platforms (iPads and Windows 8 based tablets) suffer from the same problem. all can contain NSA backdoors and Skype monitoring tools installed without user consent. See Cloud providers as intelligence collection hubs
Those activities raise question of human rights. According to the article Human rights in the United Kingdom(Wikipedia)
No arbitrary searches or seizures
Protection against arbitrary searches and seizures overlaps with the rights to liberty, privacy and natural justice. In English law, the right to be free of arbitrary searches and seizures is found mainly in the legislation regulating the powers of the police to conduct searches and take evidence. Therefore, under the Police and Criminal Evidence Act 1984, a constable's right to stop and search persons and vehicles is limited by section 2, as are the powers of a Justice of the Peace to authorise the entry and search of premises. In addition, section 60 of the Criminal Justice and Public Order Act 1994 allows a senior police officer to authorise all police officers in a locality to stop and search any pedestrian or vehicle where the officer has grounds for believing that the individual is carrying an 'offensive weapon' or a 'dangerous instrument'. In 1998 this legislation was extended to allow the officer to require the person to remove clothing worn for the purpose of concealing his identity, and to confiscate that article of clothing. Special extended powers also apply in the case of terrorist suspects.
In civil cases, a judge may grant an Anton Piller order authorising the search of premises and seizure of evidence without prior warning. The order's purpose is to prevent the destruction of incriminating evidence, particularly in cases of alleged intellectual property infringement (see the French Saisie-contrefaēon, which has the same purpose).
Right to respect for private and family life
An individual's right to respect for his or her private or family life is protected insofar as the activity being pursued has not been outlawed or restricted by the state. In that respect, the fact that an individual has consented to the performance of an act which would otherwise be unlawful does not change the status of the act; thus, in a case involving acts of sado-masochism committed in private between two consenting adults, the House of Lords held that the victim's consent to the acts did not afford their author a defence to charges under the Offences against the Person Act 1861.[13]
Similarly, an individual is free to make choices as to his private life, for example in pursuing homosexual relationships, but the law may not in certain circumstances intervene to ensure that his status and rights are not affected as a result of these choices. In R v. Ministry of Defence, ex p. Smith the Court of Appeal upheld the Ministry of Defence's policy not to admit homosexuals to the armed forces;[14] the claimants later brought a case before the European Court of Human Rights which found violations of Articles 8 and 13. The Court of Appeal held in another case that it was reasonable for the parents of a child up for adoption to refuse consent to adoption on the ground that the proposed adopter is a lesbian.[15]
The right to respect for family life is qualified by the broad principle that the welfare of the child is paramount and parental rights must take second place. As expressed by Lord Scarman, "parental rights are derived from parental duty and exist only so long as they are needed for the protection of the person and property of the child", and by Lord Fraser, "parental rights to control a child do not exist for the benefit of the parent".[16] The effect of this is to allow state intervention in family life where justified in the interests of the child in question, and the Children Act 1989 gives effect to this by providing a basis on which decisions relating to a child's welfare are made. Section 1 of the Act provides that a court must, when taking a decision with regard to a child, take into account the child's wishes and feelings.
There is no general right to marry.[17]
|
||||
Bulletin | Latest | Past week | Past month |
|
|
Jul 19, 2021 | www.zerohedge.com
Southfront reports that an Israeli company's spyware was used in attempted and successful hacks of 37 smartphones belonging to journalists, government officials and human rights activists around the world, according to an investigation by 17 media organizations, published on July 18th.
Unmute Fullscreen Pause Up Nexthttps://imasdk.googleapis.com/js/core/bridge3.472.0_en.html#goog_621104237 12 Retailers Where Plastic Bags May Disappear Soon NOW PLAYING MLB All-Star Game: Best Home Run Props To Target UP NEXT Boeing Finds Flaws in 787 Dreamliners, Cuts Delivery Target Big Tech, Earnings, Meme Stock Momentum – On TheStreet Monday Target, Walgreens close early due to thefts in California stores Rose McGowan supports Britney Spears' over conservatorship Rose McGowan is "brutally angry" about Britney Spears' conservatorship How To Check if You're Actually Getting a Good Deal on Prime Day
One of the organizations, The Washington Post, said the Pegasus spyware licensed by Israel-based NSO Group also was used to target phones belonging to two women close to Jamal Khashoggi, a Post columnist murdered at a Saudi consulate in Turkey in 2018.
One of them was his fiancee, and she and the other woman were targeted both before and after his death.
The Guardian, another of the media outlets, said the investigation suggested "widespread and continuing abuse" of NSO's hacking software , described as malware that infects smartphones to enable the extraction of messages, photos and emails; record calls; and secretly activate microphones.
The investigation highlights widespread and continuing abuse of NSO's hacking spyware called 'Pegasus' which the company confirms is only intended for use against terrorist groups, drug and human traffickers, and criminals.
Pegasus is a very advanced malware that infects iOS and Android devices to allow operators of the spyware to copy messages, photos, calls and other data, including secretly activate microphones and cameras.
Based on the investigation, the leak contains a list of 50,000 phone numbers that have been identified as those of people of interest by clients of NSO since 2016.
The list includes many close family members of one country's ruler, suggesting he might have instructed the country's intelligence agencies to explore the possibility of tracking and spying on their own relatives.
anti-bolshevik 8 hours ago (Edited)Southern_Boy 10 hours ago (Edited) remove linkTwo articles from Motherboard Vice:
Is Israel EXEMPT from the ' rules-based order ' that Biden / Blinken / Yellen constantly affirm?
Any incoming Sanctions? Any Treasury asset-seziures?
NSO Group Impersonated Facebook to Help Clients Hack Targets May 20, 2020
Motherboard uncovered more evidence that NSO Group ran hacking infrastructure in the United States.
A former NSO employee provided Motherboard with the IP address of a server setup to infect phones with NSO's Pegasus hacking tool. Motherboard granted the source anonymity to protect them from retaliation from the company.
Amazon Shuts Down NSO Group Infrastructure July 19, 2021
The move comes as activist and media organizations publish new findings on the Israeli surveillance vendor.
Amazon has previously remained silent on NSO using its infrastructure . In May 2020 when Motherboard uncovered evidence that NSO had used Amazon infrastructure to deliver malware , Amazon did not respond to a request for comment asking if NSO had violated Amazon's terms of service.
MASTER OF UNIVERSE 11 hours agoThe licensor of software is not the user of the software. An Israeli company developed it and may have used it.
In weapons terms, an Israeli company was the arms developer.
However, there are the licensees and users of the software. The factions and individuals who actually used this weapon of war and political coercion.
In weapons terms, there are others, like the US and other country intelligence communities who will be the ones who pulled the trigger.
The "trigger pullers include the Bolshevik Democrat party and the Biden campaign, which used it to control citizens through intelligence gathering (remember Judge Roberts?) and extract political donations from corporations and rich individuals. Don't forget the Globalist GOP RINOs and Tech monopolists, who have used this weapon to control and subvert anyone that they need to subjugate.
Bye bye Apple, Xiomi and Google Android. You just lost your market of brainwashed sheep for new mobile phones. Even the unwashed Joe Six-Packs of this world now know they are being manipulated with the phones that are so expensive.
WorkingClassMan 10 hours agoI've spent many years studying Experimental Psychology & Personality Theory and can honestly state that malware can't determine appropriate behavioural signals intelligence enough to act responsibly, or judiciously.
Algos are dependent upon Behavioural Science & human analytics. They are crude tools that employ hit & miss techniques that hardly ever work accurately.
Israeli intelligence tries to look state of the art, but they are just as dimwitted as the CIA.
NAV 10 hours ago remove linkThey might be dimwitted and hamfisted but like an elephant with a lobotomy they can still do a lot of damage flailing around. Worst part about it is them not caring about the consequences.
2banana 12 hours ago (Edited)It's amazing how the "dimwits" control the entire apparatus of the most powerful Empire in the world and the entire world media.
gregga777 12 hours ago (Edited)It's not just some politicians and journalists.
It's everyone.
Your phone spys on you in every possible way.
Pegasus is a very advanced malware that infects iOS and Android devices to allow operators of the spyware to copy messages, photos, calls and other data, including secretly activate microphones and cameras.
truth or go home 12 hours agoIt's been widely for at least a decade that carrying a smart phone is really like wiring oneself up for 24/7/365 audio and/or video surveillance. They only have themselves to blame if they've been spied upon by the world's so-called secret intelligence agencies.
[Ed. The next time in a crowded public space, turn on Wi-Fi and count the number of unlocked phones under the "Other Networks" menu.]
philipat 11 hours ago remove linkIf you have no phone, and no facebook, then you are likely immune from prosecution. My neighbor the Fed agent told me 10 years ago that these two sources are 90% of every investigation. That number has only gone up. They track you with it, they find out your contacts with it. They find out your secrets with it. Just try to get either of those things anonymously. You can't.
Ura Bonehead PREMIUM 7 hours agoLand of the Free....
Steeley 4 hours ago'truth or go home', 'having no Facebook' doesn't help you as FB secures the same information via data-sharing arrangements with any number of apps you may download, that came on your phone, or are embedded deep on your phone. Just a fact.
E5 10 hours agoA friend that lives in Pahrump, NV reports that every time he crosses into California a smart phone Covid Health Tracking App activates and he starts getting notifications. Can't turn it off or find where it resides. When he crosses back into Nevada it stops.
zzmop 9 hours ago (Edited)"After checking their claims, we firmly deny the false allegations made in their report,"
Really? So if 99 claims are true and one false? Never did they say there was truth to the accusation that they hacked phones.
If you are going to commit a crime I suppose you want to "issue a statement" that you didn't. I guess we have to ask them 2 more times: then it is a rule that you must tell all. No minion can resist the same question three times.
eatapeach 9 hours agoKeyword -'Israeli', Not Russian, Israeli, Not 'Russian hackers', Israeli hackers
consistentliving PREMIUM 7 hours agoThis is old news. Congresswoman Jane Harman was all for spying/eavesdropping until she got busted selling her power to Israel, LOL.
vova_3.2018 10 hours agoNot USA fake paper pushers but Mexican journalists deserve mention here
Revealed: murdered journalist's number selected by Mexican NSO client
not just journalists either (i know SLATE but hey) https://slate.com/technology/2019/09/mit-media-lab-jeffrey-epstein-joi-ito-moral-rot.html
wizteknet 10 hours agoA smart phone is a spying device .....
Spying & .... Israeli cybersecurity firm "NSO Group" has been selling surveillance software Pegasus, enabling the murder of dissident journalist.
Snowden: Israeli Spyware Used By Governments to Pursue Journalists Targeted for Assassination
https://www.mintpressnews.com/snowden-israeli-spyware-used-by-governments-to-pursue-journalists-targeted-for-assassination/251612/Israel: Snowden accuses Israeli cybersecurity firm of enabling Khashoggi murder
https://www.youtube.com/watch?v=_LeOt4HCI-MIsraeli cybersecurity firm "NSO Group" Which Sold Pegasus Spyware, paid Biden's political advisers in SKDKnickerbocker consulting firm.
https://sputniknews.com/world/202107191083412056-biden-advisers-consulting-firm-got-paid-by-israeli-nso-group-which-sold-pegasus-spyware-report/Israel doesn't respect human rights!. Israel has been killing defenseless people in Palestine for more than 50 years. The sad thing is that US support these genocidal sick sycophats.
vova_3.2018 9 hours ago (Edited)Where's a list of infected software?
Steeley 4 hours agoWhere's a list of infected software?
If they take yr phone under control they'd have access to everything & then they can use the info against you or anybody else in the info.
https://www.youtube.com/watch?v=iuBuyv6kUKIIsraeli spy-wear "Candiru" works a little bet different than Pegasus but is also used to hack & track journalists and activists.
https://www.youtube.com/watch?v=nWEJS0f6P6kThe magic number of "6 million" will be the Get out of Jail Card once again.
And, these idiots keep preaching about the great risk China poses...
Kugelhagel 12 hours ago (Edited)Embedded in the OS...
HippieHaulers 11 hours agoIs that article an attempt to get some sympathy for "politicians", "journalists" and "activists"? Try again.
WhiteCulture 7 hours ago (Edited)Exactly. Don't forget Kashogi was CIA. And they're using another asset (Snowden) to roll this out. This story stinks.
TheInformed 7 hours agoI installed Nice Systems onto 600 desk tops in 2003 at 3 separate call centers, a call monitoring and a PC, mainframe CICS, or email, screen scrape capability. When the call audio was recorded we also captured whatever was on the screen. No doubt the government has been doing this on our phones and all personal computers for over a decade.
two hoots 10 hours ago (Edited)Your example shows that people are dumb, it's not evidence of some grand 'government backdoor' conspiracy. Don't conflate the two.
Globalist Overlord 12 hours agoForget the petty herd/individual surveillance, this is a "super power" tool for investment opportunities, negotiation advantage, strategic decisions, military/covert decisions, etc. you can be sure that the most improved (undisclosed) versions are in use in the usual suspect country. Likely spying on the spy's that bought the software from them. These are those steps beyond Nietzsche's amoral supra-man.
tunetopper 12 hours agoWhitney Webb was writing about this in 2018.
Snowden: Israeli Spyware Used By Governments to Pursue Journalists Targeted for Assassination
Occams_Razor_Trader 11 hours agoIf Pegasus is used against Human Traffic-ers, then why didnt they get Jeffrey Epstein earlier?
RasinResin 11 hours agoWhy 'get' people when you can 'use' these people ........................?
CryptoingTheLightFantastic 11 hours agoI use to be in IT and worked in association with Radcom. Now you may ask who is that? They are the Israeli company that is truly behind all monitoring and spying of your phones in America
EVIL incarnate
donebydoug 11 hours ago"Reuters' spokesman Dave Moran said, "Journalists must be allowed to report the news in the public interest without fear of harassment or harm, wherever they are. We are aware of the report and are looking into the matter."
I love the sanctimonious clutching of pearls, wringing of hands, and bleating from the purveyors of CCP propaganda, woketardness, and globalism whenever the velvet hand that feeds them punishes them with a throat punch instead.
Watt Supremacist 12 hours agoJournalists can't be spies, right? That would never happen.
nowhereman 11 hours agoYes but do the people working for Reuters know all that?
Grumbleduke 11 hours agoJust look at the signature on your paycheck.
Enraged 10 hours agothey're in the news business - of course they don't!
You know the adage "when your livelihood depends on not knowing" or something....
Max21c 10 hours ago (Edited)Listening in on calls is a distraction story by the propaganda media.
The real story is the blackmailing of politicians, judges, corporate executives, etc. for many years by the intelligence agencies with tapes of them with underage girls and boys. This was included in the Maxwell/Esptein story.
These people are compromised, which is the reason for the strange decisions they make, as they support the globalist elite.
There is no reason to spy on journalists, as they are part of the intelligence agency operations.
Wayoutwilly 12 hours ago remove linkThere is no reason to spy on journalists, as they are part of the intelligence agency operations.
True the press are either spies or puppets and vassals of Big Brother and the secret police. They're all mostly agents of the Ministry of Truth. But sometimes they get the weather report right.
Brushy 11 hours agoBet they have sh!t on Roberts, Kavanaugh and Barrett too.
Dis-obey 10 hours ago remove linkWait a minute, you mean the tracking spy device that you carry around and put all of your personal information on is actually tracking and spying on you?!!
Yog Soggoth 10 hours agoThey have data on everyone but not enough eyes to look at everyone all the time. So when you get flagged then they can open all the data on your device to investigate u.
ay_arrowLawn.Dart 10 hours agoKhashoggi was not a journalist. While interesting, this is not the story of the year.
Max21c 10 hours agoAlmost every intellegence agent is a writer of some kind.
The 3rd Dimentia 9 hours agoNOS is just one company out of many. They have the willing complicity of the security services of other countries including the CIA, FBI, NSA, DOJ, in the USA and similar per UK. Secret police use these special contractors to help them engage in crimes and criminal activities and it does not matter whether the secret police use a foreign or domestic secret police agency or contractor as they're all in on it together. It's just a criminal underworld of secret police, secret police bureaus & agencies, and "intelligence" agencies. They're all crooked. They're all crooks and criminals and thieves that rob and persecute innocent civilians just like the Bolsheviks, Nazis, Gestapo, Waffen SS, Viet Kong, Khmer Rouge, Red Guards, ISIS, Stasi, KGB, etc. It's all the same or similar secret police, police state tactics, state security apparatus abuses of power, absolute power & its abuses, and spy agencies and intelligence agencies... and those that go along with it and collaborate. It's all just criminal enterprises and crime agencies.
Dis-obey 10 hours agoone other tentacle- https://archive.4plebs.org/dl/pol/image/1590/02/1590026057592.jpg
Bostwick9 10 hours agoSo you can solve the 10,000 open murder investigations in Chicago with this. That's how its being used right...
NAV 11 hours ago remove link"We are deeply troubled to learn that two AP journalists, along with journalists from many news organizations, are among those who may have been targeted by Pegasus spyware," said Director of AP Media Relations Lauren Easton.
OMG . Not journalists !!!!!!!!!!
Guess NSO is a "buy", then.
Norseman_Aura 10 hours agoTo believe that the Israelis will not use the information that they have is absurd.
Here's one example:
The American Anti-Defamation League under Abe Foxman long made it a practice for decades to tail all Congressmen – liberal or conservative -- as was brought out in allegations in the San Francisco trial of its head operative Roy Bullock on charges of buying blackmail information from members of the San Francisco Police Department as reported by the San Francisco Examiner. Bullock had collected information and provided it to the ADL as a secretly-paid independent contractor for more than 32 years.
Can it be that there's a connection between data of this kind and the unbelievable unification of almost every congressman behind every Israeli position?
Of course, the San Francisco Examiner no longer is in existence. But Israeli trolls continue to gather like wasps upon meat to destroy any information that might reveal their nefarious purposes.
novictim 8 hours agoIn 1993 the FBI interviewed 40-year undercover ADL operative Roy Bullock , who had improperly obtained social security numbers and drivers licenses from San Francisco Police Department officer Tom Gerard. Gerard and Bullock infiltrated and obtained information on California Pro-Palestinian and anti-Apartheid groups as paid agents of both the ADL and South African intelligence services. The ADL paid tens of thousands in damages over the incident and promised not to collect confidential information in the future.
SARC '
Sarrazin 8 hours agoWhat do you want to bet that Orange Hitler and associates along with MAGA Republicans, their attorneys, friendly patriot reporters, etc, have had their phones widely hacked going all the way back to 2016?
Because when you are a "progressive" in power, anyone who wants to unseat you is a terrorist threat and you can do just about anything you want to them because you are saving the world.
LEEPERMAX 9 hours ago (Edited)unseat you is a terrorist threat and you can do just about anything you want to them because you are saving the world.
Funny, it's the same formula US foreign policy applies to all it's victims nations around the world. Fighting terrorists in the name of saving the world.
OldNewB 11 hours ago💥BOOM !!!
In 2020 alone, Facebook and Amazon spent more money on lobbyists than did Raytheon, Northrup Grumman, Lockheed Martin, and Boeing -- major players in the defense-industrial complex !!!
Let that sink in.
SummerSausage PREMIUM 12 hours ago"Journalists must be allowed to report the news in the public interest without fear of harassment or harm, wherever they are."
This hasn't happened in ages. What the large majority of MSM operatives (so called "journalists" ) convey to the public is propaganda and agenda driven misinformation and disinformation.
Mute Button 11 hours agoObama spying on Trump and Fox reporters - meh.
Same Obama intelligence services spying on WaPo & leftist reporters - FASCIST
Ivy Mike 8 hours agoWe're supposed to be outraged even though Trump & co. know they're being "spied" on.
Its just a game of the uniparty.
MeLurkLongtime 5 hours agoYawn. Smart phones have swiss cheese security. Who knew.
If you have a secret that you really don't want people to know, don't put in on a device that ever touches the internet. Don't talk about important stuff on a phone call. Any mob boss from the 70's could tell you that.
_0000_ 9 hours ago remove linkI would add if you have Alexa, don't converse on any sensitive topics in front of her, either.
Rectify77 PREMIUM 10 hours ago" Pegasus is a very advanced malware that infects iOS and Android devices to allow operators of the spyware to copy messages, photos, calls and other data, including secretly activate microphones and cameras."
This is a non-story. Lots of smoke, lots of brew-ha-ha.
Why is THIS a jaw dropping story now when the NSA/CIA have been doing this to ALL iOS and Android devices years ago? RE: CALEA , signed into law in 1996 by Bill Clinton.
Just more misdirection... meant to distract from something else. What?
NAV 10 hours agoIsn't it odd that Iran, Russia and China are not on the map? Who are the Israelis playing?
Market Pulse 13 hours agoIsn't is amazing that Russia is giving asylum to Edward Snowden who will be arrested and inflicted with only God knows what if captured by the USA?
dog breath 4 hours agoAnd we are surprised, why??? Everyone's phones are spied upon with all the data collected. All part and parcel of the NWO and the "Information Age". How else are they going to get all that information to control everything. And just think, once upon a time, there were no cell phones and the people were fine. They also were happier and much more free. Hint - ditch the phone!
Hello? This stuff has been going on for two decades. Bill Binney, former NSA, been talking about this since after 911. Five eyes is a way over going around internal rules. Every country does this. Russia, China, EU, USA, Australia, etc. are all spying on their own citizens. This world is turning into a corrupt crap pile and I'm waiting for the Lord to come.
Feb 10, 2021 | arstechnica.com
Jamjen831 </> , 2021-02-08T19:55:08+00:00" rel="nofollow peachpuff wrote:
Barcode scanners and flashlight apps... who installs these? Phones come with these features already baked in.I assume some of it is just old stuff people just re-download without thinking. Android hasn't always had a built in flashlight app (and am I crazy in that the early ones required root?). And I'm pretty sure that's the same with QR readers. I hadn't realized that Google Lens was a QR scanner until fairly recently.
Jul 03, 2020 | www.zdnet.com
Google has removed this month 25 Android applications from the Google Play Store that were caught stealing Facebook credentials.
Before being taken down, the 25 apps were collectively downloaded more than 2.34 million times.
The malicious apps were developed by the same threat group and despite offering different features, under the hood, all the apps worked the same.
According to a report from French cyber-security firm Evina shared with ZDNet today, the apps posed as step counters, image editors, video editors, wallpaper apps, flashlight applications, file managers, and mobile games.
The apps offered a legitimate functionality, but they also contained malicious code. Evina researchers say the apps contained code that detected what app a user recently opened and had in the phone's foreground.
If the app was Facebook, the malicious app would overlay a web browser window on top of the official Facebook app and load a fake Facebook login page (see image below: blue bar = actual Facebook app, black bar = phishing page).
If users entered credentials on this phishing page, the malicious app would log the data and send it to a remote server located at (the now-defunct) airshop.pw domain.
IT security and privacy: Concerns, initiatives, and predictions (TechRepublic Premium)
This archived TechRepublic Premium report, originally published in February 2015, is available for free to registered TechRepublic members. For all the latest research reports, 100+ ready-made policies, IT job descriptions, and more, check out TechRepubli... Research provided by TechRepublic Premium
Evina said it found the malicious code that stole Facebook credentials in 25 apps they reported to Google at the end of May. Google removed the apps earlier this month, after verifying the French security firm's findings. Some of the apps had been available on the Play Store for more than a year before they were removed.
The full list of 25 apps, their names, and package ID, are listed below. When Google removes malicious apps from the Google Store, the company also disables the apps on a user's devices and notifies users via the Play Protect service included with the official Play Store app.
Dec 16, 2019 | www.makeuseof.com
GPS is great for recovering your device when lost or stolen and navigating while driving with Google Maps . And it's especially nifty because GPS works even when disconnected from the internet . Just download your maps ahead of time! Advertisement
But how about using an Android phone as a GPS tracker? It may not be the most reliable option, and it does comes with some not-so-insignificant drawbacks, but it can get the job done if you're desperate. Here's how to turn your Android phone into a GPS tracker.
Note: These instructions are based on a Samsung Galaxy S8 running Android 8.0 Oreo, but the steps should be relatively similar for most Android devices.
Tracking With Native Android FeaturesMost Android devices released in 2014 or later have a built-in feature called Find My Device (formerly called Find My Android). This service constantly pings your device's location back to Google's servers so that Google knows where your device is . You can then use Google's web interface to see where your device is at any given time. You'll need a Google account to use this feature.
How to Enable Find My Device on Android
- Navigate to your device's Settings .
- Tap on Lock screen and security .
- Tap on Other security settings . (This step may be unnecessary depending on your particular device and Android version.)
- Tap on Device admin apps . (This step may be called Device Administrators depending on your particular device and Android version.)
- Tap Find My Device .
- Tap Activate .
Note: In order to activate this service, you'll need to allow four permissions: 1) the ability to erase all data, 2) the ability to change your screen unlock password, 3) the ability to lock the screen, and 4) the ability to turn off functions on the lock screen.
AdvertisementThe nice thing about Find My Device is that it's not just a tracker -- it lets you control the device from afar in the above-mentioned ways. Learn more in our overview of Find My Device .
How to Use Find My Device on AndroidOnce enabled, all you have to do is launch a web browser, navigate to the Find My Device dashboard , and sign into your Google account (the same one associated with your device).
Once you're logged in, select the device you want to locate, click the Locate button for said device, and it'll show its last known location and how long ago it was last spotted. It's fairly accurate in my experience, but I live in an urban environment; it can be off by up to 20 meters in areas with poor GPS visibility.
Tracking With Third-Party Android AppsIf you don't like Find My Device for whatever reason, you can always resort to one of the many third-party alternatives available on the Google Play Store. These apps are easy to install and you don't really have to do anything beyond creating an account to use them.
There are two that we recommend:
1. Lookout : Lookout is an all-in-one security solution where device tracking is just one of its many features. As such, it might be too bloated if device tracking is the only feature you're interested in. But if your device currently lacks a good antivirus app, you might as well use this one and kill two birds with one stone.
2. Prey : In practical usage, Prey is very similar to Find My Device. Its one big advantage is availability across multiple other platforms, including Windows, Mac, Linux, and iPhone, so you can track ALL of your devices from anywhere.
Most of these are marketed as anti-theft and anti-loss security apps for Android -- and they're certainly useful for those purposes -- but you can use them for straight-up tracking if you so wish.
Once your device is set up as trackable, whether using Find My Device or a third-party app, there's only thing left to do: attach the device to the person or object that you want to track . Obviously, this is much easier said than done.
Want to know how to track a car with a cell phone?
The easiest and most effective option is to use a magnetic car mount . Most two-piece kits come with a magnetic insert (that you place inside your device case) and a magnetic base (that you attach to whatever you want to mount). With a good model, the magnetic force should be strong enough for your phone to "snap" onto the base and stay there securely.
Oct 23, 2019 | tech.slashdot.org
Posted by msmash on Tuesday October 15, 2019 @06:10PM from the pushing-the-limits dept.
At Google's hardware event this morning , the company introduced a new voice recorder app for Android devices , which will tap into advances in real-time speech processing, speech recognition and AI to automatically transcribe recordings in real time as the person is speaking. From a report:
The improvements will allow users to take better advantage of the phone's voice recording functionality, as it will be able to turn the recordings into text even when there's no internet connectivity. This presents a new competitor to others in voice transcriptions that are leveraging similar AI advances, like Otter.ai, Reason8, Trint and others, for example.
As Google explained, all the recorder functionality happens directly on the device -- meaning you can use the phone while in airplane mode and still have accurate recordings.
"This means you can transcribe meetings, lectures, interviews, or anything you want to save," said Sabrina Ellis, VP of Product Management at Google.
The Recorder app was demonstrated onstage during the event, live, and was offering -- from what was shown -- an error-free transcription.
Sep 23, 2019 | economistsview.typepad.com
anne , September 21, 2019 at 06:30 AM
https://news.cgtn.com/news/2019-09-21/Huawei-s-pivotal-moment-KabssDHWdq/index.htmlSeptember 21, 2019
Huawei's pivotal moment
By Tom FowdyHuawei launched its Mate 30 series on Friday, the first new device produced by the Shenzhen telecommunications firm since it has been blacklisted by the United States government and excluded from American technology markets.
The subsequent result of the listing had led Google to sever ties with the company and prohibit new devices from using its Play Store services and operating system, something which ultimately impacts the Mate 30 Series, which is using an open-source version of Android.
The impact of it all has led Western commentators to ask questions about Huawei's future in Western smartphone markets, particularly what applications can it access.
However, not all is bleak, and what may start off as a hindrance for the company is set to transform into an opportunity. The United States' assault on the company has forced Huawei to innovate.
With the inaugural "Huawei AppGallery" emerging with the Mate 30, the company has now positioned itself on an investment trajectory to create a new "Huawei core" to compete with the world of Google-led Android systems outright.
In this case, what seems like a detriment is part of a broader pivotal moment for Huawei. The company's portfolio is about to change forever.
Beyond Apple and the iPhone, the Android operating system dominates in the global smartphone market. Describing it as an "operating system" is barely fitting; it might otherwise be described as "an ecosystem" with a wide range of Google orientated services within it.
They include the popular browser Chrome, the YouTube video service, Google mail and, most critically, the "Google Playstore," which, owing to its popularity, attracts more developers and investors than any other unofficial App stores. This "ecosystem" creates a "web of comfort" which effectively entrenches the consumer in the Android orbit.
U p until May 2019, Huawei was a part of this orbit. Its subsequent estrangement from Android owing to the American government's decision has forced some difficult choices. It has made markets keen to observe how the Mate 30 will perform given its lack of Google applications and the need for users to obtain some apps through third-party stores.
So, the question is: How are they now adapting and making that transition? Bengt Nordstrom of North Stream research in Sweden notes that "they have a strategy to become completely independent from U.S. technology. And in many areas, they have become independent."
First of all, we are well aware that Huawei is developing its own Harmony Operating System as a contingency measure, although it has not chosen to apply it to the Mate 30 as an olive branch to Google.
Second, and most excitingly is Huawei's announced bid to invest over 1 billion U.S. dollars in developing its own application "core" or ecosystem. This, in essence, is an effort to get developers to establish applications for the new "Huawei App store" and thus establish a self-reliant, independent path from the world of Android.
To achieve this, the company has pledged a competitive revenue sharing scheme of 15 percent to developers, half of that what Apple and Google demand for participation in their own app-stores.
This effort is combined with a wider scope in research and development from the company, which is also designed to forfeit dependence upon American technology chains in terms of critical components and other parts.
We have already seen massive investment pledges from Huawei to build new research and development centers in the United Kingdom, Belgium, Italy and Brazil. They are not empty promises, but a serious and strategic effort.
In this case, what was intended to be a political effort to destroy and contain Huawei is likely to prove a pivotal turning point in the company's history with huge repercussions for global smartphone and technology markets.
Instead of having once been reliant on and thus beneficial to American technology markets, the outcome is that Huawei will re-emerge independent of and competing against it.
Armed with a pending new operating system, a new application development drive and a broader research effort, what seemed otherwise a detriment is likely to bring a massive opportunity. Thus, it is very important to examine the long-term prospects for the company's fortunes ahead of short-term challenges.
Jun 19, 2019 | theweek.com
The App Store also instituted the idea of tech products being part of a vertically-integrated, closed platform. Apple and Google (with its Google Play store) became the dominant platform owners for mobile, because their scale and network effects made them the gatekeepers for companies that wanted to enter the mobile market and access the app marketplace. Even a company with as much power as Microsoft could do nothing to break the mobile duopoly .
So whatever your opinion of Google's Huawei snub, it certainly demonstrates just how much power Google has, and how that power is centralized. For phone makers, Google is the only option -- Apple being its own walled garden -- and for app makers and consumers alike, the App Store and Google Play are the only existing choices.
This is hardly a secret or conspiratorial. Huawei has long been attempting to develop its own operating system , precisely to prevent such situations as this. Similarly, despite being the largest Android vendor by far, Samsung still has its own Tizen operating system. Building your business on someone else's platform leaves you at their mercy. There's also the question of user experience: Consumers can't actually buy books on the Kindle app on an iPhone or iPad, because Amazon understandably wants to avoid the 30 percent cut that Apple takes on its operating system.
Perhaps a closed app store linked to a platform has outlived its early usefulness. Not only does it cement power among entrenched companies, it also puts up barriers to competition. This idea isn't so radical. Recently, the Supreme Court ruled that Apple's customers can sue the company under antitrust law for monopolistic behavior for the way in which it takes that 30 percent of everything on the app store. There are technical avenues forward: Progressive Web Apps, or PWAs, operate in a more open, more platform-neutral manner, and have significantly improved in functionality recently; they could offer a more neutral way for companies to offer apps outside the constraints of an app store.
Jun 16, 2019 | www.asiatimes.com
Say hello to the Russia-China operating system
The US ban on Huawei is pushing it to develop alternative systems that may rival Google and Android
Google cuts Huawei off Android; so Huawei may migrate to Aurora. Call it mobile Eurasia integration; the evolving Russia-China strategic partnership may be on the verge of spawning its own operating system – and that is not a metaphor.
Aurora is a mobile operating system currently developed by Russian Open Mobile Platform, based in Moscow. It is based on the Sailfish operating system, designed by Finnish technology company Jolla, which featured a batch of Russians in the development team. Quite a few top coders at Google and Apple also come from the former USSR – exponents of a brilliant scientific academy tradition.
In 2014, Russian entrepreneur Grigory Berezkin started co-owning Jolla, and from 2016 his Mobile Platform company started developing a Russian version of the operating system. In 2018, Rostelecom, a state company, bought a 75% share in Open Mobile Platform.
Ahead of the St Petersburg International Economic Forum last week, Huawei chairman Guo Ping discussed the possibility of adopting Aurora with Russian minister of digital development and communications, Konstantin Noskov. According to Guo, "China is already testing devices with the Aurora pre-installed. "
In Moscow, before moving to St Petersburg, Presidents Putin and Xi Jinping discussed multiple possible deals; and these include Huawei-Aurora, as well as where to locate some of Huawei's production lines in Russia.
Google, here we comeAurora could be regarded as part of Huawei's fast-evolving Plan B. Huawei is now turbo-charging the development and implementation of its own operating system, HongMeng , a process that started no less than seven years ago. Most of the work on an operating system is writing drivers and APIs (application programming interfaces). Huawei would be able to integrate their code to the Russian system in no time.
Sep 20, 2018 | www.rt.com
Omnipresent tech giant Google told US senators that it lets third-party apps read data from Gmail accounts and share this information with marketers, even though Google itself allegedly stopped this practice last year. In a letter sent to the lawmakers in July and made public on Thursday, Google said that developers may share your data with third parties for the purposes of ad-targeting, "so long as they are transparent with the users about how they are using the data."
In practice, this means that any app that shares your private data with advertisers must disclose this fact in their privacy policy. This is seen first in a pop-up box that includes a note that the app wants permission to "read, send, delete and manage your email." However, information about the marketers this data is shared with can often be more difficult to find.
Read more Google lets 3rd-party app developers read your emails - report
Google's letter came in response to a request by Republican senators for information about the scope of the email content accessible to these third parties. In their letter to the company, the senators claim that one marketing company, Return Path Inc, read the private contents of 8,000 emails to train its AI algorithms.
Return Path told the Wall Street Journal at the time that, while it did not explicitly ask users whether it could read their emails, permission is given in their user agreements, which state that the company collects personal information including but "not limited to your name, email address, username and password."
At least 379 apps available on the Apple and Android marketplaces can access users' email data. In Google's letter to Congress, the firm declined to say when, if ever, it has suspended an app for not complying with its rules.
Google itself has mined users' emails since Gmail was launched in 2004, but announced last year that it would stop the practice, amid privacy concerns and a federal wiretapping lawsuit.
Now, privacy officials from Google, Apple and Amazon are preparing to travel to Capitol Hill next week, for a Commerce Committee hearing . There, the tech companies will be asked to "discuss possible approaches to safeguarding privacy more effectively."
Everything you've ever searched for on any of your devices is recorded & stored by Google https://t.co/8KGgO0xT92
-- RT (@RT_com) March 30, 2018The hearing is another in a series of grillings faced by the tech industry since the Cambridge Analytica privacy scandal revealed in March that Facebook allowed a third party to collect personal information on millions of users. Google CEO Larry Page was invited to a Senate Intelligence Committee hearing on political bias, foreign interference and privacy on tech platforms earlier this month, but declined to show up, sending a written testimony instead.
Like this story? Share it with a friend!
Sep 07, 2018 | yro.slashdot.org
(duo.com) 46 Trailrunner7 writes: Researchers have discovered a weakness in all version of Android except 9 , the most recent release, that can allow an attacker to gather sensitive information such as the MAC address and BSSID name and pinpoint the location of an affected device. The vulnerability is a result of the way that Android broadcasts device information to apps installed on a device. The operating system uses a mechanism known as an intent to send out information between processes or applications, and some of the information about the device's WiFi network interface sent via a pair of intents can be used by an attacker to track a device closely.
A malicious app -- or just one that is listening for the right broadcasts from Android -- would be able to identify any individual Android device and geolocate it. An attacker could use this weaknesses to track a given device, presumably without the user's knowledge. Although Android has had MAC address randomization implemented since version 6, released in 2015, Yakov Shafranovich of Nightwatch Cybersecurity said his research showed that an attacker can get around this restriction.
Oct 21, 2017 | news.softpedia.com
Samsung announced Samsung DeX earlier this as a way for users to transform their mobile phones into full-fledged desktops or workstations by attaching a monitor, mouse, and keyboard. DeX is currently limited the Galaxy S8 and S8+, as well as Note 8, bringing you a desktop-like experience powered by your smartphone.
And now, Samsung wants to expand the DeX's capabilities by introducing "Linux on Galaxy," a new concept promising to bring the Linux PC experience to your mobile device. Linux on Galaxy comes in the form of an app that you can install on your smartphone to run multiple Linux-based operating systems.
"Although it's in a trial phase, Linux on Galaxy is our innovative solution to bring the Linux experience on PC to mobile, and then further onto a larger display with Samsung DeX. Now developers can code using their mobile on-the-go and with Samsung DeX, and can seamlessly continue the task on a larger display," says Samsung.
Developers will be able to use their favorite GNU/Linux distroWith the Linux on Galaxy app, developers will be able to use their favorite GNU/Linux distribution on their mobile devices. When using Samsung DeX with Linux on Galaxy, users can also run Linux apps that aren't available on their smartphones, which run Google's Android mobile operating system, also powered by the Linux kernel.
Best of all, Samsung Linux on Galaxy will enable developers to use a fully functional development environment to create content on a big screen, all powered by their Samsung S8/S8+ or Note 8 devices. At the moment, Linux on Galaxy is in heavy development, but you can find out more about it at seap.samsung.com/linux-on-galaxy .
Jul 11, 2017 | access.redhat.com
If you can't dismiss an app by pressing the "back" button, it may just be a glitch or crappy app, but it could also be something much worse . That's why Google has quietly slipped in a new Android feature called "panic detection" that can preemptively close an app if you stab at the back button multiple times. So far the feature, spotted by XDA Developers , has appeared in some, but not all devices with Android 7.1 Nougat.Google hasn't said anything about the feature-- XDA just happened to discover the code in a recent build of Android 7.1. Essentially, it listens for back button presses, and if enough of them happen (four to be exact) in rapid succession (with less than a third of a second delay) then Android will override the app and bring back the home screen. This could apply to apps that just freeze, but also to rogue software that tries to intercept any and all actions, like malware or adware.
It's a smart idea, because what's the first thing you do when you can't make an app go away? Frantically pressing the back key is probably the first thing, so that will kill the app and allow you to uninstall or disable it until you figure out the problem.
You'll have to enable the feature to get it to work, apparently. Google seems to be rolling it out on a limited basis, and may in fact just be testing it, so it may be some time before it ends up on your device.
Aug 01, 2017 | observer.com
In its November report, Kryptowire wrote that it detected devices sending data about call history, text messages, the unique identifier of the mobile service subscriber, the device's unique identifier and call histories.
It also found evidence that the software specifically searched text messages for key words and sent full text messages back to Adups servers in China. These messages were encrypted, but Kryptowire was able to find the key and decrypt them.
Since the Kryptowire finding, Adups has reported that it is no longer collecting personally identifiable information, but Kryptowire told Black Hat attendees that it has continued to observe the same behavior, though more carefully hidden and not necessarily on Blu devices.
In a November statement , Adups explained the searching and parsing of users' text messages by saying it had created an application to screen and block promotional messages. It wrote, "In response to user demand to screen out junk texts and calls from advertisers, our client asked Adups to provide a way to flag junk texts and calls for users. [The] application flags texts containing certain language associated with junk texts and flags numbers associated with junk calls and not in a user's contacts."
Blu devices aren't the only ones to carry the Adups software, and Kryptowire has noted that it behaves differently from device to device. Another maker of cheap Android phones, Cubot, also uses Adups software. " In May 2017 on the Cubot X16S device, we observed the user's call log, text message metadata, browser history, list of installed apps, list of apps used and unique device identifiers being exfiltrated by Adups," Kryptowire's Tom Karygiannis wrote the Observer in an email.
On Wednesday, Kryptowire released additional technical details, describing tests from May on Blu Grand M, LifeOne X2 and Advance 5.0 devices.
Subsequent to the Black Hat presentation, Amazon has closed off sales for the complete line of Blu Android phones ...
Jul 28, 2017 | www.msn.com
discovered and blocked a new family of Android malware developed by a cyber arms company that may have its roots in state-sponsored spying efforts.
The malware!known as Lipizzan!contained references within its code to an Israeli tech firm called Equus Technologies, which offers "tailor made innovative solutions for law enforcement, intelligence agencies, and national security organizations."
In the Android Developers Blog , Megan Ruthven of Android Security and Ken Bodzak and Neel Mehta of Google's Threat Analysis Group detailed the malicious software, which they called a "multi-stage spyware product."
The researchers found Lipizzan had the ability to monitor and steal communications from the device. The malware could hijack a user's email, SMS messages, location information, voice calls and local media. It could also snap screenshots of the user's device and hijack the camera to take pictures or record video.
When active, Lipizzan could steal data from a number of apps including Gmail, Google Hangouts, LinkedIn, Facebook Messenger, Skype, Snapchat, popular messaging platforms like WhatsApp and Viber and encrypted communications app Telegram.
Most troubling about Lipizzan was that it was found in apps on the Google Play Store disguised as legitimate apps. The malware was most often found in apps posing at popular utilities with names like "Backup" or "Cleaner." A second wave of apps containing the malware posed as notepad, sound recorder, and alarm manager apps.
When a user would install one of the infected apps, the app would begin to download a "license verification" that would examine the device. If the handset met certain criteria, the second stage of Lipizzan would kick in and root the device while establishing a connection to the Command and Control server operated by malicious actors to send back files and recordings.
While the spyware was available to download through apps in the Google Play Store, Google reported very few instances in which infections were found. According to the company's findings, fewer than 100 devices had the malicious apps installed on their devices. Google claimed that would make the infection rate only 0.000007 percent.
Lipizzan and the apps that contain it have been removed from the Google Play Store, and Google recommends users make use of Google Play Protect , a security suite for Android devices.
Google also advised users to download apps exclusively from the Google Play Store rather than from third-party app stores and to disable installations from unknown sources. The search giant also suggested keeping devices up to date with the most recent security patch.
While Google may have caught and eliminated Lipizzan, the company has run into a fair amount of malware slipping through the cracks of its Google Play Store. Earlier this year, an adware scheme managed to infect 40 million phones through Google's official marketplace.
Jul 11, 2017 | www.msn.com
If you can't dismiss an app by pressing the "back" button, it may just be a glitch or crappy app, but it could also be something much worse . That's why Google has quietly slipped in a new Android feature called "panic detection" that can preemptively close an app if you stab at the back button multiple times. So far the feature, spotted by XDA Developers , has appeared in some, but not all devices with Android 7.1 Nougat.Google hasn't said anything about the feature-- XDA just happened to discover the code in a recent build of Android 7.1. Essentially, it listens for back button presses, and if enough of them happen (four to be exact) in rapid succession (with less than a third of a second delay) then Android will override the app and bring back the home screen. This could apply to apps that just freeze, but also to rogue software that tries to intercept any and all actions, like malware or adware.
It's a smart idea, because what's the first thing you do when you can't make an app go away? Frantically pressing the back key is probably the first thing, so that will kill the app and allow you to uninstall or disable it until you figure out the problem.
You'll have to enable the feature to get it to work, apparently. Google seems to be rolling it out on a limited basis, and may in fact just be testing it, so it may be some time before it ends up on your device.
Jun 17, 2017 | arstechnica.com
Citizen Lab, the University of Toronto group that monitors government surveillance in the digital age, analyzed the recently discovered instance of the fake Qatif Today app in a blog post headlined Police Story: Hacking Team's Government Surveillance Malware . The account provides a rare glimpse into malware developed by "Hacking Team," a highly secretive outfit based in Italy that charges governments top dollar for extremely stealthy spyware that's often referred to as a "lawful intercept" program.The Trojan is known as an Android implant because it cloaks itself inside a legitimate third-party app. People who are infected with it must first be tricked into obtaining the Android installation package (APK) from a non-authorized source, which in this case was this now-shuttered Dropbox location . Aside from that, victims may have little indication anything is amiss. To lend it legitimacy, the malicious APK was signed by a digital certificate that appeared to be related to Java and its original creator Sun Microsystems. Citizen Labs identified six other samples signed by the same certificate.
Once installed, the app establishes contact with command and control servers located at 91.109.17.189 and 106.186.17.60, which are addresses Citizen Lab has seen used in previous Hacking Team campaigns. The implant also attempts to break out of its Android-imposed security sandbox by exploiting a vulnerability in older Android versions on specific handsets that allows apps to gain unfettered root privileges.
The trojan next tries to access local files stored by a variety of social media, chat, and call apps including Facebook, Viber, WhatsApp, Skype, LINE, and QQ. The app has audio recording, camera, video, key logging, and "live mic" capabilities, as well as a "crisis" module that provides anti-analysis functionality. The researchers also found evidence of what appears to be location, screenshot-taking, and browsing activity modules. The implant even seems to have a filter to specify date ranges to narrow the mail and text messages it sends back to the control servers. (It's not clear what happens when the app runs on Android versions that have patched the rooting vulnerability.)
"We also see information about how the implant exfiltrates data, along with its C2 servers," Tuesday's post reported. "Interestingly, it appears that the implant is capable of monitoring the devices' connectivity (e.g. Wi-Fi, cellular network), choosing connection type, and rate limiting the bandwidth. Note that these are the same servers we observed in the implant's network communications."
The Citizen Lab researchers provided an overview of the remote control system (RCS) architecture that works with Android trojans and trojans for other platforms. The architecture relies on a series of system administrators, technicians, and analysts to funnel information pulled off an infected device to the interested parties. Unverified screenshots an anonymous person provided to Citizen Lab show RCS works on computers running Windows, Mac OS X, or Linux.
It comes with a dazzling number of capabilities, including:
Network Injection: via injected malicious traffic in cooperation with an ISP Tactical Network Injection : on LAN or Wi-Fi Melted Application : bundling a Hacking Team dropper alongside a bait application Installation Package : a mobile installer Exploit : document-based exploit for mobile and desktop Local Installation : mobile installation via USB or SD card Offline Installation: create an ISO for a bootable SDHC, CD, or USB. This option includes the ability to infected hibernated and powered off devices QR Code: a mobile link that, when pictured, will infect the target Applet Web: likely a malicious website (depreciated after v. 8.4) Silent Installer: a desktop executable that will install the implant Infected U3 USB : an auto-infecting U3 USB WAP Push Message : the target will be infected if the user accepts the message (works on all mobile operating systems apart from iOS)
Citizen Lab researchers wrote:
The implant ("agent") offers one-click functionality for requesting information from target devices. Technicians are encouraged to add functionality as needed.
... ... ...
Selection of available surveillance modulesAccessed files Address Book Applications used Calendar Contacts Device Type Files Accessed Keylogging Saved Passwords Mouse Activity (intended to defeat virtual keyboards) Record Calls and call data Screenshots Take Photographs with webcam Record Chats Copy Clipboard Record Audio from Microphone
Other CapabilitiesWith additional Voice and silence detection to conserve space
Realtime audio surveillance ("live mic:" module is only available for Windows Mobile) Device Position URLs Visited Create conference calls (with a silent 3rd party) Infect other devices (depreciated since v. 8.4)Once an implant is operational its collection operations can be updated. In addition files can be sent to and received from the device.
In addition, implants have a default cap on "evidence" space of 1GB on the target device. Recording of new material stops when the space is reached. Operators also have the ability to delete not-yet-transmitted data on the device.
Programs such as RCS are marketed to governments as legitimate wares, but Citizen Lab points out that many countries have few legal guidelines and little oversight for the way they're used.
"In light of the absence of guidelines and oversight, together with its clandestine nature, this technology is uniquely vulnerable to misuse," the report warns. "By analyzing the tools and their proliferation at the hands of companies like Hacking Team and Gamma Group, we hope to support efforts to ensure that these tools are used in an accountable way, and not to violate basic principles of human rights and rule of law." , Jun 24, 2014 9:47 PM
Quote:MatthewSleeman , Ars Praetorian Jun 24, 2014 10:34 PMThe implant also attempts to break out of its Android-imposed security sandbox by exploiting a vulnerability in older Android versions that allows apps to gain unfettered root privileges.According to your link Dan, this affects only the Samsung Galaxy S3 or anything with Samsung's Exynos chipset. It isn't an Android root exploit in general. It's already been patched a year ago. blockquote
This is more interesting because all android apps are signed and if an app wished to update an app already installed (and with the same name, otherwise it will show up as a separate app), it has to have a matching signature.
aleph_nought wrote:goretsky , Smack-Fu Master, in training Jun 25, 2014 12:33 AMWhen does lawful intercept cross the line into total surveillance? Post-Snowden, the concept of lawful intercept has no meaning when everything can be intercepted and used at a later time.
Better question: How is this lawful to begin with? Unless they set things up so that, in theory, only terrorists and other *valid* targets of surveillance download then app, I don't see how it could be given the uproar over the stuff Snowden releasedHello,Pueo , Smack-Fu Master, in training Jun 25, 2014 3:48 AMThe SHA-256 hash for the file is 8e64c38789c1bae752e7b4d0d58078399feb7cd3339712590cf727dfd90d254d .
According to this VirusTotal report, this program is currently detected by the following programs:
Avira AntiVir - Android/FakeInst.ES.4
Baidu-International - Trojan.Android.FakeInst.bES
ESET - a variant of Android/Morcut.A
Kaspersky - HEUR:Trojan-Spy.AndroidOS.Mekir.a
ThreatTrack VIPRE - Trojan.AndroidOS.Generic.AFive out of fifty-three program, or a little under 10%. I'm sure the detection rate will go up in the next 24 hours to (or at least, near) 100%, though.
Regards,
Aryeh Goretsky
MatthewSleeman wrote:julienm , Wise, Aged Ars Veteran Jun 25, 2014 9:39 AMaleph_nought wrote:blockquote
Better question: How is this lawful to begin with? Unless they set things up so that, in theory, only terrorists and other *valid* targets of surveillance download then app, I don't see how it could be given the uproar over the stuff Snowden releasedConsider the likely target of the malware. It is someone using a news app focusing on a Saudi Arabian province. It assumes that the target will be connected in social media (Facebook and Whatsapp) and making international calls (Skype, QQ, and Viber). It was spread through twitter. This app is not targeting terrorists, it is targeting journalists and activists. Most likely it was produced for the security services of Saudi Arabia. If it's "lawful" for Saudi Arabia to jail and torture human rights activists I have no doubt they consider it "lawful" to spy on them as well. I doubt the monarchy is concerned with adding spying to its long list of human rights violations.
Ostracus wrote:nonars , Smack-Fu Master, in training Jun 25, 2014 10:16 AM New Postershow nested quotesMatthewSleeman wrote: blockquote aleph_nought wrote: blockquote
Better question: How is this lawful to begin with? Unless they set things up so that, in theory, only terrorists and other *valid* targets of surveillance download then app, I don't see how it could be given the uproar over the stuff Snowden releasedConsider the likely target of the malware. It is someone using a news app focusing on a Saudi Arabian province. It assumes that the target will be connected in social media (Facebook and Whatsapp) and making international calls (Skype, QQ, and Viber). It was spread through twitter. This app is not targeting terrorists, it is targeting journalists and activists. Most likely it was produced for the security services of Saudi Arabia. If it's "lawful" for Saudi Arabia to jail and torture human rights activists I have no doubt they consider it "lawful" to spy on them as well. I doubt the monarchy is concerned with adding spying to its long list of human rights violations.
True, although I doubt they're the only country that would benefit from such a tool.
BTW when is the IOS version coming out? I can't image just running a different brand would provide the needed security?
there has been several stories about iOS malwares used by government agencies.
some are using public jailbreak exploits to install:
http://blog.kaspersky.com/iphone-spyware/others, aimed at high value targets, would use 0day flaws (browser exploits, PDF exploits,...).
so far, haven't heard of any such malware targeting WP7/8, but that's probably due to market share. Interestingly, such spying toolkits still have modules for Windows Mobile 6 (that might be explained by the fact it was much easier to develop malware on that old platform without sandboxing or modern memory protection features)
All of these app permissions are shared by and android app named "MobileTracker 1.0", which comes with many of the cell phones straight from the manufacturers. The full list of MobileTracker 1.0 is scary and this app cannot be disabled. It smells a lot like another CarrierIQ to me. Be aware of this app.
Jan 25, 2017 | www.nytimes.com
President Trump has carried his Twitter habit into his presidency. He has also brought with him another tech habit that is causing concern.
Mr. Trump has been using his old, unsecured Android phone to post on Twitter since moving to Washington late last week.
The president's desire to use his old, personal smartphone raises concerns that its use could be exposing him and the nation to security threats.
He is using the Android smartphone mainly to post on Twitter, not to make calls. But it's unclear what security measures have been put in place on the device and how vulnerable he could be to someone stealing data or breaking into his Twitter account.
The White House did not respond to a request for comment.
Twitter requires a connection to the internet, which exposes the device to security vulnerabilities if proper measures like two-factor authentication - a password and a code texted to a phone, for example - are not in place. If he uses the smartphone on an unsecure Wi-Fi network, he could be exposing his location and other personal information on the device.
"The absolutely minimum Trump could do to protect our nation is to use a secure device to protect him from foreign spies and other threats," said Senator Ron Wyden, a Democrat from Oregon on the Intelligence Committee. "It would be irresponsible in the extreme for the commander in chief to use an unsecure device that could be easily hacked or intercepted."
Among the concerns by security experts:
It is unclear if the device and its functions like texting are encrypted to thwart hacking. The device could be more vulnerable to hacking if used on unsecured Wi-Fi and cellular networks, such as when Mr. Trump travels between meetings or anywhere outside the White House. Hackers could access the device to turn on the camera and microphone. Stingray devices, a type of surveillance tool often used by law enforcement, can track a device's location and other information.
"There are a lot of questions, but it is clear there are often vulnerabilities in our phones and internet systems - and it is critical that people take precautions to ensure their sensitive information is protected from hackers and other malicious actors," said Neema Singh Guliani, legislative counsel with the American Civil Liberties Union.
The president's use of the personal device is particularly notable given his criticism of Hillary Clinton for using a personal email address and server when she was secretary of state.
In 2009, President Barack Obama fought to become the first president with a smartphone; though he won, the use of a White House-issued secure device came with many rules.
"As president, he is the biggest sitting target in the world," said Kevin Bankston, the director of New America's Open Technology Institute.
Dec 26, 2016 | it.slashdot.org
(bleepingcomputer.com) 60 Posted by msmash on Tuesday December 13, 2016 @11:12AM from the security-woes dept.An anonymous reader writes:
Security researchers have found malware hidden in the firmware of several low-end Android smartphones and tablets , malware which is used to show ads and install unwanted apps on the devices of unsuspecting users. 26 Android device models have been found to be vulnerable. The common link between all these devices is that all are low-cost devices, mostly marketed in Russia, and which run on MediaTek chipsets.
According to security researchers from Dr.Web , a Russian antivirus vendor, the malware appears to have been added to the firmware by "dishonest outsourcers who took part in [the] creation of Android system images decided to make money on users." The security firm has informed MediaTek and the device vendors about this issue so the affected companies can inspect their distribution chain and find the possible culprits.
Dec 26, 2016 | news.slashdot.org
(linuxjournal.com) 63Posted by BeauHD on Tuesday December 20, 2016 @07:45PM from the buyer-beware dept. Long-time Slashdot reader emil writes about how ADUPS , an Android "firmware provisioning" company specializing in both big data collection of Android usage and hostile app installation and/or firmware control, has been found pre-loaded on Barnes and Noble's new $50 tablet :
ADUPS was recently responsible for data theft on BLU phones and an unsafe version of the ADUPS agent is pre-loaded on the Barnes and Noble BNTV450 . ADUPS' press releases claim that Version 5.5 of their agent is safe, but the BNTV450 is running 5.2. The agent is capable of extracting contacts, listing installed apps, and installing new apps with elevated privilege. Azzedine Benameur, director of research at Kryptowire, claims that " owners can expect zero privacy or control while using it ."
Dec 26, 2016 | tech.slashdot.org
(onthewire.io) 42 Posted by msmash on Wednesday November 30, 2016 @12:25PM from the security-woes dept. Reader Trailrunner7 writes: A new version of an existing piece of malware has emerged in some third-party Android app stores and researchers say it has infected more than a million devices around the world , giving the attackers full access to victims' Google accounts in the process. The malware campaign, known as Gooligan, is a variant of older malware called Ghost Push that has been found in many malicious apps. Researchers at Check Point recently discovered several dozen apps, mainly in third-party app stores, that contain the malware, which is designed to download and install other apps and generate income for the attackers through click fraud. The malware uses phantom clicks on ads to generate revenue for the attackers through pay-per-install schemes, but that's not the main concern for victims. The Gooligan malware also employs exploits that take advantage of several known vulnerabilities in older versions of Android, including Kit Kat and Lollipop to install a rootlet that is capable of stealing users' Google credentials.Although the malware has full remote access to infected devices, it doesn't appear to be stealing user data, but rather is content to go the click-fraud route. Most users are being infected through the installation of apps that appear to be legitimate but contain the Gooligan code, a familiar infection routine for mobile devices.
sep 21, 2015 | Datamation
My recommendation is doing this with the apps that will never need to connect to the Internet when not at home. This includes file managers and apps that you would never think to connect to the Internet in the first place. While it doesn't prevent malware or data leaks specifically, this practice can help you to troubleshoot potentially bad apps.
As a general rule, I recommend always restricting apps from using mobile data unless it's necessary. Others might point you to using software firewalls. Instead I prefer using carefully thought out hardware firewall on my LAN with logging. If something besides allowed ports are being used for that device, the ports will be blocked. This practice might not stop crazy ads and other ad related weirdness, but it could prevent other more dangerous surprises by restricting port access at the network level.
The problem I have with Android firewalls is that many of them are by no-name companies which I've never heard of. They ask for heavy permissions and their support email is an @gmail.com address. Personally, I don't find all that secure. I'd much rather have some control over which apps are connecting to the Internet. I may grant some exceptions (SMS apps, etc), but I keep a tight leash otherwise.
Restricting application installation
I'd love to tell you that every single application on the Google Play Store is well vetted. The truth is that isn't true – period. This means it's easier to get applications with more features than you might find on other platforms, but it also means you need to be careful about what you're installing.
The first rule of installing Android applications is to only do so from trusted sources. I'm not talking about installing apk packages vs Google Play. You need to know the source and company behind the application before trusting it completely. Like many of you, I've been known to make exceptions...but even then I'm careful about the permissions I grant the software.
To be clear, I would trust an apk package from a vendor's website I trust more than I would some random Google Play app that I know nothing about. Why? Because Google Play on its own merit doesn't promise security. There is still some user responsibility for maintaining a secure Android experience. That said, I would suggest you're safer downloading random apps on Google Play than some mysterious forum page's listed apk packages.
Public wifi and VPN
No matter what software you choose to install, more often than not the biggest security threat comes from your browser. When you're using a public wifi access point, you're taking a significant risk each time you login to anything important. Much of this is mitigated thanks to SSL and https secured websites, such as banking and some email websites. But there are still countless other sites out there where you could be sending your login credentials to anyone around you monitoring your connection.
I suggest looking into a reliable VPN service. There are some good ones, but I suggest doing your own research. Some might question how a VPN tunnel secures your Android device. I would submit that it provides an added layer of encryption to your online web browsing activities. And while the encryption ends on the other end of the tunnel, at least your activity isn't broadcasted to other users sharing the same public wifi access point.
... ... ...
Cassie October 26 2015 07:37 PDT
I am glad you mentioned that nothing is 100% secure as well. I think so many people expect to make their device completely hack-proof and that just cannot happen. As you mentioned, anything connected to the internet can be hacked, but you can do many things to make them harder to hack.
SecureThoughtsC October 05 2015 02:03 PDT
Great point about using a VPN, a lot of people don't know how vulnerable they are doing their banking at the local coffee shop. I do think security software is worth it, I am in the same camp as you there. It might not be bulletproof but I do believe something is better than nothing.
YouTube
Karen Handy 1 year ago
Mines is constantly turning on by itself, even had apps turn on, my data has been used up since the 1st and it takes me 3 wks to do that, it calls people on it's own, I have 2 security apps and sometimes it's icon disappears from the top of screen, my browser constantly fail, I can't access my employee email from my cell anymore, when I'm on FB I often have to "like" a post several times for it to take, same with sharing??
I've changed my sims card and battery and am still having problems??
And it goes completely bonkers around my place of employment to the point that I either can't make or receive calls?? I just bought this phone in Feb/14 and it's the exact same one I had before that lasted a year!
I even got a call a month later telling me that my email had been hacked and got disconnected, when I called back it was one of those numbers that doesn't allow you to call back.....
Kasandra 4 months ago
+Karen Handy Hi Karen,
Did the issue get solved? What and who was it? If you don't mind my asking? Do you have any recommendations? Such as things to avoid? Some apps are pretty dodgy and also I accidentally click on ads that pop up often, especially from links on Facebook. Also I'm sure there are many people who can hack than we think, I think if you have your bluetooth on it makes it easier?? Obviously they're not going to let on because then what would be the point in hacking. Are there any sure signs? Yours seem pretty legit.
Eddie Leal 1 year ago
Please forgive my ignorance folks but I am not up to speed with all the latest apps/gadgets and widgets for cell phones but don't some cell phones come with the capability of re-formatting it to factory default status. I always thought this meant that any/all programs that were not part of the original package with the phone would be wiped out from the phones memory. I guess if you feel nervous about doing this yourself you could take it to a service center and pay through the nose to have this done. Heck! YouTube and google are full of instructional videos/pdf files how to accomplish this on your particular model phone. As far as what the gentlemen in the video stated, I am not quite sure it is accurate to say that the carrier will do this for you.They typically sell you the phone but if you need technical support you have to go elsewhere...right?? Any ideas from the tech savvy folks out there? Please advise.
LTraveler83 3 years ago in reply to Виктор Марков
Check your phone bill when it comes in for any weird messages or downloads or even phone calls during that time. Treat electronic devices like the ears and eyes of your grandmother. This means if you wouldn't say it to her, you probably should type it or say it too close to anything that could be spied upon.
Farzin F 5 months ago
To the uploader: Regarding CC BY ND: the MIT Open Course Ware videos on YouTube use CC by NC. Yet, since there is no option for this, MIT chooses the standard youtube license. That's probably the best choice. Not CC BY
February 19, 2015An anonymous reader writes A new Android Trojan that tricks users into believing they have shut their device down while it continues working, and is able to silently make calls, send messages, take photos and perform many other tasks, has been discovered and analyzed by AVG researchers. They dubbed it, and AVG's security solutions detect it as PowerOffHijack.
The Guardian
Revelations about the detailed location records stored on smartphones indicates just how much information companies including Apple and Google are able to gather. \
But it's not just the phone-makers – apps on your phone are hungry for your personal info too. So is your phone snooping on you?
Here, we reveal what you need to know – and whether you can do anything about it
Dogoodnow, 16 July 2014 12:04pm
Another problem with Android (as far as I can see, as implemented on an early Samsung Note) is that it keeps turning on apps that you have or think you have turned off or force closed.
Especially true of all the Google related material?
StockBet -> Dogoodnow, 16 July 2014 1:16pm
Watch the PBS documentary called "United States of Secrets" and what they said about Google.
fragilegorilla -> StockBet, 16 July 2014 1:23pm
There's also a very good documentary available on Netflix right now called "terms and conditions may apply".
It covers this constant snooping and what we actually sign away when we tick those little 'I accept' boxes.
dourscot -> Dogoodnow, 16 July 2014 1:36pm
You can't stop or de-install Google's core apps on any mainstream Android device.
The only way around this is to use an open install like CyanogenMod.
tr1ck5t3r -> dourscot, 16 July 2014 2:04pm
CyanogenMod has had its own bugs will facilitate snooping though. However as the Play store app is not installed by default, its worth checking the terms and conditions when a CyanogenMod user install it.
supermarine -> fragilegorilla, 16 July 2014 7:37pm
I've watched it…I was tickled by the revelation that a number of people had signed their souls to the devil.
Fred1, 16 July 2014 12:09pm
I really can't see the point of most Apps.
Sure WhatsApp and Viber are useful but the vast majority are just websites made for phones. And they're free so there's a catch.
I hate using WhatsApp and Viber because I know they're as about as secure as using a microphone on a busy high street and the people behind it our mining the shit out of my data. However I use them because they're a useful.
I just wish you could choose. Whore your data or pay for the service. The internet should be about getting £1 from billions of people but instead nowadays its just about whoring data. It's most likely all bull shit like investing in sub-prime mortgages but hey lets pretend this data has any value.
My approach is to download very few apps, never give my location, never use social media (because I don't understand why it exists) and never say anything vaguely interesting on WhatsApp, Viber or indeed CIF. If you don't believe me read this comment.
Westmorlandia -> KatyEB, 16 July 2014 12:12pm
Yes, and so many pre-installed, that you can't delete. Still I prefer it to my old iPhone.
This is easily the worst thing about Android - endless unwanted apps that take up storage space, use memory, and can't be removed. It's incredibly annoying - it's like they're stealing part of the phone I paid for.
Westmorlandia, 16 July 2014 12:11pm
Because of the opacity of the system, it's crying out for consumer protection regulation.
Unfortunately governments like collecting our data too, so are actually quite keen for this sort of data collection to go on.
pretendname -> Westmorlandia, 16 July 2014 12:24pm
Any reasonable left or right centre government, would move to ban Google Glass immediately. But our government has tipped into fascism.
There is a reasonable argument that banning these devices would not be 'progressive'. By which they mean, you can't put a genie back in the bottle. But this is simply rationalising away fascism.
We ban or blacklist new technologies all the time, it's just that we've chosen not to deal with this one because it helps our government suppress anything they might see as seditious.
This wholesale surveillance of citizens is simply wrong. Just like secret trials and detention without charge.. is simply wrong.
afinch -> pretendname, 16 July 2014 1:23pm
Any reasonable left or right centre government, would move to ban Google Glass immediately.
Eh? Do you think concealed cameras should be illegal? Telephoto lenses? Small microphones? Spy equipment far more covert, and far cheaper, than Google glass has been available for decades.
What's liberal about banning an underpowered wearable camera that costs too much?
pretendname -> afinch, 16 July 2014 1:29pm
It's not the camera that's the problem with Google glass.. It's that it's a network enabled camera which is permanently switched on and recording, and is reporting your location and everything you see and hear to the government, and worse, a company.
Now if you restricted yourself to looking at members of your own family that's ok.. but if you're going to wear it on a bus, it's going to record not just your movement, but through facial recognition, the moments of everyone you see.
Can't you see any danger in that?
fallenrider -> pretendname , 16 July 2014 3:09pm
But it doesn't actually do that though does it?!
It records when you tell it to record, not constantly. But don't let facts get in the way or your paranoia hey.
pretendname -> fallenrider, 16 July 2014 3:35pm
Have you been asleep for the last 2 years. Google, have been actively working with the NSA to provide every single piece of information about you that they can.
But of course... I'll have to take your word for it because you are clearly a Google Employee on the Glass project.
Otherwise.. how would you know what it does or doesn't do?
LegoRemix -> pretendname, 16 July 2014 4:21pm
As has been repeated over, and over again. No tech company is actively working with the NSA. What happened is they got served National Security Letters that *force* their cooperation with government demands. If they don't comply, their businiess is shut down.
You can moan about a lot of other things tech companies do, but this is literally a 'gun to the back of the head' scenario for them
pretendname -> LegoRemix , 16 July 2014 4:26pm
I'm not sure...
Eric Schmidt has been attending Bilderberg for the last few years.
From that I surmise that he is fully on board.But.. even if tech companies are forced into this, the result is the same. It is a bizarre situation in which, given full details and facts, people still deny reality.. even while it's happening.
You couldn't make it up.Google glass has a camera which is potentially permantently switched on.
That camera can be picking out faces, mapping those faces to some sort of engram, and http posting them off to gootle with a location and date stamp, or storing that list of information locally for later upload.If it can do it... Recently revelations seem to suggest, it is doing it.
MtnClimber -> afinch, 16 July 2014 5:47pm
It's far worse now than before "smart phones" Before, spying was done on an individual basis. One person wanted to spy on another.
Now, with smartphones, everyone is under surveillance. Google glass is an extension of the spy phones that we all carry. It is getting worse by the day.
robinaldlowrise -> LegoRemix, 16 July 2014 10:18pm
No tech company is actively working with the NSA.
Of course they aren't (cough). Nobody is working with the NSA. The NSA is an evil unto itself alone (cough).
Bluecloud, 16 July 2014 12:14pm
My Android tablet came with Google Maps, which requires permission to access all my contacts, all my WLAN info as well as my location (of course, it's satnav device) and lots of other personal info. Their demand for ever greater intrusion into my life increases with every update.
This is a high price to pay for such apps. Beware!
swishy -> Bluecloud , 16 July 2014 12:25pm
I can see a future not too far ahead where these phones will be the only available option which will basically trap people in the system. Permission to access personal info may not necessarily be requested and ability to turn off GPS might not be possible. There's a gloomy picture to be going on with.
beedoubleyou -> Bluecloud , 16 July 2014 12:29pm
I don't understand the price. Nobody has anything to gain by knowing any of my contacts, especially me.
Nialler, 16 July 2014 12:14pm
My experience with the Galaxy was that in order to use a lot of the functionality I had to register with Google. This gives them my e-mail, my network, my location (if using the GPS) my buying preferences etc.
Sod that.
My wife used the GPS to find an address and when we arrived a photo of the house popped up on the screen. I find all this terribly intrusive.
If someone stopped you on the street and asked you those questions you'd tell them to fling their hook.
tilw -> Nialler, 16 July 2014 12:44pm
My way of handling Google and similar accounts is to give Google my email address at another on-line "everything including the kitchen sink" service and vice versa.
Both the email addresses are eminently disposable and neither of them point to any of my actual "real" email addresses. It can be a bit of a pain keeping track of which service has which disposable address, but it's worth it.
This technique also pretty quickly reveals which "services" have passed email addresses on to spammers either knowingly or otherwise.
blipvert -> tilw, 16 July 2014 12:55pm
Google started to get a bit sniffy about this kind thing a while ago, and Boss Man Schmidt declared Google+ to be an identity service, and only real names would do.
Fortunately, they have recently abandoned this Big Brother approach in a desperate attempt to actually get customers to use Google+.
MasterPale -> Nialler, 16 July 2014 1:35pm
Registering with Google is only necessary in order to buy apps from Google's app market.
There are other sources of apps such as Samsung, Amazon, app developers websites, app review websites. Of course you have to register with these sources too but the process is generally less intrusive.
You can disable and uninstall Google apps such as Gmail, Google search, Maps etc.
And install alternatives which do not gather your data such as Hotmail, Hushmail, Firefox browser with ad-blockers and anti-trackers, DuckDuckGo or StartPage search engines, and Bing maps or TomTom (if there is no app use your phone browser to access the websites - create a bookmark and you have instant map service).
People are often afraid to edit their phone/tablet, a fear promoted by the dire pop-up warnings that if you turn off x it will melt your phone. No it wont!
Do not install junk apps. You can expect them to be infested with spyware and to involve 'in-app purchases'. Choose quality apps, recommended by reliable reviews. When installing an app, buy the paid version and save money on data long-term.
'Free' apps invade your privacy, keep data turned on to feed you a stream of adverts. You pay in lots of ways. It costs 69p for an app or maybe £2.99 for the expensive apps? And how much is privacy worth to you? How much do you pay for data?
If you have not seen an Adam Curtis documentary nor watched the BBC's current documentary series 'Meet the Men Who Made Us Spend' (on iPlayer) then I recommend them. They are light and fluffy, not overly intellectual, but they review the history of the last fifty years and the growth of consumption and offer an explanation of why so many people are obese, we spend too much time and money on pointless consumption, and are politically oppressed. It might make you decide you don't need so many gadgets or that you don't need so many apps on your gadgets. It will certainly make you reject 'smart things' and the continuing infantilisation and passification of the population.
dourscot -> Nialler, 16 July 2014 1:41pm
But you can log out of Google. This doesn't solve your problem with other apps but it's not as bad as you suggest.
ConanOB -> Nialler , 16 July 2014 4:48pm
You buy an iPhone, apple asks for you credit card number, expiration date and you need to create and email account and use a back up email account if you are imperfect and might someday forget your password.
Everything comes at a price, the more secured and locked down you want your smartphone to be, expect to pay a premium price for it.
It is not difficult for phone companies to retrieve text messages etc and time, date and duration of calls you made every day.
Just stay away from apps like the flashlight app that needs access to your microphone or any app that request access to your contacts.
NotANumbers -> MasterPale, 18 July 2014 1:05am
I use F-Droid. It is a repository of free and open source applications. If you don't trust one, you can just have a look at the source code, providing you can understand it, and heck, even if you can't, you could still download, safe in the knowledge that there will inevitably be more eyes viewing the code and therefore less chance you'll have a malicious or snooping application.
swishy, 16 July 2014 12:18pm
I have one of those Samsung Galaxy Note phones. It's a work phone so doesn't actually belong to me. I just switch off the WIFI and GPS which is hopefully enough to stop my location being tracked.
ThisFieldIsBlank -> swishy , 16 July 2014 12:26pm
No it isn't! You will still be tracked as the phone continuously send signals to the network to check for signals. Even Brick phones do it, it is an inherent feature of mobile or cellular phones.
bargepoled2, 16 July 2014 12:19pm
With android kit kat 4.4 you can activate or deactivate each apps location settings.
dont want an app to use your location or know it?
turn of its ability to do that in app settings.
July 12, 2014 | rt/ Reuters
At least 80 percent of all audio calls are gathered and stored by the NSA, whistleblower William Binney has revealed. The former code-breaker says the spy agency's ultimate aim is no less than total population control.
The National Security Agency lies about what it stores, said William Binney, one of the highest profile whistleblowers to ever emerge from the NSA, at a conference in London organized by the Center for Investigative Journalism on July 5. Binney left the agency shortly after the 9/11 attacks on the World Trade Center because he was disgusted at the organizations move towards public surveillance.
"At least 80 percent of fiber-optic cables globally go via the US," Binney said. "This is no accident and allows the US to view all communication coming in. At least 80 percent of all audio calls, not just metadata, are recorded and stored in the US. The NSA lies about what it stores."
Binney has no evidence to substantiate his claims as he did not take any documents with him when he left the NSA. However, he insists the organization is untruthful about its intelligence gathering practices and their ultimate aim. He says that recent Supreme Court decisions have led him to believe the NSA won't stop until it has complete control over the population.
"The ultimate goal of the NSA is total population control," Binney said, "but I'm a little optimistic with some recent Supreme Court decisions, such as law enforcement mostly now needing a warrant before searching a smartphone."
During his speech at the conference, Binney praised spy-turned-whistleblower Edward Snowden for disseminating the classified documents that revealed the NSA's global spy programs. The latest revelations showed that contrary to the NSA's claims, the majority of information the agency gathers is from ordinary citizens with no connection to terrorism.NSA gathered 'startlingly intimate' data on ordinary citizens, Snowden data reveals
Washington has defended its spy programs, claiming that the NSA targets individuals with connections to known terrorist groups to thwart attacks. Binney said this was a lie and the NSA had stopped "zero attacks" with its intelligence gathering programs.
One of the main factors that has allowed the NSA to increase its spy programs is the lack of oversight in the US, argues Binney. In particular, he took issue with the Foreign Surveillance Court (FISA), which oversees the issue of search warrants against people suspected of terrorism. Binney believes the court is meaningless and always sides with the US government.
"The Fisa court has only the government's point of view," he said. "There are no other views for the judges to consider. There have been at least 15-20 trillion constitutional violations for US domestic audiences and you can double that globally."
Revelations about US global spy programs have sparked mass indignation, with one American judge saying the surveillance was almost Orwellian in nature. German Chancellor Angela Merkel also compared US intelligence policy to the antics of the Stasi secret police in the former East Germany.
See also: Federal judge says NSA's phone surveillance program is likely unconstitutional
Selected Comments
jeff strehlow 13.07.2014 00:48Toni Lehto 12.07.2014 17:02
I'm as against NSA surveillance as the next guy, but I say BS.
Why? Consider a 1 minute phone call at 50 kbps would require storage of 3MB. Further assume an "average" phone call is 3 mins and there are 12.4 BILLION phone calls per day worldwide, capturing 80% of that traffic for 365 would require 33 MILLION terabytes of storage PER YEAR.Your calculation is much higher than the actual requirements for 2 reasons:
1. 50 kbps isn't needed for voice communications. 5-6 kbps is enough.
2. You didn't take data compression into account.
Sunshine 12.07.2014 20:31
The current security/intelligence services are a vile stain on the memories and sacrifices of those who fought and died in the hope of preserving the freedoms that this country was founded upon and we cherish(ed) in our hearts.
Its the height of irony....you want to pull out all the stops to defend our country and way of life by destroying it....
Remember, the greatest trick the devil ever pulled was convincing the world he did not exist.....we did not know (for sure) the devil was walking amongst, and destroying our way of life, until Snowden, Drake and Binney opened our eyes and minds.....
Otto Moser 12.07.2014 19:31
SUPER !
So that Austrian radio comedian, who phoned the US Embassy, asking for a back-up of his daughter's birthday party video, because he claimed to have inadvertently deleted it, was absolutely within reality !
Naturally, the Embassy was not amused !
Fįbio O. Ribeiro 12.07.2014 14:47
iPhone deserves a new name: iNSAmike. Ha, ha, ha... I will not have one.
Emmett 12.07.2014 14:23
NSA is doing what Hoover did as the long time US FBI director. He spied on and blackmailed US presidents and other politicians so they could never oust and with all the dirt he had on those politicians masquerading as pillars of the community he forced them to do what he wanted them to do.
We see proof on a massive scale the NSA uses the Hoover blueprint to blackmail politicians but have take it a step further with technology to gather information on even more people.Kenneth T. Tellis 12.07.2014 12:35
What the NSA is now doing, was what the U.S. government accused the Soviets of doing. If that be the case how is it legal? Which means that Obama Regime is in violation of both the U.S. Constitution and Civil Rights. No nation can ever trust the good intentions of the present U.S. government. So much for Democracy in America, an absolute FARCE!
December 30, 2013 | Crooks and Liars
The German publication Der Spiegel has revealed new details about a secretive hacking unit inside the National Security Agency called the Office of Tailored Access Operations, or TAO. The unit was created in 1997 to hack into global communications traffic. Hackers inside the TAO have developed a way to break into computers running Microsoft Windows by gaining passive access to machines when users report program crashes to Microsoft. In addition, with help from the CIA and FBI, the NSA has the ability to intercept computers and other electronic accessories purchased online in order to secretly insert spyware and components that can provide backdoor access for the intelligence agencies. American Civil Liberties Union Deputy Legal Director Jameel Jaffer and journalist Glenn Greenwald join Democracy Now! to discuss the latest revelations, along with the future of Edward Snowden.
Glenn Greenwald:
"I think everybody knows by now, or at least I hope they do after the last seven months reporting, that the goal of the NSA really is the elimination of privacy worldwide-not hyperbole, not metaphor, that's literally their goal, is to make sure that all human communications that take place electronically are collected and then stored by the NSA and susceptible to being monitored and analyzed. But the specifics are still really important to illustrate just the scope and invasiveness and the dangers presented by this secret surveillance system.
And what the Der Spiegel article details is that one of the things that the NSA is really adept at doing is implanting in various machines-computers, laptops, even cellphones and the like-malware. And malware is essentially a program that allows the NSA, in the terminology that hackers use, to own the machine. So, no matter how much encryption you use, no matter how much you safeguard your communication with passwords and other things, this malware allows the NSA to literally watch every keystroke that you make, to get screen captures of what it is that you're doing, to circumvent all forms of encryption and other barriers to your communications."
Democracy Now!
AMY GOODMAN: So, I mean, just to be really specific, you order a computer, and it's coming UPS, or it's coming FedEx, and they have it redirected to their own-you know, to the NSA, and they put in the malware, the spyware, and then send it on to you?
GLENN GREENWALD: Correct. That's what the Der Spiegel report indicates, based on the documents that they've published. But we've actually been working, ourselves, on certain stories that should be published soon regarding similar interdiction efforts.
And one of the things that I think is so amazing about this, Amy, is that the U.S. government has spent the last three or four years shrilly, vehemently warning the world that Chinese technology companies are unsafe to purchase products from, because they claim the Chinese government interdicts these products and installs surveillance, backdoors and other forms of malware onto the machinery so that when you get them, immediately your privacy is compromised. And they've actually driven Chinese firms out of the U.S. market and elsewhere with these kinds of accusations. Congress has convened committees to issue reports making these kind of accusations about Chinese companies.
And yet, at the same time, the NSA is doing exactly that which they accuse these Chinese companies of doing. And there's a real question, which is: Are these warnings designed to steer people away from purchasing Chinese products into the arms of the American industry so that the NSA's ability to implant these devices becomes even greater, since now everybody is buying American products out of fear that they can no longer buy Chinese products because this will happen to them?
... ... ...
AMY GOODMAN: Let's get back to Glenn Greenwald. Glenn, I just read the first couple of paragraphs of the piece in Der Spiegel about the garage doors that wouldn't open because the garage door openers were actually operating on the same frequency of the NSA, which was really vastly expanding in San Antonio at the time. But could you take it from there? The significance of this and this Tailored Access Operations, this particular unit, and how significant it is?
GLENN GREENWALD: Yeah, one thing I think that it underscores, this was in a community that had no idea that there was this gargantuan NSA hacking unit that had sprawled up in its community, and it shows just the power of how much they're doing, that they just simply shut down the electric devices of an entire community that didn't know that they were even there.
But the TAO, the Tailored Access Operations unit, is really remarkable because the government, the U.S. government, has been warning for many years now about the dangers of hackers, both stateless hackers as well as state-sponsored hackers from China and from Iran and from elsewhere. And the reality is that nobody is as advanced or as prolific when it comes into hacking into computer networks, into computer systems, than the NSA. And TAO is basically a unit that is designed to cultivate the most advanced hacking operations and skills of any unit, any entity on the Earth. And so, yet again, what we find is that exactly the dangers about which the U.S. government is shrilly warning when it comes to other people, they're actually doing themselves to a much greater and more menacing degree than anybody else is. And that's the significance of this particular unit inside of the NSA, is they do all of the most malicious hacking techniques that hackers who have been prosecuted by this very same government do and much, much more.
12/30/2013 | Zero Hedge
Following up on the latest stunning revelations released yesterday by German Spiegel which exposed the spy agency's 50 page catalog of "backdoor penetration techniques", today during a speech given by Jacob Applebaum (@ioerror) at the 30th Chaos Communication Congress, a new bombshell emerged: specifically the complete and detailed description of how the NSA bugs, remotely, your iPhone. The way the NSA accomplishes this is using software known as Dropout Jeep, which it describes as follows: "DROPOUT JEEP is a software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted."
The flowchart of how the NSA makes your iPhone its iPhone is presented below:
- NSA ROC operator
- Load specified module
- Send data request
- iPhone accepts request
- Retrieves required SIGINT data
- Encrypt and send exfil data
- Rinse repeat
And visually:
What is perhaps just as disturbing is the following rhetorical sequence from Applebaum:
"Do you think Apple helped them build that? I don't know. I hope Apple will clarify that. Here's the problem: I don't really believe that Apple didn't help them, I can't really prove it but [the NSA] literally claim that anytime they target an iOS device that it will succeed for implantation. Either they have a huge collection of exploits that work against Apple products, meaning that they are hoarding information about critical systems that American companies produce and sabotaging them, or Apple sabotaged it themselves. Not sure which one it is. I'd like to believe that since Apple didn't join the PRISM program until after Steve Jobs died, that maybe it's just that they write shitty software. We know that's true."
Or, Apple's software is hardly "shitty" even if it seems like that to the vast majority of experts (kinda like the Fed's various programs), and in fact it achieves precisely what it is meant to achieve.
Either way, now everyone knows that their iPhone is nothing but a gateway for the NSA to peruse everyone's "private" data at will. Which, incidentally, is not news, and was revealed when we showed how the "NSA Mocks Apple's "Zombie" Customers; Asks "Your Target Is Using A BlackBerry? Now What?"
How ironic would it be if Blackberry, left for dead by virtually everyone, began marketing its products as the only smartphone that does not allow the NSA access to one's data (and did so accordingly). Since pretty much everything else it has tried has failed, we don't see the downside to this hail mary attempt to strike back at Big Brother and maybe make some money, by doing the right thing for once.
We urge readers to watch the full one hour speech by Jacob Applebaum to realize just how massive Big Brother truly is, but those who want to just listen to the section on Apple can do so beginning 44 minutes 30 seconds in the presentation below.
fuu:
"This functionality includes the ability to remotely push/pull files from the device."
- Super handy for:
- Planting kiddie porn on a phone.
- Planting images of pressure cookers on a phone.
- Planting contact lists on a phone.
- Planting calendar events on a phone.
- Planting internet history on a phone.
- Planting GPS history on a phone.
Bad Attitude
Very good points. I hope criminal defense attorneys are paying attention. Evidence collected from phones or computers cannot be trusted.
Forward (over the cliff).
DaveyJones
Great comment. And the best example of how "modern technology" is a blessing and a curse. A despot's wet dream to track everywhere you go, everything you say, and when you say something wrong, to correct your "criminal record"
It' a nightmare
Dave Thomas
Remember that pesky national ID card they kept talking about 2005~2008? Guess we don't need one now lol.
sleigher
It is just complete and total own! That is all... They have to survive across reboots/rebuilds and access "new" deployments. Can't do that with just the software.
I just like the sound of the thousands of voices screaming out from the conspiratard websites across the planet for total vindication. I have read about hacks like these for years and seen many shoot them down about tin foil hats and all that nonsense.
Just wait til we hear about the built in radios in all modern cpu's that can be activated by satellite. Then will people get mad? no...
tip e. canoe
BUT BUT BUT, if BB is compromised, that would mean that all the Truly Useful Idiots that have been using BB phones thinking they were secure are compromised too!!! that would mean the entire System could be manipulated by anyone who has access to that closet full of dirty secrets!!!
Holy Spitzer, Batman!!!
NoDebt
I've always assumed my cell phone was an open book to government agencies just like I've always assumed that Social Security won't be there for me when I retire.
The only thing left in both cases is the proof.
In the cell phone/computer tracking stuff... we'll know soon enough. It's heading to the Supreme Court where Roberts will likely be the deciding vote, as he was on Obamacare. Then we won't have to argue whether it's Constitutional or not. It will be deemed Constitutional, with few if any limits, and that will be the end of the discussion.
December 06, 2013
Soulskill&
chicksdaddy writes "The Federal Trade Commission announced on Thursday that it settled with the maker of 'Brightest Flashlight Free,' a popular Android mobile application, over charges that the company used deceptive advertising to collect location and device information from Android owners.
The FTC says the company failed to disclose wanton harvesting and sharing of customers' locations and mobile device identities with third parties. Brightest Flashlight Free, which allows Android owners to use their phone as a flashlight, is a top download from Google Play, the main Android marketplace.
Statistics from the site indicate that it has been downloaded more than one million times with an overall rating of 4.8 out of 5 stars.
The application, which is available for free, displays mobile advertisements on the devices it is installed on.
However, the device also harvested a wide range of data from Android phones which was shared with advertisers, including what the FTC describes as 'precise geolocation along with persistent device identifiers.'
As part of the settlement with the FTC, Goldenshores is ordered to change its advertisements and in-app disclosures to make explicit any collection of geolocation information, how it is or may be used, the reason for collecting location information and which third parties that data is shared with."
A research paper from the University of Cambridge has outlined how PIN numbers used on smartphones can be recorded by hijacking the device's camera and microphones.
The news is especially worrying as the rise of mobile banking means that PIN numbers entered into smartphones are often used to secure more than just the phone's basic functionality.
The researchers, Laurent Simon and Ross Anderson, used a custom piece of software called PIN Skimmer to grab the PIN numbers. This program hijacks phones' microphones to detect when you tap the touchscreen and then syncs this with data from the camera to work out where on the screen you pressed.
For example, when right-handed individuals press a button in the top left hand corner of their phone's screen they often tilt the phone towards their thumb with their supporting fingers. This changes position of the user's face as recorded by the front-facing camera, giving the program a unique marker that corresponds with a number on screen.
The research was carried out on a pair of Android-powered smartphones, a Nexus S and Galaxy S3, and under test conditions PIN Skimmer was able to work out more than 50 per cent of four digit PIN numbers after five attempts and 60 per cent of eight digit numbers after ten attempts.
One step in the malware's process even presents users with a game where they have to match pairs of icons that appear onscreen. The program can record data from the camera during the game and then use this as a reference guide, matching how the user appears in the camera to where they've touched the screen.
The researchers suggested methods of obstructing the malware, but noted that randomising the order in which numbers appear on an onscreen keypad would "cripple usability" whilst employing longer PIN number would affect "memorability and usability".
More "drastic" solutions included getting rid of passwords altogether in favour of face recognition or fingerprint scanners, although neither of these methods are yet common.
"If you're developing payment apps [for mobiles], you'd better be aware that these risks exist," Professor Anderson told the BBC.
Xunlei - a BitTorrent service primarily used in China and backed by Google - was caught spreading malware to both Windows PCs and Android devices
A Google-backed file sharing service has been discovered spreading malware to thousands of Windows and Android users.An investigation by security company Eset has revealed that Xunlei has been spreading malware named "Win32/Kankan" to Windows and Android users, signed with the company's security certificate.
The malware is classed as a Trojan, and only affected Chinese users, according to Eset.
"The company officially admitted during a press conference that some of its employees have used company resources to create and distribute this program. The degree to which Xunlei Networking Technologies is implicated is hard to tell from the outside," said Joan Calvet from Eset in a blog post.
The Xunlei software is very popular in China and has about 30% of world BitTorrent users, making it the most used BitTorrent client for the service, which allows peer-to-peer file sharing. The BitTorrent protocol breaks each file to be shared into small chunks and sends them across the internet between computers. Parts of the complete file can be hosted on many different computers, and the whole reconstructed by pulling the parts from different machines.
Effectively evading detection
It is unclear how the malware, which was specifically programmed to avoid detection by security software and analysts, was initially spread.
A "dropper" program named "INPEnhSetup.exe" posed as a Windows installer, which once activated contacted a server across the internet – a domain owned and operated by Xunlei - and "dropped" or installed three further malicious programs onto the system.
One of the programs, a plugin for the Microsoft Office applications Word, Excel and PowerPoint, then installed itself within the Windows Registry, ensuring that it was loaded every time an Office application is run.
When run, the Office plugin scanned the computer for analysis tools such as the Windows task manager, and quickly shut down if one was found running on the system, effectively evading detection by the computer user or a security analyst.
If the program failed to detect any running computer analysis tools, it began sending user information such as the version of Windows being used to a remote server.
Silently installing applications onto Android phones
The malware also included an updater that automatically checked a server for new versions of the programs, installing updates when they became available.
Another application installed alongside the Office plugin silently installed applications onto Android phones that were connected to the infected computer.
Using the USB connection, the "installphoneapp" installed applications, including three separate Chinese app stores, and a phone call app that claimed to offer cheap phone calls.
"Overall, the motivation behind the installation of these particular mobile applications remains unknown," said Calvet.
The applications were only installed if the Android phone connected had a security setting disabled, which enables developer actions over USB on the phone – something often required for Android software modifications and operating system customisation, as well as by certain Android backup programs.
"We've seen desktop malware attempt to install Android malware before, but not through the application of Android's ADB. Pushing it to Android phones like that is novel," said Rik Ferguson vice president of security research at Trend Micro.
A lot of mobile malware is specific to China
The focus on China meant that the risk of the Trojan spreading was low, according to Ferguson.
"Of course, the risk of Android malware infection is massively increased by rooting, which this malware example partly targeted, because you are specifically disabling crucial built-in security services," he said.
More rooted phones exist in China, mainly due to the restrictions on apps and services, which require users to circumvent blocks to get access to many of the applications freely available in the UK and the US.
"We see a lot of mobile malware that is specific to China, like a lot of other malware," explained Ferguson. "For example, we see malware targeted at stealing virtual goods in gaming environments only in China."
According to data collected by Trend Micro, there are 1.15m malicious or high-risk Android apps currently circulating as of 12 October, which is significantly higher than estimates based on malware growth seen in 2012, showing that the problem is increasing dramatically.
Pushing the installer out to infected machines
It remains unclear whether Xunlei's BitTorrent client was used to spread the malware. Since August, Xunlei made available an uninstaller application, which users could download and remove the problem manually.
Using the company owned and operated servers, which the malware automatically contacted, Xunlei also pushed out the installer to infected machines.
According to Eset's data, the daily number of infections has dropped significantly since Xunlei's remedial actions.
• In August, Windows malware was found lurking within the KFC app for Android.
• Malware named "Zeus" was discovered in 2011 to infect both Windows and Android devices, stealing banking details.
October 16, 2013
Russian anti-virus company Doctor Web is warning users about a new Trojan for Android that is stealing confidential information from South Korean users. It is similar to other Trojans for Android, but unlike other malignant programs with a comparable payload, it exploits an Android vulnerability to bypass anti-virus scanning, which significantly increases the potential risk for Android device owners. Currently, the program's main home turf is South Korea; however, its future modifications will likely spread to other countries.The new Trojan, dubbed by Dr.Web as Android.Spy.40.origin, is spread by means of unwanted SMS messages containing a link to an apk file. Among cybercriminals in Southeast Asia (mainly South Korea and Japan), it is currently one of the most popular techniques for spreading Android malware. Once Android.Spy.40.origin is installed and launched, it requests access to OS administrative features, removes its icon from the main screen, and covertly maintains its operation in the system.
Then the Trojan connects to a remote server from which it receives further instructions. In particular, Android.Spy.40.origin can perform the following tasks:
- Intercept inbound short messages and upload them to the server (messages are hidden from the user).
- Block outgoing calls.
- Send a list of contacts or installed applications to the server.
- Remove or install the application specified in the received command.
- Send a message with a defined text to a specified number.
This malicious program can pose a severe threat because it intercepts messages that may contain confidential information, personal and business correspondence, bank account information and mTAN-codes used to verify transactions. In addition, the contacts list acquired by cybercriminals can then be used to send bulks of SMS spam and mount phishing attacks.
However, Android.Spy.40.origin's principal distinguishing feature is its ability to exploit an Android vulnerability to avoid detection by anti-viruses. To conceal the malware, attackers modified the Trojan's apk file (an apk file is a standard zip archive with a different extension).
According to the zip file's format specification, the archive header for each compressed file within it includes the field 'General purpose bit flag'. A zero bit fixed in this field indicates that the files in the archive are encrypted (password protected). In other words, despite the absence of a password, when a bit is set to 1, the file must be treated as encrypted.
As you can see in the picture above, under normal circumstances, a password prompt is displayed when one tries to unpack such zip files, but due to a flaw in Android, the zero bit is ignored, which allows a program to be installed. In contrast with an operating system that has this vulnerability, various anti-virus programs are obligated to correctly handle the field 'General purpose bit flag', and as such, assume that the file is password-protected and thus not in need of scanning even if the definition for the malicious file contained in the apk package is in the virus database.
Doctor Web's engineers promptly made adjustments to its Dr.Web for Android anti-virus so that it successfully detects malware that makes use of the exploit described above. However, Android users are strongly recommended to exercise caution and refrain from installing suspicious applications and clicking on links in unwanted SMS messages.
November 01, 2012 | Computerworld Blogs
Android 4.2 marks the launch of a powerful new security system built right into the platform. The key component is a real-time app scanning service that instantly checks apps put on your device for any malicious or potentially harmful code.
The feature is an extension of the security technology Google introduced for the Play Store this past February. While that technology worked exclusively on the server side, analyzing apps that were uploaded to the Play Store, the new system works with your device and scans any apps you install from third-party sources (a process known as "sideloading").
"We view security as a universal thing," Android VP of Engineering Hiroshi Lockheimer tells me. "Assuming the user wants this additional insurance policy, we felt like we shouldn't exclude one source over another."
Following typical Google fashion, the new scanning service is completely opt-in: The first time you install an app from a source other than the Play Store -- including a third-party app market like Amazon's app store -- Android pops up a box asking if you want such applications to be checked for "harmful behavior." (There's also a checkbox in the "Security" section of the 4.2 system settings that lets you turn the service on or off at any point.)
Initial confirmation aside, everything with the new security system happens seamlessly and almost instantaneously behind the scenes. Whenever you sideload an app, your phone sends identifying information about the program to Google's servers. Google's servers then analyze the info and compare it with the company's database of known applications.
"We have a catalog of 700,000 applications in the Play Store, and beyond that, we're always scanning stuff on the Web in terms of APKs that are appearing," Lockheimer says. "We have a pretty good understanding of the app ecosystem now, whether something's in the Play Store or not."
If Google's servers recognize the app as a known safe program, your installation will continue uninterrupted. If it matches it to an app that's known to be dangerous, meanwhile -- a designation Lockheimer says is extremely rare for the platform -- the system will prevent you from installing it. And if the app raises some red flags but no definite evidence of harm, the system will alert you of the situation and let you decide whether you want to proceed.
All of that happens in a split second. I tried sideloading some apps onto my Nexus 4 review unit, and following the initial opt-in confirmation, I couldn't detect any noticeable delay in the process compared to what happens on pre-4.2 devices.
"The server does all the hard work," Lockheimer explains. "The device sends only a signature of the APK so that the server can identify it rapidly."
(Incidentally, Lockheimer tells me the new functionality is not related to Google's recent acquisition of VirusTotal, a startup focused on online malware scanning; rather, it's based completely on the app-scanning technology announced for the Play Store back in February.)
Accompanying the system is a new and improved app permissions screen -- the screen that shows up anytime you install an app from outside of the Play Store. The new Android 4.2-level screen is cleaned up and far easier to read than what we've seen in the past.
And last but not least, Android 4.2 has an added behind-the-scenes feature that alerts you anytime an app attempts to send a text message that could cost you money. If an app tries to send an SMS to a known fee-collecting short code -- a number that'd automatically bill your carrier when it receives a message -- the system jumps in and alerts you to the action. You can then opt to allow or deny the process.
Apr 5. 2013 | stackoverflow.com
Q:
As I have understood correctly, Android 4.2 introduced SELinux enabled by default on kernel. am I right? Is there anyway to disable it?
There are some of the apps might not work correctly.
Ex. Use mount command system wide stopped working
Is there anyway to disable it ? I check on VZW Galaxy Nexus - build JDQ39 - I am not sure what is the Linux version - Either SELinux or Linux.
What is the benefit of using SELinux VS Linux on android device.
A:
No, it isn't enabled by default. There really isn't such a thing as enabled by default on Android, each handset manufacturer sets the configuration and makes modifications when they make a new device. Even if AOSP had it enabled by default in their kernels (which it doesn't) manufacturers would have to enable it in their kernels.
SELinux is Linux, with mandatory access controls. Please read up on SELinux.
Even devices that will ship with SE Android (SELinux + Android middleware MAC) soon (e.g., the Galaxy S IV) has it in permissive mode by default. You'd need an MDM client to set it to enforcing.
It is possible to bypass the mount issue.
The trick is to use adb on the device itself to connect locally to the device and issue the mount command through that. When running in adb you seem to get out of whatever jail prevents mount from working in apps. I don't think it's SELinux releated, it seems to have something to do with multiuser security and apparently lives mostly in the Android api's rather than at the kernel level (console apps should access the mounts fine).
With 4.2.2 it's a bit harder as you now need a key setup for adb.
Have a look here, it's for the Nexus 10 but the basic principles should work on anything.
July 1, 2013
Cybercriminals adopt commercial availability DIY Android application decompiler/injector developed to work exclusively with a publicly obtainable Android-based trojan horse, security expert Dancho Danchev explains how it is possible to manage Android botnets in a recent post, using commercially available tools it is possible to inject a pre-configured Android trojan client into any applications.
The diffusion of malicious agents is possible in various ways depending on attackers, the botmaster could spread the malware using compromised Web servers or through DIY Google Dorks based hacking tools "and instead of monetizing the traffic by serving client-side exploits, they can filter and redirect all the mobile device traffic to a fraudulent/malicious Android application."
The offer is very attractive also due the cheap price, only $37 for this injector tool, in the following image a few screenshots of the application in action.
Apparently the Android trojan has been designed by a group of four students for a university project and has all the feature for this category of malware. Fortunately the malware has an hardcoded reference to a centralized C&C infrastructure that make it easy to trace and bring down. The malware uses no-ip.org as Dynamic DNS services to address to its control infrastructure.
It could be activated both via phone call or SMS and according the post it has the following features:
- the capacity to steal an affected user's entire address book including all the relevant contact information
- get the incoming/outgoing calls history
- get all the messages (SMS/MMS)
- network/GPS based location tracking
- real-time monitoring of incoming calls or messages
- the ability to make a phone call/send messages with the user's his Caller ID
- activate the device's microphone
- initiate outgoing video streams
- visit any given URL
- forced vibration of the device
An interesting phenomenon observed by security researchers is the cybercriminal ecosystem is that criminals are also showing an increasing interest in buy verified Google Play accounts, exploiting their reputation in fact they could distribute Android bots to the users who trust/recommend a particular developer.
Mobile malware black market is still not well developed for now, because cybercriminals mostly use to directly attack mobile platforms instead to sell exploit toolkits and mobile malware. Andrey Komarov from security firm Group-IB told me in a previous interview that the key properties of mobile malware for cybercrime are:
- Using of well known brands including graphical design of famous applications or legal entities (financial institutions, e-commerce, stock/e-trading applications, applications for social networking and etc.);
- The need of entering SMS or making phone calls to other numbers (sometimes it is done silently after mobile malware will be installed on the system);
- 65% of installations – only on "jailbreaked" devices, 20% – through low verification of applications, 15% – through wireless channels (NFC, WPAN networks).
Security Expert are sure that we will assist to an explosion in the diffusion of mobile malicious infrastructures and in particular for Android botnets, we must be prapared.
September 06, 2013 | CSO
A dangerous Trojan that targets Google's Android mobile operating system has gained new nefarious capabilities even as a new banking malware takes aim at the OS, according to security researchers.
Kaspersky Lab reported that mobile botnets are being used to distribute the Obad.a Trojan, which can gain administrative rights on an Android device -- allowing its masters to do pretty much anything they want with a handset.
Meanwhile, Eset revealed that a bad app it discovered earlier this month -- Hesperbot -- is actually a mobile banking Trojan along the lines of Zeus and SpyEye, but with significant implementation differences that make it a new malware family.
The Obad.a Trojan has been closely watched by Kaspersky since the beginning of the summer, but it wasn't until recently that researchers uncovered the unusual distribution method its handlers have been deploying.
"For the first time, malware is being distributed using botnets that were created using completely different mobile malware," Kaspersky researcher Roman Unuchek wrote in a blog.
Such distribution techniques are common in the desktop world, but their arrival in the mobile space is another indicator that Android is becoming the mobile equivalent of Windows for hackers.
"This approach, like other aspects of the Obad operation, mimics what we've been seeing in the desktop ecosystem," Roel Schouwenberg, a senior researcher at Kaspersky, said in an email.
"In the Windows and Linux world, it's very common for malware and botnets to install other types of malware for pay," he added. "So it's likely that we'll see further adoption of this strategy in the mobile space as well."
Handsets are initially infected with the botnet software SMS.AndroidOS.Opfake.a through a poisoned link in an SMS message.
The link promises to deliver a new MMS message to the target. If clicked, the botware will be downloaded and the target asked to run it. If the target complies, SMS messages with the same MMS pitch will be sent to everyone on the target's contact list. In addition, the botware will download Obad.a, which sets up a backdoor on the handset that allows a botmaster to remotely control the device.
Other more conventional means are also used to distribute Obad.a, including SMS spam, links to fake Google Play stores and redirection from poisoned websites.
That kind of multi-vector infection strategy isn't common yet in the mobile world. "Right now, Obad is setting a new standard," Schouwenberg said. "We're still quite a bit away from multiple infection vectors being the norm rather than the exception."
Up to now, Obad.a activity has been directed at populations in the states of the old Soviet Union, although there has been some spillover into other countries. "For now, other countries are not where the attackers' focus seems to be," Schouwenberg said.
Hesperbot also appears to have a limited geographic distribution -- primarily Turkey and the Czech Republic. However, the campaign, may expand. "It's quite likely we'll see more instances of this as time goes by," Eset Security Evangelist Stephen Cobb said in an interview. "I would expect we'll see more attacks in more countries."
Hesperbot is spread by luring targets to an infected website with a poisoned link embedded in an email or SMS message. The Czech scam sent targets to a website closely modeled on the landing page of the country's postal service.
"The aim of the attackers is to obtain login credentials giving access to the victim's bank account and to get them to install a mobile component of the malware on their Symbian, Blackberry or Android phone," Eset researcher Robert Lipovsky wrote in a blog.
He described Hesterbot as a very potent banking Trojan with features such as keystroke logging, creation of screenshots and video capture, setting up a remote proxy, creating a hidden VNC server on an infected system, intercepting network traffic and HTML injection.
Other banking Trojans, like Zeus and SpyEye, perform those functions, too; what sets Hesperbot apart is its use of new code to do those tasks. "It's not made with SpyEye or Zeus code," Evangelist Cobb said. "That might sound like a technical distinction, but the fact that someone went to the trouble to write a brand-new banking Trojan is indicative of the appeal that remains for the software."
That appeal will likely grow. "As more mobile capabilities are rolled out and mobile payments become more widespread and ubiquitous, malware is going to follow," said George Tubin, senior security strategist at Trusteer, an IBM company. "We're right at the beginning of it now."
He explained that improved security measures at larger banks have been driving cyber robbers downstream to mid- and small-sized banks. "Now, they'll also be moving into the mobile channel, because banks haven't deployed very sophisticated fraud detection technologies there yet," Tubin said.
Nevertheless, mobile infections can be avoided if a user is willing to avoid high-risk behavior. "They're not going to get infected if they stick to downloading apps from Google Play or their employer's app store," Randy Abrams, a research director at NSS Labs, said in an interview.
"There have been exceptions, and Google has allowed infected apps into their store," he continued, "but the majority of apps on Google Play are going to be very safe -- as long as you don't consider compromising your privacy a safety issue."
August 13, 2013 | Network World
Asian cybercriminals have figured out an unusual way to use the architecture of a mobile ad network to siphon money from their victims.The new method represents another step in the evolution of mobile malware, which is booming with more smartphones shipping than PCs. Mobile ad networks open up the perfect backdoor for downloading code.
"It's a very, very clean infection vector," said Wade Williamson, a senior security analyst at Palo Alto Networks who discovered the new trickery.
In legitimate partnerships between ad distributors and developers, the latter embeds the former's software development kit (SDK) into the app, so it can download and track ads in order to split revenue.
Unfortunately, how well developers vet the ad networks they side with varies from one app maker to another. If the developer does not care or simply goes with the highest bidder, then the chances of siding with a malicious ad network is high.
Wiliamson found one such network's SDK embedded in legitimate apps provided through online Android stores across Asian countries, such as Malaysia, Taiwan and China. Once installed, the SDK pulls down an Android application package file (APK) and runs it in memory where the user cannot easily discover it.
The APK typically waits until another app is being installed before triggering a popup window that seeks permission to access Android's SMS service.
"It doesn't have to go through the whole process of doing a full install," Williamson said. "It just sits there and waits on the smartphone to install something else and then piggybacks in."
Once installed, the APK takes control of the phone's messaging service to send text to premium rate numbers and to download instructions from a command and control server. The majority of Android malware today, 77 percent, wring money from victims through paid messaging services, said Juniper Networks' latest mobile threat report.
Williamson has seen more than a half dozen samples of the latest malware, which he believes is coming from one criminal group, while acknowledging multiple groups is possible.
Android users in Asia and Russia are more susceptible to Android malware, because many apps are downloaded from independent online stores. In the U.S., most Android users take apps from the Google Play store, which scans for malware and malicious ad networks.
Because of the effectiveness of the latest malware, Williamson expects criminals in the future to use the same scheme to download more insidious malware capable of stealing credentials to online banking and retail sites where credit card numbers are stored.
The same pathway could also be used to steal credentials for entering corporate networks.
"As soon as you have a vector like this, the difference between creating malware that sends spoof SMS messages versus looks for the network and tries to break in is just malware functionality," Williamson said.
Read more about wireless/mobile security in CSOonline's Wireless/Mobile Security section.
Bloomberg
Microsoft Bugs
Microsoft Corp. (MSFT), the world's largest software company, provides intelligence agencies with information about bugs in its popular software before it publicly releases a fix, according to two people familiar with the process. That information can be used to protect government computers and to access the computers of terrorists or military foes.
Redmond, Washington-based Microsoft (MSFT) and other software or Internet security companies have been aware that this type of early alert allowed the U.S. to exploit vulnerabilities in software sold to foreign governments, according to two U.S. officials. Microsoft doesn't ask and can't be told how the government uses such tip-offs, said the officials, who asked not to be identified because the matter is confidential.
Frank Shaw, a spokesman for Microsoft, said those releases occur in cooperation with multiple agencies and are designed to give government "an early start" on risk assessment and mitigation.
In an e-mailed statement, Shaw said there are "several programs" through which such information is passed to the government, and named two which are public, run by Microsoft and for defensive purposes.
Willing Cooperation
Some U.S. telecommunications companies willingly provide intelligence agencies with access to facilities and data offshore that would require a judge's order if it were done in the U.S., one of the four people said.
In these cases, no oversight is necessary under the Foreign Intelligence Surveillance Act, and companies are providing the information voluntarily.
The extensive cooperation between commercial companies and intelligence agencies is legal and reaches deeply into many aspects of everyday life, though little of it is scrutinized by more than a small number of lawyers, company leaders and spies. Company executives are motivated by a desire to help the national defense as well as to help their own companies, said the people, who are familiar with the agreements.
Most of the arrangements are so sensitive that only a handful of people in a company know of them, and they are sometimes brokered directly between chief executive officers and the heads of the U.S.'s major spy agencies, the people familiar with those programs said.
... ... ...
Committing Officer
If necessary, a company executive, known as a "committing officer," is given documents that guarantee immunity from civil actions resulting from the transfer of data. The companies are provided with regular updates, which may include the broad parameters of how that information is used.
Intel Corp. (INTC)'s McAfee unit, which makes Internet security software, regularly cooperates with the NSA, FBI and the CIA, for example, and is a valuable partner because of its broad view of malicious Internet traffic, including espionage operations by foreign powers, according to one of the four people, who is familiar with the arrangement.
Such a relationship would start with an approach to McAfee's chief executive, who would then clear specific individuals to work with investigators or provide the requested data, the person said. The public would be surprised at how much help the government seeks, the person said.
McAfee firewalls collect information on hackers who use legitimate servers to do their work, and the company data can be used to pinpoint where attacks begin. The company also has knowledge of the architecture of information networks worldwide, which may be useful to spy agencies who tap into them, the person said.
McAfee's Data
McAfee (MFE)'s data and analysis doesn't include information on individuals, said Michael Fey, the company's worldwide chief technology officer.
"We do not share any type of personal information with our government agency partners," Fey said in an e-mailed statement. "McAfee's function is to provide security technology, education, and threat intelligence to governments. This threat intelligence includes trending data on emerging new threats, cyber-attack patterns and vector activity, as well as analysis on the integrity of software, system vulnerabilities, and hacker group activity."
In exchange, leaders of companies are showered with attention and information by the agencies to help maintain the relationship, the person said.
In other cases, companies are given quick warnings about threats that could affect their bottom line, including serious Internet attacks and who is behind them.
... ... ...
The information provided by Snowden also exposed a secret NSA program known as Blarney. As the program was described in the Washington Post (WPO), the agency gathers metadata on computers and devices that are used to send e-mails or browse the Internet through principal data routes, known as a backbone.
... ... ...
MetadataThat metadata includes which version of the operating system, browser and Java software are being used on millions of devices around the world, information that U.S. spy agencies could use to infiltrate those computers or phones and spy on their users.
"It's highly offensive information," said Glenn Chisholm, the former chief information officer for Telstra Corp (TLS)., one of Australia's largest telecommunications companies, contrasting it to defensive information used to protect computers rather than infiltrate them.
According to Snowden's information, Blarney's purpose is "to gain access and exploit foreign intelligence," the Post said.
It's unclear whether U.S. Internet service providers gave information to the NSA as part of Blarney, and if so, whether the transfer of that data required a judge's order.
... ... ...
Einstein 3
U.S telecommunications, Internet, power companies and others provide U.S. intelligence agencies with details of their systems' architecture or equipment schematics so the agencies can analyze potential vulnerabilities.
"It's natural behavior for governments to want to know about the country's critical infrastructure," said Chisholm, chief security officer at Irvine, California-based Cylance Inc.
Even strictly defensive systems can have unintended consequences for privacy. Einstein 3, a costly program originally developed by the NSA, is meant to protect government systems from hackers. The program, which has been made public and is being installed, will closely analyze the billions of e-mails sent to government computers every year to see if they contain spy tools or malicious software.
Einstein 3 could also expose the private content of the e-mails under certain circumstances, according to a person familiar with the system, who asked not to be named because he wasn't authorized to discuss the matter.
AT&T, Verizon
Before they agreed to install the system on their networks, some of the five major Internet companies -- AT&T Inc. (T), Verizon Communications Inc (VZ)., Sprint Nextel Corp. (S), Level 3 Communications Inc (LVLT). and CenturyLink Inc (CTL). -- asked for guarantees that they wouldn't be held liable under U.S. wiretap laws. Those companies that asked received a letter signed by the U.S. attorney general indicating such exposure didn't meet the legal definition of a wiretap and granting them immunity from civil lawsuits, the person said.
Slashdot
"What is your computer actually DOING when you click on a link in a phishing email? Sherri Davidoff of LMG Security released these charts of an infected computer's behavior after clicking on a link in a Blackhole Exploit Kit phishing email. You can see the malware 'phone home' to the attacker every 20 minutes on the dot, and download updates to evade antivirus. She then went on to capture screenshots and videos of the hacker executing a man-in-the-browser attack against Bank of America's web site. Quoting: 'My favorite part is when the attacker tried to steal my debit card number, expiration date, security code, Social Security Number, date of birth, driver's license number, and mother's maiden name– all at the same time. Nice try, dude!!'"
3.5 stripes
Well, you were dumb enough (Score:1, Insightful)
to click on the attachment in the first place, you've already set the bar for your intelligence
minstrelmike
Re:Well, you were dumb enough (Score:5, Insightful)
Actually, there are two different populations of phish messages going around now. One of them surprisingly enough is full of misspellings and odd grammar in a tale about a Nigerian prince. If folks click on that, the senders know they have a live one.
But the other phishing schemes are subtle. I think reasonably intelligent folks who skim emails (instead of read them), especially on a tiny smart-phone/blackberry screen, are just liable to click to someplace nasty. After all, ain't no one 100% right 100% of the time.
Synerg1y
Re: Well, you were dumb enough (Score:4, Insightful)
There's a very basic question that needs to be asked by people: why am I getting this email? If you can't figure it out, a siren should go off in your mind as to what this could be.
I do feel bad for anybody that's been caught by this, technical ineptitude is not a valid reason to get your money stolen, especially considering the average age of the victims (it's up there).
Kenja
Re:Nice try? (Score:4, Informative)
BofA actually has VERY good online security.
If setup right, you should be shown a picture you choose to confirm that you are on the legit site. Then in addition to your password, you can setup a system where a six digit numeric token is sent to your cell phone which is also needed to authenticate.
Anonymous CowardIt's Quite A Bit More Than That (Score:1)
So a link in a malicious email can compromise my Windows box and cause my web browser to navigate to addresses in a local hosts file. Welcome back to 1997.It's quite a bit more than that. Perhaps you should RTFA.
- The infection vector does not have to come via email. It can just as easily infect via drive-by on a web page.
- No hosts file involvement is necessary.
- It injects malware into the system and browser.
- The malware is self updating, to stay current and evade detection.
- The malware in the browser inserts itself into your normal online banking activity.
- It looks 100% legitimate, except for the nature of the "security verification" questions which are too far reaching to be real.
stewsters
Re:Most of the exploits.. (Score:5, Informative)
Don't use IE6. Don't use IE7. Don't Use IE8. Its 2013. Use Chrome, Firefox, or IE 10+
Install chrome, chrome://plugins/ , block automatic execution of java and flash. Make it so you need to click. Install an adblocker to reduce driveby downloads. Install noscript + ghostery if you are wearing aluminum foil on your head.
Auto install security updates. If something disables it most likely you have a virus. Keep everything up to date. Don't install toolbars or weather apps from unknown sources.
CAOgdin
I Fixed One Of These Recently (Score:5, Interesting)
This malware (which puts up the appearance of a credit/debit card and asks for all you information) calls a server in the Ukraine. It was delivered by eMail (to a naive user) and intercepts attempts to reach your financial institution via their website. It presents, after login (did they capture the login info?), a panel looking like the credit/debit card, asking for the user to fill in all information, including account number, CVC, address, and other personal information (why anyone would fill in that data is beyond me!)
After much gnashing of teeth, I discovered it was undetectable by any known virus checker I use (AVG, Malwarebytes, Spybot), so I had to dig deeper. It turned out that the malware was using any references to 127.0.0.1 (local machine) for it's hook. All I had to do was edit the HOSTS file and add the domain names of the miscreant with a reference to a different IP address that is known to be a deadend (you could, for example, use 127.7.7.7).
When the malware couldn't execute, it couldn't disable the various malware detectors, and several files were then identified and removed.
02/15/13
"Sebastian Holst makes yoga mobile apps with his wife, a yoga instructor. The Mobile Yogi is sold in all the major mobile app stores. But when someone buys his app in the Google Play store, Holst automatically gets something he says he didn't ask for: the buyer's full name, location and email address.He says consumers are not aware that Google Inc. is sharing their personal information with third parties. No other app store transmits users' personal information to third-party developers when they buy apps, he said." Oh Google.
UltraZelda64
Hopefully this applies only when "buying" an app.
If so, then I should be safe. This kind of privacy violation is just... wrong. Google seems to think that their customers automatically trust third parties or something... if anything, this demonstrates that Google themselves should not be trusted.
darknexus
RE[2]: Obviously a bug by darknexus
"If it had been a certain fruit company everyone would be rioting.
Man, it's so hard to be persecuted, eh? "
Much as I hate to be defending Apple this time, the OP is absolutely correct. There's definitely a double standard in place for Apple in the tech media, particularly though not exclusively when compared to Google.
If Apple had been the one doing this, everyone would have been up in arms, torches lit, ready to burn down Apple HQ and any other buildings around them just to make sure the deed was done.
When Google does it, not only do we get some people giving them the benefit of the doubt but we even have some that claim Google are in the right to do this. If that's not a double standard, I don't know what is. For myself, I say no app store should give
Feb. 14, 2013 | Businessweek
-- Bloomberg Businessweek's Jordan Robertson discusses why the antivirus industry has so many customers in the face of its ineffectiveness. He speaks on Bloomberg Television's "Market Makers." (Source: Bloomberg)
February 13, 2013 | MIT Technology Review
The U.S. government is developing new computer weapons and driving a black market in "zero-day" bugs. The result could be a more dangerous Web for everyone.
Every summer, computer security experts get together in Las Vegas for Black Hat and DEFCON, conferences that have earned notoriety for presentations demonstrating critical security holes discovered in widely used software. But while the conferences continue to draw big crowds, regular attendees say the bugs unveiled haven't been quite so dramatic in recent years.
One reason is that a freshly discovered weakness in a popular piece of software, known in the trade as a "zero-day" vulnerability, can be cashed in for much more than a reputation boost and some free drinks at the bar. Information about such flaws can command prices in the hundreds of thousands of dollars from defense contractors, security agencies and governments.
This trade in zero-day exploits is poorly documented, but it is perhaps the most visible part of a new industry that in the years to come is likely to swallow growing portions of the U.S. national defense budget, reshape international relations, and perhaps make the Web less safe for everyone.
Zero-day exploits are valuable because they can be used to sneak software onto a computer system without detection by conventional computer security measures, such as antivirus packages or firewalls. Criminals might do that to intercept credit card numbers. An intelligence agency or military force might steal diplomatic communications or even shut down a power plant.
It became clear that this type of assault would define a new era in warfare in 2010, when security researchers discovered a piece of malicious software, or malware, known as Stuxnet. Now widely believed to have been a project of U.S. and Israeli intelligence (U.S. officials have yet to publicly acknowledge a role but have done so anonymously to the New York Times and NPR), Stuxnet was carefully designed to infect multiple systems needed to access and control industrial equipment used in Iran's nuclear program. The payload was clearly the work of a group with access to government-scale resources and intelligence, but it was made possible by four zero-day exploits for Windows that allowed it to silently infect target computers. That so many precious zero-days were used at once was just one of Stuxnet's many striking features.
Since then, more Stuxnet-like malware has been uncovered, and it's involved even more complex techniques (see "The Antivirus Era Is Over"). It is likely that even more have been deployed but escaped public notice. Meanwhile, governments and companies in the United States and around the world have begun paying more and more for the exploits needed to make such weapons work, says Christopher Soghoian, a principal technologist at the American Civil Liberties Union.
"On the one hand the government is freaking out about cyber-security, and on the other the U.S. is participating in a global market in vulnerabilities and pushing up the prices," says Soghoian, who says he has spoken with people involved in the trade and that prices range from the thousands to the hundreds of thousands. Even civilian law-enforcement agencies pay for zero-days, Soghoian says, in order to sneak spy software onto suspects' computers or mobile phones.
Exploits for mobile operating systems are particularly valued, says Soghoian, because unlike desktop computers, mobile systems are rarely updated. Apple sends updates to iPhone software a few times a year, meaning that a given flaw could be exploited for a long time. Sometimes the discoverer of a zero day vulnerability receives a monthly payment as long as a flaw remains undiscovered. "As long as Apple or Microsoft has not fixed it you get paid," says Soghioan.
No law directly regulates the sale of zero-days in the United States or elsewhere, so some traders pursue it quite openly. A Bangkok-based security researcher who goes by the name The Grugq tweets about acting as a middleman and has spoken to the press about negotiating deals worth hundreds of thousands of dollars with government buyers from the United States and western Europe. In an argument on Twitter last month, he denied that his business is equivalent to arms dealing, as critics within and outside the computer security community have charged. "An exploit is a component of a toolchain," he tweeted. "The team that produces & maintains the toolchain is the weapon."
Some small companies are similarly up-front about their involvement in the trade. The French security company VUPEN states on its website that it
"provides government-grade exploits specifically designed for the Intelligence community and national security agencies to help them achieve their offensive cyber security and lawful intercept missions."
Last year, employees of the company publicly demonstrated a zero-day flaw that compromised Google's Chrome browser, but they turned down Google's offer of a $60,000 reward if they would share how it worked. What happened to the exploit is unknown.
No U.S. government agency has gone on the record as saying that it buys zero-days. But U.S. defense agencies and companies have begun to publicly acknowledge that they intend to launch as well as defend against cyberattacks, a stance that will require new ways to penetrate enemy computers.
General Keith Alexander, director of the National Security Agency and commander of the U.S. Cyber Command, told a symposium in Washington last October that the United States is prepared to do more than just block computer attacks. "Part of our defense has to consider offensive measures," he said, making him one of the most senior officials to admit that the government will make use of malware. Earlier in 2012 the U.S. Air Force invited proposals for developing "Cyberspace Warfare Attack capabilities" that could "destroy, deny, degrade, disrupt, deceive, corrupt, or usurp the adversaries [sic] ability to use the cyberspace domain for his advantage." And in November, Regina Dugan, the head of the Defense Advanced Research Projects Agency, delivered another clear signal about the direction U.S. defense technology is heading. "In the coming years we will focus an increasing portion of our cyber research on the investigation of offensive capabilities to address military-specific needs," she said, announcing that the agency expected to expand cyber-security research from 8 percent of its budget to 12 percent.
Defense analysts say one reason for the shift is that talking about offense introduces an element of deterrence, an established strategy for nuclear and conventional conflicts. Up to now, U.S. politicians and defense chiefs have talked mostly about the country's vulnerability to digital attacks. Last fall, for example, Defense Secretary Leon Panetta warned frankly that U.S. infrastructure was being targeted by overseas attackers and that a "digital Pearl Harbor" could result (see "U.S. Power Grids, Water Plants a Hacking Target").
Major defense contractors are less forthcoming about their role in making software to attack enemies of the U.S. government, but they are evidently rushing to embrace the opportunity. "It's a growing area of the defense business at the same time that the rest of the defense business is shrinking," says Peter Singer, director of the 21st Century Defense Initiative at the Brookings Institution, a Washington think tank. "They've identified two growth areas: drones and cyber."
Large contractors are hiring many people with computer security skills, and some job openings make it clear there are opportunities to play more than just defense. Last year, Northrop Grumman posted ads seeking people to "plan, execute and assess an Offensive Cyberspace Operation (OCO) mission," and many current positions at Northrop ask for "hands-on experience of offensive cyber operations." Raytheon prefaces its ads for security-related jobs with language designed to appeal to stereotypical computer hackers: "Surfboards, pirate flags, and DEFCON black badges decorate our offices, and our Nerf collection dwarfs that of most toy stores. Our research and development projects cover the spectrum of offensive and defensive security technologies."
The new focus of America's military and defense contractors may concern some taxpayers. As more public dollars are spent researching new ways to attack computer systems, some of that money will go to people like The Grugq to discover fresh zero-day vulnerabilities. And an escalating cycle of competition between U.S and overseas government agencies and contractors could make the world more dangerous for computer users everywhere.
"Every country makes weapons: unfortunately, cyberspace is like that too," says Sujeet Shenoi, who leads the U.S.-government-sponsored Cyber Corps Program at the University of Tulsa. His program trains students for government jobs defending against attacks, but he fears that defense contractors, also eager to recruit these students, are pushing the idea of offense too hard. Developing powerful malware introduces the dangerous temptation to use it, says Shenoi, who fears the consequences of active strikes against infrastructure. "I think maybe the civilian courts ought to get together and bar these kinds of attacks," he says.
The ease with which perpetrators of a computer attack can hide their tracks also raises the risk that such weapons will be used, Shenoi points out. Worse, even if an attack using malware is unsuccessful, there's a strong chance that a copy will remain somewhere on the victim's system-by accident or design-or accidentally find its way onto computer systems not targeted at all, as Stuxnet did. Some security firms have already identified criminal malware that uses methods first seen in Stuxnet (see "Stuxnet Tricks Copied by Criminals").
"The parallel is dropping the atomic bomb but also leaflets with the design of it," says Singer. He estimates that around 100 countries already have cyber-war units of some kind, and around 20 have formidable capabilities: "There's a lot of people playing this game."
Android spam botnet has been discovered across all major networks that sends thousands of text messages without a user's permission, TheNextWeb reported. The threat, which is known at SpamSoldier, was detected on December 3rd by Lookout Security in cooperation with an unnamed carrier partner. The malware is said to spread through a collection of infected phones that send text messages, which usually advertise free versions of popular paid games like Grand Theft Auto and Angry Birds Space, to hundreds of users each day.A new
Once a user clicks on the link to download the game, his or her phone instead downloads the malicious app. When the app is downloaded, SpamSoilder removes its icon from the app drawer, installs a free version of the game in question and immediately starts sending spam messages.
The security firm notes that the threat isn't widespread, however it has been spotted on all major carriers in the U.S. and has potential to do serious damage if something isn't done soon to stop it.
Initial reports earlier this week of a new Android malware botnet could now be erroneous, according to follow-up interviews with the security researchers who made the original claims.
Two Internet security researchers who recently reported their findings of an Android botnet that pushes spam to users' Yahoo email accounts now say they might have jumped the gun.In an update from The Wall Street Journal, the two researchers aren't as sure that their original claims about the alleged Android malware and botnet are correct.
"Chester Wisniewski, senior security adviser at Sophos, said he is rechecking his findings after Google and some other security researchers disputed findings of an Android 'botnet,' or a cluster of computers hijacked by hackers," The Journal reported in its Digits blog. "In an interview Thursday, Mr. Wisniewski said that the spam he identified generated by Yahoo??s free Web-based email service was different than normal patterns of email spam but 'we don??t know for sure that it??s coming from Android devices.'"
The other security researcher, Microsoft engineer Terry Zink, also backtracked on his original report about the alleged Android malware, stating in a follow-up post "that he also didn??t know for sure that Android devices had been compromised," according to The Journal. ??Yes, it??s entirely possible that bot on a compromised PC connected to Yahoo Mail' and inserted the 'Yahoo Mail for Android' tagline at the bottom of the spam messages 'to make it look like the spam was coming from Android devices,' he wrote."
Google, which owns and develops the Android mobile operating system, continues to deny the researchers' claims since the first reports were released. ??The evidence we??ve examined does not support the Android botnet claim," the company said in a statement through a spokesman. "Our analysis so far suggests that spammers are using infected computers and a fake mobile signature to try to bypass anti-spam mechanisms in the email platform they??re using. We??re continuing to investigate the details.?¯The original reports from the two security researchers stated that the alleged malware would get into a user's smartphone through a rogue app, which then used users?? Yahoo free email accounts to send out spam, according to an earlier story on eWEEK.com. "Microsoft engineer Terry Zink said he found spam samples coming from compromised Yahoo email accounts, but then noted that they were being sent from Android mobile devices."
??We??ve all heard the rumors, but this is the first time I have seen it?�a spammer has control of a botnet that lives on Android devices,?¯ Zink originally wrote in a blog post July 3. ??These devices log in to the user??s Yahoo Mail account and send spam. ?¦ The messages all come from Yahoo Mail servers. They are all from compromised Yahoo accounts. They are sending all stock spam, the typical pump and dump variety that we??ve seen for years.?¯
15 Jan 2013
Chinese security researchers have issued a public warning about a botnet comprised of a hazardous 1 million smartphones running Android, writes the local Xinhua News Agency.With over 150 million Android users out of a total of 420 million mobile users, China has serious reason to fear they are in great danger of getting mass-infected with the Android.Troj.mdk backdoor.
The Trojan that apparently has already compromised some 7,000 popular software pieces gives the attacker remote control over the victim's handset, collects contact lists, phone numbers, message details, geo-location data, photos or videos and pretty much whatever is stored on the compromised device. Plus, without the user's consent, it downloads useless applications that slow down the smartphone, drain the battery or generate aggressive adware.
The fact that this botnet already includes some 1 million devices means that people are not fully aware or concerned about the dangers of purchasing or downloading apps from unlicensed third-party app stores. China went so far as to ask operators to check their stores for vulnerability to protect their clients.
To protect themselves from this menace, Chinese Android users are urged to install a mobile security solution, regularly check the data traffic and call history and make sure they know and approve the permissions required by some apps they acquire from non-authorized sources.
Damballa found that in the first half of this year, the number of compromised Android devices communicating with known criminal command and control (C&C) networks grew significantly, topping out at 20,000 devices on two particularly nasty weeks. This marks a disturbing milestone in the evolution of mobile malware, since until recently, mobile exploits typically didn't involve a persistent takeover of the device and active communication with a C&C botnet. As the report concludes, "two-way Internet communication now makes the mobile market as susceptible to criminal breach activity as desktop devices."
Magnifying the risk is the fact that, as Damballa points out, many of these devices also join corporate Wi-Fi networks, where they are largely flying under the radar of existing security protocols and thus are ready agents for spreading malware to other internal systems, even PCs.
Just how easy is it to create and control an Android botnet? This was demonstrated last winter at ShmooCon by Georgia Weidman (watch an interview describing the technique here and download her presentation here).
Weidman's code inserts itself into the phone's modem driver and the rest of the telephony stack, ingeniously using the SMS messaging protocol to control the underlying malware. SMS makes a great C&C channel, according to Weidman, since it's fault-tolerant (SMS queues messages for later delivery if the network is unavailable), hard for security teams to monitor (since it's operated by the telecom carrier), and, perhaps most importantly, power-efficient. That's critical because IP traffic, over Wi-Fi or 3G, is one of the biggest smartphone battery drains. By using a lightweight protocol like SMS, botnet operators can have a relatively chatty dialog with their slave devices without tipping the owners off that something might be amiss on their phones. The downsides are that SMS instructions are limited to 160 characters, and users may eventually notice messaging charges on their phone bills.
Installation follows the typical path of getting someone to install a Trojan app. Weidman sums up the significance of this attack vector: "If attackers can get the bot installed, they can remotely control a user's phone without giving any sign of compromise to the user." The malicious beauty of a smartphone or tablet bot is the very mobility of the host; its nomadic network transience exposes the malware to more victims ... sort of like a traveling salesman with tuberculosis.
With mobile devices the new frontier for cybercrime, some basic security advice bears repeating. Mobile malware is primarily spread through native apps, which largely explains why iPhone and iPad users are less vulnerable, shielded by Apple's curated App Store. In contrast, IT should educate Android aficionados to curb urges toward download promiscuity, since the Android Marketplace is open to anyone and doesn't perform any security checks before publishing an app. Sure, Android forces apps to inform users of the phone features it needs, but there is nothing to prevent it from abusing the privilege. Even seemingly benign capabilities, like being able to send SMS text messages, can be deviously employed, as Weidman's botnet software makes abundantly clear.
But iPhone users shouldn't get complacent. Apple's curated App Store provides a useful shield to native malware apps, but as the drive-by JailBreakMe exploit exposed, even iOS can be compromised.
Aside from being wary of new apps from unknown sources, it's also important to maintain good mobile device security hygiene:
-- Store as little data as possible locally -- it's impossible not to have your contact list and cached email and browser sessions on a smartphone, but avoid storing copies of sensitive business documents.
-- Encrypt data in storage and transit; use file encryption (or an encrypted file system as in iOS) for local storage and VPNs for network connections on unsecured links, namely public Wi-Fi hotspots.
-- Finally, use a mobile device management service, either an enterprise product such as AirWatch, MobileIron, or Zenprise, or a consumer-oriented service like Apple's Find My iPhone or Lookout for Android, that can track and remotely wipe a lost or stolen device.
See the latest IT solutions at Interop New York. Learn to leverage business technology innovations--including cloud, virtualization, security, mobility, and data center advances--that cut costs, increase productivity, and drive business value. Save 25% on Flex and Conference Passes or get a Free Expo Pass with code CPFHNY25. It happens in New York City, Oct. 3-7, 2011. Register now.
Dec 5 2012 | ArsTechnica
A new version of the Zeus trojan-a longtime favorite of criminals conducting online financial fraud-has been used in attacks on over 30,000 electronic banking customers in Europe, infecting both their personal computers and smartphones. The sophisticated attack is designed to circumvent banks' use of two-factor authentication for transactions by intercepting messages sent by the bank to victims' mobile phones.The malware and botnet system, dubbed "Eurograbber" by security researchers from Check Point Software and Versafe, was first detected in Italy earlier this year. It has since spread throughout Europe. Eurograbber is responsible for more than $47 million in fraudulent transfers from victims' bank accounts, stealing amounts from individual victims that range from 500 Euros (about $650) to 25,000 Euros (about $32,000), according to a report published Wednesday (PDF).
The malware attack begins when a victim clicks on a malicious link, possibly sent as part of a phishing attack.
Clicking on the link directs them to a site that attempts to download one or more trojans: customized versions of Zeus and its SpyEye and CarBerp variants that allow attackers to record Web visits and then inject HTML and JavaScript into the victim's browser. The next time the victim visits their bank website, the trojans capture their credentials and launch a JavaScript that spoofs a request for a "security upgrade" from the site, offering to protect their mobile device from attack.
The JavaScript captures their phone number and their mobile operating system information -- which are used in the second level of Eurograbber's attack.
With the phone number and platform information, the attacker sends a text message to the victim's phone with a link to a site that downloads what it says is "encryption software" for the device. But it is, in fact, "Zeus in the mobile" (ZITMO) malware -- a Trojan crafted for the Android and BlackBerry mobile operating systems that injects itself between the user and the mobile browser and SMS messaging software.
With both devices now compromised, the malware waits for the victim to access a bank account, and then immediately transfers a percentage of the victim's balance to an account set up by the criminals running the botnet.
The malware then intercepts the confirmation text message sent by the bank, forwarding it to the trojan's command and control server via a relay phone number. The server uses the message to confirm the transaction and withdraw the money. The same process happens every time the victim logs into their bank account, gradually withdrawing money without alerting the user.
|
||||
Bulletin | Latest | Past week | Past month |
|
Amphion Forum Understanding Android Secuity
http://selinuxproject.org/page/SEAndroid
Security Enhancements for Android™ (SE for Android) is a project to identify and address critical gaps in the security of Android. Initially, the project is enabling the use of SELinux in Android in order to limit the damage that can be done by flawed or malicious apps and in order to enforce separation guarantees between apps. However, the scope of the project is not limited to SELinux.
... ... ...
Android 4.3 is the first Android release version to fully include and enable the SELinux support contributed by the SE for Android project. The Android 4.3 SELinux support is discussed in https://source.android.com/devices/tech/security/se-linux.html. Prior versions such as Android 4.2 included a subset of the SELinux support but not a complete, functional set, and the code was disabled by default in the build (wrapped with HAVE_SELINUX conditionals).
You can build Android 4.3 and drop in a SELinux-enabled kernel without requiring further changes if you only want the core SELinux functionality. You will still need to put the device into enforcing mode, which under Android 4.3 you can do temporarily via an adb shell su 0 setenforce 1 or permanently by putting setenforce 1 into the init.rc file (make sure the device boots and operates without denials first, as per Getting Started).
Botnet - Wikipedia, the free encyclopedia
[PDF] Android Botnets on the Rise: Trends and Characteristics
Android Botnets on the Rise: Trends and Characteristics Heloise Pieterse Defence, Peace, Safety and Security Council for Scientific and Industrial Research[PDF] A study of mobile botnets: analysis of attack strategies
Android botnets on the rise – case study " Arie's World July 1st, 2013
Society
Groupthink : Two Party System as Polyarchy : Corruption of Regulators : Bureaucracies : Understanding Micromanagers and Control Freaks : Toxic Managers : Harvard Mafia : Diplomatic Communication : Surviving a Bad Performance Review : Insufficient Retirement Funds as Immanent Problem of Neoliberal Regime : PseudoScience : Who Rules America : Neoliberalism : The Iron Law of Oligarchy : Libertarian Philosophy
Quotes
War and Peace : Skeptical Finance : John Kenneth Galbraith :Talleyrand : Oscar Wilde : Otto Von Bismarck : Keynes : George Carlin : Skeptics : Propaganda : SE quotes : Language Design and Programming Quotes : Random IT-related quotes : Somerset Maugham : Marcus Aurelius : Kurt Vonnegut : Eric Hoffer : Winston Churchill : Napoleon Bonaparte : Ambrose Bierce : Bernard Shaw : Mark Twain Quotes
Bulletin:
Vol 25, No.12 (December, 2013) Rational Fools vs. Efficient Crooks The efficient markets hypothesis : Political Skeptic Bulletin, 2013 : Unemployment Bulletin, 2010 : Vol 23, No.10 (October, 2011) An observation about corporate security departments : Slightly Skeptical Euromaydan Chronicles, June 2014 : Greenspan legacy bulletin, 2008 : Vol 25, No.10 (October, 2013) Cryptolocker Trojan (Win32/Crilock.A) : Vol 25, No.08 (August, 2013) Cloud providers as intelligence collection hubs : Financial Humor Bulletin, 2010 : Inequality Bulletin, 2009 : Financial Humor Bulletin, 2008 : Copyleft Problems Bulletin, 2004 : Financial Humor Bulletin, 2011 : Energy Bulletin, 2010 : Malware Protection Bulletin, 2010 : Vol 26, No.1 (January, 2013) Object-Oriented Cult : Political Skeptic Bulletin, 2011 : Vol 23, No.11 (November, 2011) Softpanorama classification of sysadmin horror stories : Vol 25, No.05 (May, 2013) Corporate bullshit as a communication method : Vol 25, No.06 (June, 2013) A Note on the Relationship of Brooks Law and Conway Law
History:
Fifty glorious years (1950-2000): the triumph of the US computer engineering : Donald Knuth : TAoCP and its Influence of Computer Science : Richard Stallman : Linus Torvalds : Larry Wall : John K. Ousterhout : CTSS : Multix OS Unix History : Unix shell history : VI editor : History of pipes concept : Solaris : MS DOS : Programming Languages History : PL/1 : Simula 67 : C : History of GCC development : Scripting Languages : Perl history : OS History : Mail : DNS : SSH : CPU Instruction Sets : SPARC systems 1987-2006 : Norton Commander : Norton Utilities : Norton Ghost : Frontpage history : Malware Defense History : GNU Screen : OSS early history
Classic books:
The Peter Principle : Parkinson Law : 1984 : The Mythical Man-Month : How to Solve It by George Polya : The Art of Computer Programming : The Elements of Programming Style : The Unix Hater’s Handbook : The Jargon file : The True Believer : Programming Pearls : The Good Soldier Svejk : The Power Elite
Most popular humor pages:
Manifest of the Softpanorama IT Slacker Society : Ten Commandments of the IT Slackers Society : Computer Humor Collection : BSD Logo Story : The Cuckoo's Egg : IT Slang : C++ Humor : ARE YOU A BBS ADDICT? : The Perl Purity Test : Object oriented programmers of all nations : Financial Humor : Financial Humor Bulletin, 2008 : Financial Humor Bulletin, 2010 : The Most Comprehensive Collection of Editor-related Humor : Programming Language Humor : Goldman Sachs related humor : Greenspan humor : C Humor : Scripting Humor : Real Programmers Humor : Web Humor : GPL-related Humor : OFM Humor : Politically Incorrect Humor : IDS Humor : "Linux Sucks" Humor : Russian Musical Humor : Best Russian Programmer Humor : Microsoft plans to buy Catholic Church : Richard Stallman Related Humor : Admin Humor : Perl-related Humor : Linus Torvalds Related humor : PseudoScience Related Humor : Networking Humor : Shell Humor : Financial Humor Bulletin, 2011 : Financial Humor Bulletin, 2012 : Financial Humor Bulletin, 2013 : Java Humor : Software Engineering Humor : Sun Solaris Related Humor : Education Humor : IBM Humor : Assembler-related Humor : VIM Humor : Computer Viruses Humor : Bright tomorrow is rescheduled to a day after tomorrow : Classic Computer Humor
The Last but not Least Technology is dominated by two types of people: those who understand what they do not manage and those who manage what they do not understand ~Archibald Putt. Ph.D
Copyright © 1996-2021 by Softpanorama Society. www.softpanorama.org was initially created as a service to the (now defunct) UN Sustainable Development Networking Programme (SDNP) without any remuneration. This document is an industrial compilation designed and created exclusively for educational use and is distributed under the Softpanorama Content License. Original materials copyright belong to respective owners. Quotes are made for educational purposes only in compliance with the fair use doctrine.
FAIR USE NOTICE This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available to advance understanding of computer science, IT technology, economic, scientific, and social issues. We believe this constitutes a 'fair use' of any such copyrighted material as provided by section 107 of the US Copyright Law according to which such material can be distributed without profit exclusively for research and educational purposes.
This is a Spartan WHYFF (We Help You For Free) site written by people for whom English is not a native language. Grammar and spelling errors should be expected. The site contain some broken links as it develops like a living tree...
|
You can use PayPal to to buy a cup of coffee for authors of this site |
Disclaimer:
The statements, views and opinions presented on this web page are those of the author (or referenced source) and are not endorsed by, nor do they necessarily reflect, the opinions of the Softpanorama society. We do not warrant the correctness of the information provided or its fitness for any purpose. The site uses AdSense so you need to be aware of Google privacy policy. You you do not want to be tracked by Google please disable Javascript for this site. This site is perfectly usable without Javascript.
Last modified: March 03, 2020