Hacking experts find new ways to attack Android phones

Advertisement
By Reuters | Updated: 26 July 2012 10:28 IST
Hacking experts on Wednesday demonstrated ways to attack Android smartphones using methods they said work on virtually all such devices in use today, despite recent efforts by search engine giant Google to boost protection.

Experts showed off their prowess at the Black Hat hacking conference in Las Vegas, where some 6,500 corporate and government security technology workers gathered to learn about emerging threats to their networks.

"Google is making progress, but the authors of malicious software are moving forward," said Sean Schulte of Trustwave's SpiderLabs.

Advertisement

Google spokeswoman Gina Scigliano declined to comment on the security concerns or the new research.

Accuvant researcher Charlie Miller demonstrated a method for delivering malicious code to Android phones using a new Android feature known as near field communications.

Advertisement

"I can take over your phone," Miller said.

Near field communications allow users to share photos with friends, make payments or exchange other data by bringing Android phones within a few centimeters of similarly equipped devices such as another phone or a payment terminal.

Advertisement

Miller said he figured out how to create a device the size of a postage stamp that could be stuck in an inconspicuous place such as near a cash register at a restaurant. When an Android user walks by, the phone would get infected, said Miller.

He spent five years as a global network exploit analyst at the U.S. National Security Agency, where his tasks included breaking into foreign computer systems.

Advertisement

"Wild west"
Miller and another hacking expert, Georg Wicherski of CrowdStrike, have also infected an Android phone with a piece of malicious code that Wicherski unveiled in February.

That piece of software exploits a security flaw in the Android browser that was publicly disclosed by Google's Chrome browser development team, according to Wicherski.

Google has fixed the flaw in Chrome, which is frequently updated, so that most users are now protected, he said.

But Wicherski said Android users are still vulnerable because carriers and device manufacturers have not pushed those fixes or patches out to users.

Marc Maiffret, chief technology officer of the security firm BeyondTrust, said: "Google has added some great security features, but nobody has them."

Experts say iPhones and iPads don't face the same problem because Apple has been able to get carriers to push out security updates fairly quickly after they are released.

Two Trustwave researchers told attendees about a technique they discovered for evading Google's "Bouncer" technology for identifying malicious programs in its Google Play Store.

They created a text-message blocking application that uses a legitimate programming tool known as java script bridge. Java script bridge lets developers remotely add new features to a program without using the normal Android update process.

Companies including Facebook and LinkedIn use java script bridge for legitimate purposes, according to Trustwave, but it could also be exploited maliciously.

To prove their point, they loaded malicious code onto one of their phones and remotely gained control of the browser. Once they did that, they could force it to download more code and grant them total control.

"Hopefully Google can solve the problem quickly," said Nicholas Percoco, senior vice president of Trustwave's SpiderLabs. "For now, Android is the Wild West."

Copyright Thomson Reuters 2012

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Further reading: Android, Google, Google Chrome, browser, iPad, iPhone
Advertisement

Related Stories

Popular Mobile Brands
  1. Vivo X300 Ultra, Vivo X300 FE Confirmed to Launch in India Soon
  2. DJI Osmo Pocket 4 Debuts With 1-inch CMOS Sensor, Improved Stabilisation
  3. Dell Pro Plus Earbuds Review: Call Me, Maybe?
  4. OTT Releases This Week (April 13 - April 19): Toaster, Matka King, Assi, and More
  5. Honor 600 Series' Chipset and Battery Details Revealed Ahead of Global Debut
  6. Indian Smartphone Shipments Dropped to a Six-Year Low in Q1 2026: Report
  7. Apple Marketing Chief for Watch, AirPods, Home and Health Retires
  1. Scientists Just Created the Largest 3D Map of the Universe Ever to Study Dark Energy
  2. Honor 600 Pro and Honor 600 Key Specifications, Features Revealed via Official Listing
  3. Ethereum NFT Platform Shuts Down After Blacklove Sale Falls Through
  4. Vivo X300 FE Storage Options Leaked Alongside Live Image With Telephoto Extender Kit
  5. Indian Smartphone Shipments Dropped to Six-Year Low in Q1 2026 as Vivo Topped Market, Nothing Led Growth: Counterpoint
  6. Canva Introduces Canva AI 2.0, Brings Agentic Capabilities and Memory to Perform Design Tasks
  7. MediaTek Dimensity 9600 Pro Leak Suggests 5GHz Clock Speed, High Benchmark Scores
  8. Oppo Find X9s Pro Key Specifications Surface Online as Launch Date Draws Closer
  9. Russian-Based Crypto Exchange Grinex Halts Operation After $14 Million Hack
  10. Assassin's Creed: Black Flag Resynced Will Reportedly Release in July, Reveal Set for Next Week
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.