Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

Vulnerability Found in Google Wallet, Alipay Payment SDKs

Researchers at Trend Micro have uncovered a security hole that can be exploited to launch phishing attacks against users who make payments from their Android mobile devices.

Researchers at Trend Micro have uncovered a security hole that can be exploited to launch phishing attacks against users who make payments from their Android mobile devices.

According to the security firm, the vulnerability affects the in-app payment (IAP) SDKs for Google Wallet and Alibaba’s Alipay, China’s leading third-party online payment solution.

The flaw identified by researchers is related to what’s known as an “intent,” the software mechanism in Android that allows users to coordinate the functions of different apps to achieve a certain task.

“Explicit intents are used if the developer wants an action to be performed by a specific component in a specific app. Implicit intents are used when a developer allows the process to be performed by components of other apps,” Trend Micro Mobile Threats Analyst Weichao Sun explained in a blog post. “The Android platform uses intent-filters of apps to determine which app can perform the implicit intent. If an app contains the matching intent-filter, it can perform the task requested by the intent.”

The problem with Google Wallet and Alipay is that they use an implicit intent, and it can be intercepted with the aid of a “high priority” intent filter,  which is made by combining multiple system APIs.

In the case of applications using Google Wallet, they communicate with Google Play, which informs the user about the payment and asks him/her to confirm the transaction. However, because the IAP SDK uses an implicit intent, a malicious application can use an intent filter that’s similar to the one that’s normally utilized to intercept the intent and display a phishing page instead of the regular window.

“Third party apps employ Google Wallet or Alipay SDK  to communicate to the legitimate Google Wallet or Alipay  SDK and for real payment process. The purpose of the said SDK is to send the pay intent to the Google Wallet or Alipay. A malicious app can replace the real Google Wallet or Alipay to receive the payment intent,” Sun explained.

Cybercriminals can leverage such techniques to trick users into handing over their account credentials. With this piece of information in hand, they can access the accounts in an effort to obtain other personal and financial details. The stolen information can be monetized directly or sold on the underground market, experts said.

Advertisement. Scroll to continue reading.

 

Trend Micro reported the vulnerability to Alipay and Google on May 27. Alipay addressed the issue in mid-July with the release of version 2.0 of the SDK. Google says the latest version of its SDK offers better security and is encouraging developers to use it. The search engine giant also noted that it hasn’t seen any evidence to suggest that the vulnerability is being exploited in the wild.

“Developers should always use explicit intents for processes dealing with sensitive information. In such cases, only the desired app will be able to perform the process, minimizing the possibility of interception via malicious app. However, explicit intents are not enough,” the mobile threat analyst said. “Developers can also require that their apps check for the signatures of other apps as proof of their legitimacy before communicating with them.”

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

Vulnerabilities

The latest Chrome update brings patches for eight vulnerabilities, including seven reported by external researchers.