A team of security researchers have demonstrated how a security flaw in Android 4.0.4 can be exploited by a rootkit.
The research team is lead by North Carolina State University professor Xuxian Jiang, who succeeded in developing a proof-of-concept rootkit that attacks the Android framework as opposed to the underlying operating system kernel. The researchers contend that such a rootkit could potentially be downloaded with an infected app and be used to manipulate the smartphone.
“We’ve developed an Android rootkit that unlike other rootkits for the platform can function without a restart and without deep modification of the underlying firmware,” the presenter noted in a YouTube video demonstrating the malware. “But it can still do all the things that a rootkit wants to do, such as hide apps or redirect apps to the attacker’s functionality.”
In the video, the demonstrator was able to hide applications on the device, as well as get them to launch when icons for other applications are clicked. If downloaded with an infected application, the rootkit could for example hide the smartphone’s browser and replace it with a browser that looks exactly the same but actually steals all of the user’s information.
In response to comments to a press release announcing the finding, Jiang referred to it as an user interface readdressing attack that is performed by hijacking the launcher.
“This would be a more sophisticated type of attack than we’ve seen before,” Jiang said in a statement. “The rootkit was not that difficult to develop, and no existing mobile security software is able to detect it.”
“But there is good news,” he continued. “Now that we’ve identified the problem, we can begin working on ways to protect against attacks like these.”
More from Brian Prince
- U.S. Healthcare Companies Hardest Hit by ‘Stegoloader’ Malware
- CryptoWall Ransomware Cost Victims More Than $18 Million Since April 2014: FBI
- New Adobe Flash Player Flaw Shares Similarities With Previous Vulnerability: Trend Micro
- Visibility Challenges Industrial Control System Security: Survey
- Adobe Flash Player Zero-Day Exploited in Attack Campaign
- Researchers Demonstrate Stealing Encryption Keys Via Radio
- Researchers Uncover Critical RubyGems Vulnerabilities
- NSA, GCHQ Linked to Efforts to Compromise Antivirus Vendors: Report
Latest News
- Industrial Giant ABB Confirms Ransomware Attack, Data Theft
- Organizations Worldwide Targeted in Rapidly Evolving Buhti Ransomware Operation
- Google Cloud Users Can Now Automate TLS Certificate Lifecycle
- Zyxel Firewalls Hacked by Mirai Botnet
- Watch Now: Threat Detection and Incident Response Virtual Summit
- NCC Group Releases Open Source Tools for Developers, Pentesters
- Memcyco Raises $10 Million in Seed Funding to Prevent Website Impersonation
- New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids
