Recently, researchers announced that a vulnerability in Samsung Android devices had been found which allowed attackers to run malicious code on vulnerable devices if they became the targets of a man-in-the-middle attack.
In this post we will explain how this vulnerability works, and what can users do to protect themselves.
The Vulnerability
The stock Android keyboard on these affected Samsung devices includes some features based on the Swiftkey SDK. To implement these features, it downloads files that are specific to each keyboard language, as seen below:
Figure 1. Downloaded keyboard file
These files are downloaded whenever the device is turned on, and whenever the input language is changed by the user.
By itself, this would not necessarily be a problem. However, the downloaded files are saved (and were created with) permissions for the system user, which is analogous to the root and Administrator users on Linux and Windows devices. This user has elevated privileges, which means that any code that is downloaded also runs with these elevated privileges.
The combination results in a rather clever attack: the attacker carries out a man-in-the-middle attack that replaces the files downloaded by the keyboard. The replacement files have been specially crafted so that once processed by the keyboard app, aribitrary code of the attacker’s choosing can be run on the phone, giving the attacker complete control of the device.
Potential countermeasures
Currently, no patch exists for this vulnerability. Samsung has indicated that they will use their Knox security solution to remotely issue a fix, but when this will be released is unclear. In the official statement released by Samsung, they only mention that they will “begin rolling out a security policy update in the coming days.” Samsung has also advised users to ensure their devices automatically receive security policy updates. Steps to configure their devices to do so can also be found in the statement.
Until then, there are two possible countermeasures. The first countermeasure is to only connect to Wi-Fi networks that are secure, in order to prevent any man-in-the-middle attacks. This can be a problem if the user has to connect to public Internet connections. The use of a Virtual Private Network (VPN) helps secure a user’s connection in these cases.
Secondly, the user can stop the use of the default Samsung keyboard. To do this, they have to do two things: first, select an alternate keyboard instead of the default system keyboard. This can be done under the Language and input section of the device’s settings:
Figures 2-4. Steps to change Android keyboard
However, using a different keyboard is not enough. The system keyboard itself has to be turned off. Unfortunately, this has to be done every time the device is turned on. This can be done under the Applications part of the settings menu:
Figures 5-7. Steps to disable system keyboard
These steps will mitigate the risk to the user from this vulnerability.
'malware ' 카테고리의 다른 글
Working with base64 (0) | 2015.07.06 |
---|---|
Analysis of CVE-2015-2360 – Duqu 2.0 Zero Day (0) | 2015.06.20 |
Magnitude Exploit Kit"수정 된 막 Adobe Flash Player의 취약점을 이용. 가장 영향을받은 국가는 미국 (0) | 2015.06.20 |
Exploring Control Flow Guard in Windows 10 (0) | 2015.06.09 |
DNS Changer Malware Sets Sights on Home Routers (0) | 2015.06.01 |