pwshub.com

Google sold Android phones with hidden insecure feature, companies find

SAN FRANCISCO — Google’s master software for some Android phones includes a hidden feature that is insecure and could be activated to allow remote control or spying on users, according to a security company that found it inside phones at a U.S. intelligence contractor.

The feature appears intended to give employees at stores selling Pixel phones and other models deep access to the devices so they can demonstrate how they work, according to researchers at iVerify who shared their findings with The Washington Post.

The discovery and Google’s lack of explanation alarmed the intelligence contractor, data analysis platform vendor Palantir Technologies, to the extent that it has stopped issuing Android phones to employees, Palantir told The Post.

“Mobile security is a very real concern for us, given where we’re operating and who we’re serving,” Palantir Chief Information Security Officer Dane Stuckey said. “This was very deleterious of trust, to have third-party, unvetted insecure software on it. We have no idea how it got there, so we made the decision to effectively ban Androids internally.”

The security company said it contacted Google about its findings more than 90 days ago and that the tech giant has not indicated whether it would remove or fix the application.

On Wednesday night, Google told The Post that it would issue an update to remove the application. “Out of an abundance of precaution, we will be removing this from all supported in-market Pixel devices with an upcoming Pixel software update,” said company spokesperson Ed Fernandez. He said distributors of other Android phones would also be notified.

The application, called Showcase.apk, is normally dormant. But iVerify was able to enable it on a device in its possession, and the company believes skilled hackers could also enable it from afar. It cannot be removed from phones through the normal uninstall process.

When active, the application downloads instructions from a site hosted on Amazon Web Services. But it tries to connect to an insecure web address beginning with “http” instead of the more secure “https”, so that those calls could be intercepted and the site could be impersonated, with malicious spying instructions sent instead. Http sites are so risky that Google’s Chrome browser warns visitors that they are not secure.

“The application downloads a configuration file over an unsecure connection and can be manipulated to execute code at the system level,” iVerify wrote in a draft of a summary report to be published Thursday. The full 40-page analysis was aided by Palantir and Trail of Bits, an established security company affiliated with iVerify.

“The app vulnerability leaves millions of Android Pixel devices susceptible to man-in-the-middle attacks, giving cybercriminals the ability to inject malicious code and dangerous spyware,” iVerify wrote.

The researchers said the automatic installation of the Showcase app raised similar questions to those presented by the global failure of Windows computers running CrowdStrike security software last month. Like other security programs, CrowdStrike is embedded deep within Windows, so that a programming or configuration mistake can cause much greater damage than just a crash of CrowdStrike’s program itself.

Google’s Fernandez said the company had not seen any hacking through Showcase and suggested it would be unlikely.

The software was made “for Verizon in-store demo devices and is no longer being used,he said. “Exploitation of this application on a user phone requires both physical access to the device and the user’s password.”

Stuckey said he was especially bothered that Showcase is included in the Google-made Pixel phones. Android models manufactured by Samsung and other phone companies sometimes lag behind when it comes to installing security updates issued by Google.

Since Google has direct control of Pixels, it installs such updates immediately.

“It’s really quite troubling. Pixels are meant to be clean,” Stuckey said. “There is a bunch of defense stuff built on Pixel phones.”

IVerify said the application appeared to have been crafted by a Pennsylvania company called Smith Micro Software, which writes software packages for remote access and parental control tools. Smith Micro did not respond to an email sent Wednesday afternoon.

Source: washingtonpost.com

Related stories
1 month ago - Cybersecurity researchers at iVerify discovered a secret app called "Showcase.apk" that has a vulnerability that could give hackers a backdoor into the phone. Ironically, they found the faulty app after the company's endpoint detection...
1 month ago - Buying a used phone is a great way to save some cash and shop green. But is it safe?
1 month ago - Arrive to your next destination on 100% and keep your car clean with these great wireless chargers.
1 month ago - Check out the best phones with productive and essential features that won't bust your budget in 2024.
1 month ago - A new malware is targeting Android phones, stealing money from accounts and wiping phones clean by using on-device fraud techniques and other features.
Other stories
5 minutes ago - Act fast to grab this high-performing mesh router for less than $500, keeping you connected while saving some cash too.
5 minutes ago - If the old-school PlayStation is dear to your heart, you can soon relive those totally sweet 1990s memories. Sony is releasing a series of products...
6 minutes ago - If you've got an old phone to part with, T-Mobile is offering both new and existing customers the brand-new Apple iPhone 16 Pro for free with this trade-in deal.
6 minutes ago - Who doesn't want the best for their beloved pooch? Grab some of these tasty treats to make your dog feel special.
12 minutes ago - To be fair, Joe was probably taking a nap The Iranian cyber snoops who stole files from the Trump campaign, with the intention of leaking those documents, tried to slip the data to the Biden camp — but were apparently ignored, according...