Home / Mobile / Update vulnerability in third-party SDK exposes some Android apps to attacks

Attackers could force apps using the HomeBase SDK to download and execute rogue code, researchers from Bitdefender said

Update vulnerability in third-party SDK exposes some Android apps to attacks

window.ntvConfig = window.ntvConfig || {} ;
window.ntvConfig.keyValues = window.ntvConfig.keyValues || {};
var segs = localStorage.getItem(‘_pnativo’);
if (segs) {
window.ntvConfig.keyValues.permutive = JSON.parse(segs).join(“,”);
}
https://s.ntv.io/serve/load.js
var prodNames = ”;
var prodManufacturers = ”;
var prodCategories = ”;
var prodVendors = ”;

var insiderSignedIn = document.cookie.indexOf(“nsdr”) > -1; //check if Insider cookie exists
var idg_uuid = $.cookie(‘idg_uuid’) || ”;

var dlJobFunction = ”;
var dlJobPosition = ”;
var dlIndustry = ”;

if (insiderSignedIn) {
var insiderToken = IDG.insiderReg.readCookie(“nsdr”);
var tokens = IDG.insiderReg.readCookieProperty(insiderToken);
if (!(tokens[‘jobPosition’]===undefined)) {
//dlJobPosition = tokens[‘jobPosition’];
//OC-1647 change to indicate this data was remove
dlJobPosition = “removed”;
}
if (!(tokens[‘jobFunction’]===undefined)) {
dlJobFunction = tokens[‘jobFunction’];
}
if (!(tokens[‘industry’]===undefined)) {
dlIndustry = tokens[‘industry’];
}
}

insiderSignedIn = insiderSignedIn.toString(); //per Infotrust this needs to be a string, not a boolean

var sincePublished = ‘2043 days’;
sincePublished = sincePublished.split(” “)[0];

//get edition from countryCode
var edition = ”;
if (typeof countryCode !== ‘undefined’ && countryCode !== “”) {//should be defined in locales-editions.jsp if brand has editions
edition = countryCode.toLowerCase();
}

dataLayer=[{
‘articleId’: ‘2172616’,
‘articleDisplayId’:’1′,
‘articleHasVideo’:’false’,
‘articleLocale’: ‘global’,
‘articleTitle’: ‘Update vulnerability in third-party SDK exposes some Android apps to attacks’,
‘articleType’: ‘News’,
‘audience’:’enterprise’,
‘author’:’Lucian Constantin’,
‘blogName’:”,
‘brandpost’: ‘false’,
‘categoryIdList’:’3390,2206,3524,3388,3574,2101,3856,3303,3688,3145,3048,3513,3309,3523′,
‘categoryIdPrimary’: ‘3390’,
‘contentStrategy’: ”,
‘contentType’:’news’,
‘datePublished’:’2014-05-27′,
‘dateUpdated’:’2014-05-27′,
‘daysSincePublished’:”2043″,
‘daysSinceUpdated’:’2043′,
‘de_normalized_company_name’:$.cookie(‘de_normalized_company_name’),
‘displayType’:’article’,
‘edition’:edition,
‘environment’:’production’,
‘ga_enabled’:’true’,
‘gaTrackingId’:’UA-300704-13′,
‘geolocEnabled’:’true’,
‘goldenTaxonomyIdPrimary’: ‘665’,
‘goldenTaxonomyIdList’: ‘941,675,454,126,347,944,973,144,233,482,67,971,68’,
‘industry’: dlIndustry,
‘insiderSignedIn’:insiderSignedIn,
‘ip_normalized_company_name’:$.cookie(‘ip_normalized_company_name’),
‘isBlog’:’false’,
‘isInsiderContent’:’false’,
‘isICN’: ‘false’,
‘jobFunction’: dlJobFunction,
‘jobPosition’: dlJobPosition,
‘oneRegPlacementID’:oneRegPlacementID,
‘pageNumber’:’1′,
‘platform’:’Web’,
‘podcastSponsored’: ‘false’,
‘primaryCategory’: ‘byod’,
‘ancestorGoldenCategories’: ”,
‘primaryCategoryList’: ‘security,small business,wi-fi,mdm,pcs,cyber crime,network security,network management,android,encryption,malware,mobile security,spyware’,
‘primaryAncestorCategoryList’: ‘byod,mobile,operating systems’,
‘prodCategories’:prodCategories.slice(‘|’, -1),
‘prodManufacturers’:prodManufacturers.slice(‘|’, -1),
‘prodNames’:prodNames.slice(‘|’, -1),
‘prodVendors’:prodVendors.slice(‘|’, -1),
‘property’: ‘itnews’,
‘propertyCountry’:’US’,
‘purchaseIntent’:”,
‘skimlinksId’:’111346X1569479′,
‘source’:’idg news service’,
‘sponsorName’:”,
‘suppressMonetization’: supMontMods.toString(),
‘tags’: ”,
‘userId’:idg_uuid,
‘videoAutoplay’:’false’,
‘youtubeId’:”
}];

var _sf_async_config={};

_sf_async_config.uid = 29363;

_sf_async_config.path = “/article/2172616/update-vulnerability-in-third-party-sdk-exposes-some-android-apps-to-attacks.html”;
_sf_async_config.title = “Update vulnerability in third-party SDK exposes some Android apps to attacks | ITNews”;
_sf_async_config.domain = “itnews.com”;
if(window.location.href.indexOf(“video”)&&true) {
_sf_async_config.playerdomain= _sf_async_config.domain.replace(“www.”,””);
}

_sf_async_config.useCanonical = true;

_sf_async_config.sections = “byod”;
_sf_async_config.authors=”Lucian Constantin”;


var _vwo_code=(function(){
var account_id=306194,
settings_tolerance=2000,
library_tolerance=2500,
use_existing_jquery=false,
/* DO NOT EDIT BELOW THIS LINE */
f=false,d=document;return{use_existing_jquery:function(){return use_existing_jquery;},library_tolerance:function(){return library_tolerance;},finish:function(){if(!f){f=true;var a=d.getElementById(‘_vis_opt_path_hides’);if(a)a.parentNode.removeChild(a);}},finished:function(){return f;},load:function(a){var b=d.createElement(‘script’);b.src=a;b.type=’text/javascript’;b.innerText;b.onerror=function(){_vwo_code.finish();};d.getElementsByTagName(‘head’)[0].appendChild(b);},init:function(){settings_timer=setTimeout(‘_vwo_code.finish()’,settings_tolerance);var a=d.createElement(‘style’),b=’body{opacity:0 !important;filter:alpha(opacity=0) !important;background:none !important;}’,h=d.getElementsByTagName(‘head’)[0];a.setAttribute(‘id’,’_vis_opt_path_hides’);a.setAttribute(‘type’,’text/css’);if(a.styleSheet)a.styleSheet.cssText=b;else a.appendChild(d.createTextNode(b));h.appendChild(a);this.load(‘//dev.visualwebsiteoptimizer.com/j.php?a=’+account_id+’&u=’+encodeURIComponent(d.URL)+’&r=’+Math.random());return settings_timer;}};}());_vwo_settings_timer=_vwo_code.init();

var dataLayer = window.dataLayer = window.dataLayer || [];
var adBlockStatus = ‘false’;

function AdBlockEnabled() {
var ad = document.createElement(‘ins’);
ad.className = ‘AdSense’;
ad.style.display = ‘block’;
ad.style.position = ‘absolute’;
ad.style.top = ‘-1px’;
ad.style.height = ‘1px’;

if (document.body != null) {
document.body.appendChild(ad);
var isAdBlockEnabled = !ad.clientHeight;
document.body.removeChild(ad);
}

return isAdBlockEnabled;
}
// AdBlockEnabled() was successful document.body not null
if (AdBlockEnabled() != undefined) {
adBlockStatus = AdBlockEnabled().toString();
}
// not successful – look for ads.js
if (document.body == null) {
if (window.canRunAds === undefined) {
adBlockStatus = ‘true’;
} else {
adBlockStatus = ‘false’;
}
}

dataLayer.push({
‘adBlockStatus’: adBlockStatus
});

Use commas to separate multiple email addresses

Your message has been sent.

There was an error emailing this page.

By

CSO Senior Writer,

IDG News Service |


PT

A third-party advertising framework integrated in hundreds of Android apps contains a vulnerability that could allow hackers to steal sensitive information from users’ phones, according to security researchers from antivirus firm Bitdefender.

+ ALSO ON NETWORK WORLD Android KitKat could be a strong deterrent to cybercrime +

The framework is called HomeBase SDK (software development kit) and is developed by Widdit, based in Ramat Gan, Israel. It allows Android developers to monetize their apps by displaying ads and custom content on the phone’s lock screen.

HomeBase SDK is one of the many mobile advertising frameworks available to Android developers, but according to the Bitdefender researchers it has an insecure update mechanism that could put users at risk when their phones connect to the Internet over insecure or compromised networks.

Every time an application that uses HomeBase is executed, the SDK code embedded into it connects to a remote server using an unencrypted connection to get the latest version of the SDK, the Bitdefender researchers said Tuesday in a blog post. If an updated SDK is found it is downloaded in the form of a JAR (Java Archive) file and executed, they said.

Since the communication with the update server is done via plain HTTP with no SSL encryption, an attacker could intercept the application’s request as it travels over an insecure wireless network or a compromised network gateway and serve back a malicious JAR file, according to the Bitdefender researchers.

In addition, the authenticity of the downloaded file is not verified, so the host app has no way of knowing whether the JAR file actually came from Widdit or not, they said.

A malicious JAR file supplied by an attacker would be able to use the permissions granted to the host app, which is another problem, because the HomeBase SDK forces apps to ask for an extensive list of permissions on installation.

“A malicious JAR file could read and export contacts, get the accounts on the device, access the user’s location and report it, record audio, read SMS contents and read the user’s browsing history and bookmarks, among others,” Bogdan Botezatu, a senior e-threat analyst at Bitdefender, said via email.

If the application has any other permissions in addition to the ones required by the HomeBase SDK, the malicious JAR file would be able to use those as well, Botezatu said.

The Bitdefender researchers claim they successfully tested a man-in-the-middle attack in a controlled environment against an app with the HomeBase SDK and managed to make it execute a malicious JAR with phone calling and SMS hijacking capabilities.

“The application downloaded and ran the JAR file and executed the malicious code without objection, as it had been granted phone calling and SMS interception permission upon installation,” they said.

The researchers claim the HomeBase SDK doesn’t actually need all of the permissions it requests, but Widdit disagrees.

“As a rich and robust lock screen platform, HomeBase does require a relatively high number of permissions in order for it to deliver its full experience in an optimal way,” Noam Mor, the head of media relations at Widdit said via email. “That being said, our platform is very flexible and allows developers the option to exclude some of the permissions if they wish to request less permissions (but affect functionality).”

Mor pointed to a blog post where the permissions required by the HomeBase SDK are explained.

While the SDK’s permissions will remain in place, the company plans to resolve the security issues with the update mechanism that could allow attackers to abuse them.

“As part of our security enhancement efforts we are in the process of migrating to SSL based communication,” Mor said. “This step will prevent unwanted or malicious access to the remote update, and migration completion is scheduled for the end of this month.”

The implementation of code integrity verification has also been put on the development roadmap for the first quarter of 2014 in order to prevent any other possible vulnerabilities with the updates, Mor said.

Widdit is in contact with the Bitdefender researchers and appreciates their feedback, the representative said. Widdit takes security very seriously, but hasn’t received any reports of attacks like the ones described by Bitdefender, he said.

A simple way to mitigate this type of attack would be for the company to sign their updates with a digital certificate which could then be used by the embedded SDK to verify their authenticity, Botezatu said. “If the certificate is not valid or is missing, then the application should not execute the downloaded code.”

According to Bitdefender, 1,122 out of 1,640 applications that use the HomeBase SDK and were collected by the company over time from Google Play, are no longer in the marketplace.

“We don’t have a clear date when each application has been taken down, nor do we know the reason,” Botezatu said. “All we know is that they are not online anymore.”

“We aren’t aware of any Play Store suspensions at all,” Mor said. “We do realize that a large part of the developers who work with us use several monetization solutions. We’re also aware of the fact that a lot of monetization companies are banned by Google due to it’s new ToS [terms of service]. We can only conclude that those apps were banned because of the fact they implemented their app with other SDKs.”

Google did not immediately respond to an inquiry on whether it ever removed applications from Google Play specifically because they used Widdit’s HomeBase SDK.

Lucian Constantin is a senior writer at CSO, covering information security, privacy, and data protection.

Copyright © 2019 IDG Communications, Inc.

Source

About IT News Ug

Check Also

google-logo

Google wants tattoos to act as smartphone microphones

window.ntvConfig = window.ntvConfig || {} ; window.ntvConfig.keyValues = window.ntvConfig.keyValues || {}; var segs = localStorage.getItem(‘_pnativo’); …

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.