share_log

IVerfiy Discovers Severe Android Vulnerability Impacting Millions of Devices Around the World

IVerfiy Discovers Severe Android Vulnerability Impacting Millions of Devices Around the World

IVerify 發現了一項嚴重的 Android 漏洞,影響了全球數百萬設備。
PR Newswire ·  08/15 09:00

Vulnerability leaves millions of Android devices susceptible to man-in-the-middle (MITM) attacks and other dangerous malware and spyware.

安卓漏洞導致數百萬設備易受中間人(MITM)攻擊和其他危險的惡意軟件和間諜軟件影響。

NEW YORK, Aug. 15, 2024 /PRNewswire/ -- iVerify, the leader in advanced mobile endpoint detection and remediation (EDR) solutions, today announced the discovery of a serious Android security vulnerability that impacts millions of Pixel devices globally. The vulnerability makes the operating system accessible to cybercriminals to perpetrate man-in-the-middle attacks, malware injections, and spyware installations. The potential impact of this Android security vulnerability is unknown and could result in millions of dollars in data loss and breaches.

2024年8月15日,紐約 /美通社/ - 先進的移動端點檢測和糾正(EDR)解決方案領先者iVerify,今天宣佈發現嚴重的安卓安全漏洞,影響全球數百萬Pixel設備。這個漏洞使操作系統易受黑客進行中間人攻擊、惡意軟件注入和間諜軟件安裝。這個安卓安全漏洞的潛在影響是未知的,可能導致數百萬美元的數據丟失和破壞。

iVerify, in concert with the information security team at Palantir Technologies, initially identified and investigated a vulnerability in an Android app package called Showcase.apk. The application runs at the system level and can fundamentally change the phone's operating system. Since the application package is installed over unsecured HTTP protocols, this opens a backdoor, making it easy for cybercriminals to compromise the device. iVerify notified Google of the vulnerability and submitted a detailed report after discovering it on customer devices that did not pass iVerify's behavior-based detections. It's unclear if Google will issue a patch or remove the software from the phones to mitigate the potential risks.

iVerify與Palantir Technologies的信息安全團隊合作,最初在一個名爲Showcase.apk的安卓應用程序包中發現並調查了一個漏洞。該應用程序在系統級別上運行,並且可以從根本上改變電話的操作系統。由於該應用程序包是通過不安全的HTTP協議安裝的,這就打開了一個後門,使黑客輕鬆地能夠攻擊設備。iVerify在發現客戶設備未能通過基於行爲的檢測後,通知了Google有關該漏洞並遞交了詳細報告。目前尚不清楚Google是否會發布補丁或從手機中刪除該軟件以減輕潛在風險。

Furthermore, users cannot remove this app because it is part of the firmware image, and Google does not allow end-users to alter the firmware image for security reasons.

此外,由於該應用程序是固件鏡像的一部分,用戶無法將其刪除,而Google不允許最終用戶爲了安全原因更改固件鏡像。

"While we don't have evidence this vulnerability is being actively exploited, it nonetheless has serious implications for corporate environments, with millions of Android phones entering the workplace every day," said Rocky Cole, Co-founder and Chief Operations Officer of iVerify. "Google is essentially giving CISOs the impossible choice of accepting insecure bloatware or banning Android entirely."

iVerify的聯合創始人兼首席運營官Rocky Cole表示:「雖然我們沒有證據表明這種漏洞正在被積極利用,但它仍然對企業環境有嚴重的影響,每天有數百萬臺安卓手機進入工作場所。Google基本上給CISO們提供了接受不安全的臃腫軟件或完全禁用安卓的不可能的選擇。」

Cybercriminals can use vulnerabilities in the app's infrastructure to access system privileges and take over devices to perpetrate cybercrime and breaches. Cybercriminals could then leverage this app to distribute malicious Android packages and remote code, and configure files to compromise the app development chain and alter the app's functionality.

黑客可以利用應用程序基礎設施中的漏洞來訪問系統特權並接管設備,以實施網絡犯罪和數據泄露。黑客然後可以利用此應用程序來分發惡意安卓包和遠程代碼,並配置文件以破壞應用程序開發鏈並更改應用程序的功能。

"We're supporting some of the most important institutions in the Western world. Google embedding third-party software in Android's firmware without reviewing the quality or security of these apps, and not disclosing this to vendors or users, creates significant security vulnerability to anyone who relies on this ecosystem." said Dane Stuckey, the Chief Information Security Officer of Palantir Technologies.

Palantir Technologies的首席信息安全官Dane Stuckey表示:「我們正在爲西方世界的一些最重要的機構提供支持。Google在安卓固件中嵌入第三方軟件,而沒有審查這些應用的質量或安全性,並且未向供應商或用戶披露,爲依賴於這個生態系統的任何人造成了重大安全漏洞。」

The Android package, "Showcase.apk," was found on a very large percentage of Pixel devices shipped worldwide since September 2017. Google shipped about 10 million Pixels worldwide in 2023 in North America, which is about 3% of all smartphone sales in 2023.

安卓應用程序包Showcase.apk在全球自2017年9月以來發運的Pixel設備中佔了非常大的比例。Google在2023年全球發貨了約1000萬個Pixel, 這佔了2023年所有智能手機銷售的約3%。

Since this app is not inherently malicious, most security technologies cannot detect it as malicious. iVerify mobile EDR solution can scan these devices to detect if vulnerabilities exist and, through conditional access, prevent non-compliant, vulnerable, and malware-infected devices from accessing critical data and services.

由於這個應用程序本身並不具有惡意性,大多數安全技術無法將其檢測爲惡意。iVerify移動EDR解決方案可以掃描這些設備,檢測是否存在漏洞,並通過有條件的訪問,防止不符合規定、有漏洞和感染惡意軟件的設備訪問關鍵數據和服務。

Read the full report summary here.

閱讀完整的報告摘要,請點擊這裏。

About iVerify

關於iVerify

iVerify believes users shouldn't have to sacrifice privacy for security. Our easy-to-deploy solution provides fleet-wide iOS and Android security telemetry without requiring a management profile on the device, allowing users to keep their personal data private and secure their mobile devices from advanced malware, vulnerabilities, and targeted smishing attacks. Learn more at iVerify.io.

iVerify認爲,用戶不應該爲了安全性而犧牲隱私。我們易於部署的解決方案提供了全面的iOS和安卓的移動設備安全性追蹤,並不需要在設備上放置管理概要文件,使用戶能夠保護個人數據的私密性,安全地保護移動設備免受高級惡意軟件、漏洞和定向短信攻擊。了解更多信息,請訪問iVerify.io。

Media Contact
[email protected]

媒體聯繫人
[email protected]

SOURCE iVerify

消息來源:iVerify

声明:本內容僅用作提供資訊及教育之目的,不構成對任何特定投資或投資策略的推薦或認可。 更多信息
    搶先評論