id
int64 1
14.4k
| text
stringlengths 3
5.01k
| entities
list | relations
list | Comments
list |
---|---|---|---|---|
1,417 | The network traffic generated by each Trojan uses the HTTP protocol, and despite its use of port 443, is not encrypted with SSL. | [] | [] | [] |
1,418 | As with most fast-spreading malware, antivirus engines will typically begin detecting the files a day or two after the spread has begun. | [] | [] | [] |
1,419 | While we haven’t seen any indication that the spam volume has begun to slow down, we do expect the campaign to wind down in the next 24 hours, but a new campaign will probably be close behind. | [
{
"id": 4262,
"label": "TIME",
"start_offset": 124,
"end_offset": 141
}
] | [] | [] |
1,420 | WildFire users can rest assured that they’ll be protected from whatever Kuluoz has in-store next. | [
{
"id": 46758,
"label": "SOFTWARE",
"start_offset": 0,
"end_offset": 8
},
{
"id": 46759,
"label": "malware",
"start_offset": 72,
"end_offset": 78
}
] | [] | [] |
1,421 | Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! | [] | [] | [] |
1,422 | By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. | [] | [] | [] |
1,423 | Following a recent study of apps in the Google Play Store, let’s discuss several security risks caused by the bad certificate management practiced in many Android apps, from social to mobile banking. | [
{
"id": 46760,
"label": "SOFTWARE",
"start_offset": 40,
"end_offset": 57
},
{
"id": 46761,
"label": "SOFTWARE",
"start_offset": 155,
"end_offset": 162
}
] | [] | [] |
1,424 | All Android apps must be digitally signed with a certificate from the developer. | [
{
"id": 46762,
"label": "SOFTWARE",
"start_offset": 5,
"end_offset": 12
}
] | [] | [] |
1,425 | As described in Google’s official document, the app developer is required to create a keystore with a set of private keys, and then use the private key to generate a signed version of apps. | [
{
"id": 46763,
"label": "identity",
"start_offset": 16,
"end_offset": 22
}
] | [] | [] |
1,426 | This key has to be valid for at least 25 years. | [] | [] | [] |
1,427 | These certificates do not have to be generated by a certificate authority and can instead be self-signed. | [] | [] | [] |
1,428 | Because this is simpler and allows the author to retain the private key, the majority of Google store apps use self-signed certificates. | [
{
"id": 45017,
"label": "SOFTWARE",
"start_offset": 89,
"end_offset": 105
}
] | [] | [] |
1,429 | This means it is the developer’s responsibility to keep the private key safe, whether that developer is a 13-year-old or a multi-national company. | [] | [] | [] |
1,430 | As this means the security protecting private keys varies widely, the security risks of bad certificate management cannot be ignored and must be identified, and where necessary, mitigated. | [] | [] | [] |
1,431 | Security researchers are starting to take note and publish on this subject. | [] | [] | [] |
1,432 | For example, BlueBox recently revealed the Fake ID vulnerability, which exploits an app’s certificate verification process within the Android OS. | [
{
"id": 46764,
"label": "identity",
"start_offset": 13,
"end_offset": 20
},
{
"id": 46765,
"label": "SOFTWARE",
"start_offset": 134,
"end_offset": 144
}
] | [] | [] |
1,433 | If they haven’t already | [] | [] | [] |
1,434 | , soon attackers and malware authors will turn their attention to exploiting vulnerabilities surrounding Android app certificates. | [
{
"id": 46766,
"label": "SOFTWARE",
"start_offset": 105,
"end_offset": 116
}
] | [] | [] |
1,435 | When an app is published to the Google Play Store, the certificate information is included within the APK file. | [
{
"id": 46767,
"label": "SOFTWARE",
"start_offset": 32,
"end_offset": 49
}
] | [] | [] |
1,436 | To view the certificate information just open the given APK file as a zip file. | [] | [] | [] |
1,437 | The certificate information is stored within the certificate’s “/META-INF” folder. | [
{
"id": 46768,
"label": "FILEPATH",
"start_offset": 65,
"end_offset": 74
}
] | [] | [] |
1,438 | You can use keytool or openssl tools to view the certificate information. | [] | [] | [] |
1,439 | An example taken from the popular Angry Birds app is shown in Figure 1. | [
{
"id": 46769,
"label": "SOFTWARE",
"start_offset": 34,
"end_offset": 45
}
] | [] | [] |
1,440 | The certificate fingerprints (circled in red) are what can be used to uniquely identify a certificate. | [] | [] | [] |
1,441 | Figure 1 These digital certificates, self-signed or not, are the keys to updating apps in the Android ecosystem. | [
{
"id": 46770,
"label": "SOFTWARE",
"start_offset": 96,
"end_offset": 103
}
] | [] | [] |
1,442 | It is a primary reason the expiration dates are set so far into the future and developers are able to self-sign certificates. | [] | [] | [] |
1,443 | The only way to update an app is for the developer to sign the update with the same digital certificate originally used to publish the app. | [
{
"id": 47145,
"label": "identity",
"start_offset": 41,
"end_offset": 51
}
] | [] | [] |
1,444 | If a developer wants to use a different certificate, they must publish the update separately as a new app. | [] | [] | [] |
1,445 | Furthermore, all Android apps published using the same certificate have a trust relationship between them. | [
{
"id": 46771,
"label": "SOFTWARE",
"start_offset": 18,
"end_offset": 25
}
] | [] | [] |
1,446 | Android allows apps signed by the same certificate to run in the same process and treats them as one single application instead of separate ones. | [
{
"id": 46772,
"label": "SOFTWARE",
"start_offset": 0,
"end_offset": 7
}
] | [] | [] |
1,447 | It also allows multiple apps with the same certificate, if using signature-based permission checks, to expose functionality and exchange code and data amongst themselves. | [] | [] | [] |
1,448 | This is convenient for developers, which is great, but it is also convenient for hackers, which is not. | [] | [] | [] |
1,449 | Losing control of a certificate’s private key, or using an insecure private key, can have severe security consequences. | [] | [] | [] |
1,450 | For example, if an attacker obtained the private key of an app, he or she could create a fake APK file, sign it using the same certificate as the legitimate app, and replace the targeted app with fake app on the device silently using the “Application upgrade” procedure. | [] | [] | [] |
1,451 | In addition, if the attacker can’t create an app with the same name as the targeted app, he or she can still check the “SharedUserId” option. | [] | [] | [] |
1,452 | This allows apps with different package names but signed with the same certificate to share permissions and stored data. | [] | [] | [] |
1,453 | Because of this, app developers should be extremely careful about re-using certificates when signing their apps. | [] | [] | [] |
1,454 | Ideally, an app developer should generate a unique private key for each unique app they post in the Google Play Store. | [
{
"id": 46773,
"label": "SOFTWARE",
"start_offset": 101,
"end_offset": 118
}
] | [] | [] |
1,455 | Unfortunately, during our study of apps posted in the Google Play Store we collected approximately 246,000 Android apps but only 11,681 certificates. | [
{
"id": 45020,
"label": "SOFTWARE",
"start_offset": 55,
"end_offset": 72
},
{
"id": 45021,
"label": "SOFTWARE",
"start_offset": 108,
"end_offset": 115
}
] | [] | [] |
1,456 | The distribution of the number of apps sharing the same key is shown below. | [] | [] | [] |
1,457 | The X-axis is the number of apps sharing the same certificate. | [] | [] | [] |
1,458 | The Y-axis is the number of certificates. | [] | [] | [] |
1,459 | For example, the number of certificates used by only one app is 1,323. | [] | [] | [] |
1,460 | About 6,925 certificates are used to sign between 6 and 19 different apps. | [] | [] | [] |
1,461 | Figure 2 | [] | [] | [] |
1,462 | As we see in this distribution, a lot of developers sign different apps with the same certificate. | [] | [] | [] |
1,463 | We further investigated the following cases: | [] | [] | [] |
1,464 | 1. Signing apps with a publicly known private key Many key pairs are well known in the development community. | [] | [] | [] |
1,465 | The most famous set of key pairs would be the key pairs included within the AOSP source files (in Table 1, below). | [
{
"id": 46774,
"label": "SOFTWARE",
"start_offset": 76,
"end_offset": 80
}
] | [] | [] |
1,466 | More key pairs can be found in developer forums and academic research. | [] | [] | [] |
1,467 | Table 1 If one app is signed using the publicly known private keys, it is easy for other apps on the same device to replace this vulnerable app with another APK file, silently with no user knowledge or interaction. | [] | [] | [] |
1,468 | We scanned our inventory of APK files downloaded from the Google Play Store and found at least 87 apps using the “testkey” in Table 1. | [
{
"id": 46775,
"label": "SOFTWARE",
"start_offset": 59,
"end_offset": 76
}
] | [] | [] |
1,469 | According to the Google Play Store, these 87 apps have been downloaded more than 1.6 million times. | [
{
"id": 46776,
"label": "SOFTWARE",
"start_offset": 17,
"end_offset": 34
}
] | [] | [] |
1,470 | For security reasons we are not posting the names of any of these apps. | [] | [] | [] |
1,471 | Under no circumstances should developers ever use private keys that are publicly available, nor should users download them. | [] | [] | [] |
1,472 | However, it isn’t easy for users to know the app they’re downloading is using a compromised private key – the onus for this is squarely on developers. | [] | [] | [] |
1,473 | 2. Mobile banking apps sharing one single key Mobile banking apps are particularly sensitive with significant security concerns, which is why we were surprised to discover one certificate was used to sign more than 300 mobile banking apps in the Google Play Store. | [
{
"id": 46777,
"label": "SOFTWARE",
"start_offset": 248,
"end_offset": 265
}
] | [] | [] |
1,474 | This practice is not necessarily dangerous, as long as the developer does not share the key with the various banks that contracted the applications. | [] | [] | [] |
1,475 | We’ve contacted the developer to confirm they have retained sole custody of the keys. | [] | [] | [] |
1,476 | Of course, even with out-sourced application development, app owners should prefer to hold their own key. | [] | [] | [] |
1,477 | Whoever controls the key controls updates for the application forever, and a key shared between applications in this way can never be transferred to a financial institution without compromising the security of all of the other apps signed with it. | [] | [] | [] |
1,478 | The developer is aware of this concern and plans to encourage more of its customers to sign their own applications in the coming year. | [] | [] | [] |
1,479 | In addition to our research, the Baidu Security team in China recently found 23 mobile banking apps sharing the same certificate hosted by a third party app developer and reported the discovery to the CNCERT in China. | [
{
"id": 45023,
"label": "location",
"start_offset": 56,
"end_offset": 61
},
{
"id": 45025,
"label": "location",
"start_offset": 211,
"end_offset": 216
},
{
"id": 45026,
"label": "identity",
"start_offset": 201,
"end_offset": 207
},
{
"id": 45024,
"label": "identity",
"start_offset": 33,
"end_offset": 52
}
] | [
{
"id": 58,
"from_id": 45026,
"to_id": 45025,
"type": "located-at"
},
{
"id": 219,
"from_id": 45024,
"to_id": 45023,
"type": "located-at"
}
] | [] |
1,480 | 3. Third party app developers using the same key for all apps generated for all customers | [] | [] | [] |
1,481 | The app developer industry is booming. | [] | [] | [] |
1,482 | These developers help customers build mobile apps for their businesses easily and quickly. | [] | [] | [] |
1,483 | They serve an important role for the majority of businesses that do not have in-house developers. | [] | [] | [] |
1,484 | Unfortunately, we uncovered some of these developers using the same certificate for every app. | [] | [] | [] |
1,485 | Again, using the same private key is probably due to the convenience in app management. | [] | [] | [] |
1,486 | But as we noted earlier, apps signed by the same certificate can automatically grant sharing relationships amongst themselves. | [] | [] | [] |
1,487 | This means all of the apps created by these developers, regardless of intended use, could be used maliciously. | [] | [] | [] |
1,488 | Table 2 shows select top app developers using the same certificate in signing all their apps. | [] | [] | [] |
1,489 | For security reasons, we have masked the names. | [] | [] | [] |
1,490 | Table 2 Digital certificates are a critical component of the security of Android apps. | [
{
"id": 46778,
"label": "SOFTWARE",
"start_offset": 75,
"end_offset": 82
}
] | [] | [] |
1,491 | Unfortunately, many app developers in the Google Play Store have ignored these concerns in favor of convenience. | [
{
"id": 45027,
"label": "SOFTWARE",
"start_offset": 42,
"end_offset": 59
}
] | [] | [] |
1,492 | While in some cases that may be justified – the app may not contain any important or identifying information – in many of the cases we discovered it is not. | [] | [] | [] |
1,493 | This poses great potential security risks to both app users and app owners. | [] | [] | [] |
1,494 | We encourage developers to reconsider their stance on this issue and where necessary make changes before a significant security event happens. | [] | [] | [] |
1,495 | Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! | [] | [] | [] |
1,496 | Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. | [] | [] | [] |
1,497 | A backdoor implant is an increasingly common mechanism for maintaining unauthorized access and control over a computer asset. | [
{
"id": 45029,
"label": "attack-pattern",
"start_offset": 71,
"end_offset": 90
}
] | [] | [] |
1,498 | The terms remote administration tool (RAT) and trojan downloader are often used synonymously with such implants. | [] | [] | [] |
1,499 | Once installed (i.e. implanted on a system), the modern backdoor typically offers much more than simple (i.e. command line) access to a system. | [] | [] | [] |
1,500 | Depending on the backdoor’s specialization and sophistication, it can also capture keystrokes, take screenshots, scrape memory for valuable information, search for files meeting certain criteria, query databases, download files and additional malware, exfiltrate data and files, and even serve as an attack platform. | [] | [] | [] |
1,501 | Effectively, a backdoor implant affects loss of control over a computer asset. | [] | [] | [] |
1,502 | The tangible and intangible impacts of this loss of control vary based on respective backdoor capabilities, and may include the following: leakage of authentication credentials, loss of intellectual property, exposure of sensitive information, negative standing or reputation, and various levels of liability for actions executed on or from the compromised asset. | [] | [] | [] |
1,503 | Recently Palo Alto Networks discovered a backdoor program ( md5: b826fb1253a52a3b53afa3b7543d7694, sha256: 6bedd1b0716fe7632188932451f75295346836545e6d2bfee1b56121e02ca110 ) that is used to control a linux operating system. | [
{
"id": 45032,
"label": "SHA2",
"start_offset": 108,
"end_offset": 172
},
{
"id": 45033,
"label": "identity",
"start_offset": 10,
"end_offset": 28
},
{
"id": 45031,
"label": "MD5",
"start_offset": 66,
"end_offset": 98
},
{
"id": 45034,
"label": "SOFTWARE",
"start_offset": 201,
"end_offset": 223
}
] | [
{
"id": 220,
"from_id": 45031,
"to_id": 45032,
"type": "related-to"
}
] | [] |
1,504 | This particular linux backdoor will install itself to "/usr/bin/btdaemon" and create a startup service at "/etc/init.d/bluetoothdaemon" with symbolic links so that it will run in any startup mode. The file contents are a simple bash script that runs the original btdaemon file. | [
{
"id": 46779,
"label": "FILEPATH",
"start_offset": 56,
"end_offset": 73
},
{
"id": 46780,
"label": "FILEPATH",
"start_offset": 108,
"end_offset": 135
}
] | [] | [] |
1,505 | The backdoor when run will create threads for each connection listed in its config file. The sample that was caught by our systems contains 3 IP addresses in its config file. | [] | [] | [] |
1,506 | For each IP address the btdaemon service will attempt to make a connection on UDP ports 53, 80, 110, and 443. | [] | [] | [] |
1,507 | Upon successful connection it will send the string "¡°MlCROS0FT|1.2 Apr 26 2014 02:37:05|Linux Kernel Version¡±" and will wait for an "Auth" packet from the server. | [] | [] | [] |
1,508 | If the backdoor receives a packet in the form of a "cmdType|cmdBody" it will check the cmdType list and execute the equivalent instruction. Valid instructions are between 0-9 and there functionality varies depending on the command. | [] | [] | [] |
1,509 | While running the btdaemon process also inspects whether there is an ".IptabLes" or ".IptabLex" local process, and sends back status for monitoring purposes. If the "disablerun" command is sent the backdoor will download a file named "run.txt" from one of the following URLs: The file data is in the format "exe_path_1 | exe_path_2 | ... | exe_path_N". If none of the paths is correct then a "getsetup.rar" file is downloaded and run. | [
{
"id": 45035,
"label": "FILEPATH",
"start_offset": 397,
"end_offset": 409
},
{
"id": 45037,
"label": "FILEPATH",
"start_offset": 237,
"end_offset": 244
}
] | [] | [] |
1,510 | This is an ELF file and there are various encrypted portions within it. | [] | [] | [] |
1,511 | There exist two embedded zlib-encrypted blocks at file offset 0x8C0C0 and 0xE6B40 respectively. | [
{
"id": 4493,
"label": "tools",
"start_offset": 26,
"end_offset": 30
}
] | [] | [] |
1,512 | When run if the filename does not include the "IptabLes" string then the data is decrypted, written to disk, and then executed, installing itself as a startup service on the machine and place itself in one of the following locations: The second encrypted block is configuration data, which includes some IP addresses and DNS data which is used when it writes the first decrypted block to a file. | [] | [] | [] |
1,513 | "dns.po888.com|122.228.242.51|119.145.148.56|162.221.13.82". | [
{
"id": 46781,
"label": "DOMAIN",
"start_offset": 2,
"end_offset": 15
},
{
"id": 46782,
"label": "IPV4",
"start_offset": 16,
"end_offset": 30
},
{
"id": 46783,
"label": "IPV4",
"start_offset": 31,
"end_offset": 45
},
{
"id": 46784,
"label": "IPV4",
"start_offset": 46,
"end_offset": 59
}
] | [] | [] |
1,514 | If the file is run in a path including the "IptabLes" string then it installs itself as a startup service and proceeds into its main loop. | [] | [] | [] |
1,515 | Either path the "getsetup.rar" file takes is meant to ensure that it is installed as a startup service, ensuring persistence. Once the file is running it creates a process identifier (PID) so that only one instance is running at any given time. | [
{
"id": 46785,
"label": "FILEPATH",
"start_offset": 18,
"end_offset": 30
}
] | [] | [] |
1,516 | The file will connect to an IP and port configured from the configuration data and sends along information that includes the cpu and memory information. | [] | [] | [] |