id
int64
1
14.4k
text
stringlengths
3
5.01k
entities
list
relations
list
Comments
list
1,417
The network traffic generated by each Trojan uses the HTTP protocol, and despite its use of port 443, is not encrypted with SSL.
[]
[]
[]
1,418
As with most fast-spreading malware, antivirus engines will typically begin detecting the files a day or two after the spread has begun.
[]
[]
[]
1,419
While we haven’t seen any indication that the spam volume has begun to slow down, we do expect the campaign to wind down in the next 24 hours, but a new campaign will probably be close behind.
[ { "id": 4262, "label": "TIME", "start_offset": 124, "end_offset": 141 } ]
[]
[]
1,420
WildFire users can rest assured that they’ll be protected from whatever Kuluoz has in-store next.
[ { "id": 46758, "label": "SOFTWARE", "start_offset": 0, "end_offset": 8 }, { "id": 46759, "label": "malware", "start_offset": 72, "end_offset": 78 } ]
[]
[]
1,421
Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot!
[]
[]
[]
1,422
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
[]
[]
[]
1,423
Following a recent study of apps in the Google Play Store, let’s discuss several security risks caused by the bad certificate management practiced in many Android apps, from social to mobile banking.
[ { "id": 46760, "label": "SOFTWARE", "start_offset": 40, "end_offset": 57 }, { "id": 46761, "label": "SOFTWARE", "start_offset": 155, "end_offset": 162 } ]
[]
[]
1,424
All Android apps must be digitally signed with a certificate from the developer.
[ { "id": 46762, "label": "SOFTWARE", "start_offset": 5, "end_offset": 12 } ]
[]
[]
1,425
As described in Google’s official document, the app developer is required to create a keystore with a set of private keys, and then use the private key to generate a signed version of apps.
[ { "id": 46763, "label": "identity", "start_offset": 16, "end_offset": 22 } ]
[]
[]
1,426
This key has to be valid for at least 25 years.
[]
[]
[]
1,427
These certificates do not have to be generated by a certificate authority and can instead be self-signed.
[]
[]
[]
1,428
Because this is simpler and allows the author to retain the private key, the majority of Google store apps use self-signed certificates.
[ { "id": 45017, "label": "SOFTWARE", "start_offset": 89, "end_offset": 105 } ]
[]
[]
1,429
This means it is the developer’s responsibility to keep the private key safe, whether that developer is a 13-year-old or a multi-national company.
[]
[]
[]
1,430
As this means the security protecting private keys varies widely, the security risks of bad certificate management cannot be ignored and must be identified, and where necessary, mitigated.
[]
[]
[]
1,431
Security researchers are starting to take note and publish on this subject.
[]
[]
[]
1,432
For example, BlueBox recently revealed the Fake ID vulnerability, which exploits an app’s certificate verification process within the Android OS.
[ { "id": 46764, "label": "identity", "start_offset": 13, "end_offset": 20 }, { "id": 46765, "label": "SOFTWARE", "start_offset": 134, "end_offset": 144 } ]
[]
[]
1,433
If they haven’t already
[]
[]
[]
1,434
, soon attackers and malware authors will turn their attention to exploiting vulnerabilities surrounding Android app certificates.
[ { "id": 46766, "label": "SOFTWARE", "start_offset": 105, "end_offset": 116 } ]
[]
[]
1,435
When an app is published to the Google Play Store, the certificate information is included within the APK file.
[ { "id": 46767, "label": "SOFTWARE", "start_offset": 32, "end_offset": 49 } ]
[]
[]
1,436
To view the certificate information just open the given APK file as a zip file.
[]
[]
[]
1,437
The certificate information is stored within the certificate’s “/META-INF” folder.
[ { "id": 46768, "label": "FILEPATH", "start_offset": 65, "end_offset": 74 } ]
[]
[]
1,438
You can use keytool or openssl tools to view the certificate information.
[]
[]
[]
1,439
An example taken from the popular Angry Birds app is shown in Figure 1.
[ { "id": 46769, "label": "SOFTWARE", "start_offset": 34, "end_offset": 45 } ]
[]
[]
1,440
The certificate fingerprints (circled in red) are what can be used to uniquely identify a certificate.
[]
[]
[]
1,441
Figure 1 These digital certificates, self-signed or not, are the keys to updating apps in the Android ecosystem.
[ { "id": 46770, "label": "SOFTWARE", "start_offset": 96, "end_offset": 103 } ]
[]
[]
1,442
It is a primary reason the expiration dates are set so far into the future and developers are able to self-sign certificates.
[]
[]
[]
1,443
The only way to update an app is for the developer to sign the update with the same digital certificate originally used to publish the app.
[ { "id": 47145, "label": "identity", "start_offset": 41, "end_offset": 51 } ]
[]
[]
1,444
If a developer wants to use a different certificate, they must publish the update separately as a new app.
[]
[]
[]
1,445
Furthermore, all Android apps published using the same certificate have a trust relationship between them.
[ { "id": 46771, "label": "SOFTWARE", "start_offset": 18, "end_offset": 25 } ]
[]
[]
1,446
Android allows apps signed by the same certificate to run in the same process and treats them as one single application instead of separate ones.
[ { "id": 46772, "label": "SOFTWARE", "start_offset": 0, "end_offset": 7 } ]
[]
[]
1,447
It also allows multiple apps with the same certificate, if using signature-based permission checks, to expose functionality and exchange code and data amongst themselves.
[]
[]
[]
1,448
This is convenient for developers, which is great, but it is also convenient for hackers, which is not.
[]
[]
[]
1,449
Losing control of a certificate’s private key, or using an insecure private key, can have severe security consequences.
[]
[]
[]
1,450
For example, if an attacker obtained the private key of an app, he or she could create a fake APK file, sign it using the same certificate as the legitimate app, and replace the targeted app with fake app on the device silently using the “Application upgrade” procedure.
[]
[]
[]
1,451
In addition, if the attacker can’t create an app with the same name as the targeted app, he or she can still check the “SharedUserId” option.
[]
[]
[]
1,452
This allows apps with different package names but signed with the same certificate to share permissions and stored data.
[]
[]
[]
1,453
Because of this, app developers should be extremely careful about re-using certificates when signing their apps.
[]
[]
[]
1,454
Ideally, an app developer should generate a unique private key for each unique app they post in the Google Play Store.
[ { "id": 46773, "label": "SOFTWARE", "start_offset": 101, "end_offset": 118 } ]
[]
[]
1,455
Unfortunately, during our study of apps posted in the Google Play Store we collected approximately 246,000 Android apps but only 11,681 certificates.
[ { "id": 45020, "label": "SOFTWARE", "start_offset": 55, "end_offset": 72 }, { "id": 45021, "label": "SOFTWARE", "start_offset": 108, "end_offset": 115 } ]
[]
[]
1,456
The distribution of the number of apps sharing the same key is shown below.
[]
[]
[]
1,457
The X-axis is the number of apps sharing the same certificate.
[]
[]
[]
1,458
The Y-axis is the number of certificates.
[]
[]
[]
1,459
For example, the number of certificates used by only one app is 1,323.
[]
[]
[]
1,460
About 6,925 certificates are used to sign between 6 and 19 different apps.
[]
[]
[]
1,461
Figure 2
[]
[]
[]
1,462
As we see in this distribution, a lot of developers sign different apps with the same certificate.
[]
[]
[]
1,463
We further investigated the following cases:
[]
[]
[]
1,464
1. Signing apps with a publicly known private key Many key pairs are well known in the development community.
[]
[]
[]
1,465
The most famous set of key pairs would be the key pairs included within the AOSP source files (in Table 1, below).
[ { "id": 46774, "label": "SOFTWARE", "start_offset": 76, "end_offset": 80 } ]
[]
[]
1,466
More key pairs can be found in developer forums and academic research.
[]
[]
[]
1,467
Table 1 If one app is signed using the publicly known private keys, it is easy for other apps on the same device to replace this vulnerable app with another APK file, silently with no user knowledge or interaction.
[]
[]
[]
1,468
We scanned our inventory of APK files downloaded from the Google Play Store and found at least 87 apps using the “testkey” in Table 1.
[ { "id": 46775, "label": "SOFTWARE", "start_offset": 59, "end_offset": 76 } ]
[]
[]
1,469
According to the Google Play Store, these 87 apps have been downloaded more than 1.6 million times.
[ { "id": 46776, "label": "SOFTWARE", "start_offset": 17, "end_offset": 34 } ]
[]
[]
1,470
For security reasons we are not posting the names of any of these apps.
[]
[]
[]
1,471
Under no circumstances should developers ever use private keys that are publicly available, nor should users download them.
[]
[]
[]
1,472
However, it isn’t easy for users to know the app they’re downloading is using a compromised private key – the onus for this is squarely on developers.
[]
[]
[]
1,473
2. Mobile banking apps sharing one single key Mobile banking apps are particularly sensitive with significant security concerns, which is why we were surprised to discover one certificate was used to sign more than 300 mobile banking apps in the Google Play Store.
[ { "id": 46777, "label": "SOFTWARE", "start_offset": 248, "end_offset": 265 } ]
[]
[]
1,474
This practice is not necessarily dangerous, as long as the developer does not share the key with the various banks that contracted the applications.
[]
[]
[]
1,475
We’ve contacted the developer to confirm they have retained sole custody of the keys.
[]
[]
[]
1,476
Of course, even with out-sourced application development, app owners should prefer to hold their own key.
[]
[]
[]
1,477
Whoever controls the key controls updates for the application forever, and a key shared between applications in this way can never be transferred to a financial institution without compromising the security of all of the other apps signed with it.
[]
[]
[]
1,478
The developer is aware of this concern and plans to encourage more of its customers to sign their own applications in the coming year.
[]
[]
[]
1,479
In addition to our research, the Baidu Security team in China recently found 23 mobile banking apps sharing the same certificate hosted by a third party app developer and reported the discovery to the CNCERT in China.
[ { "id": 45023, "label": "location", "start_offset": 56, "end_offset": 61 }, { "id": 45025, "label": "location", "start_offset": 211, "end_offset": 216 }, { "id": 45026, "label": "identity", "start_offset": 201, "end_offset": 207 }, { "id": 45024, "label": "identity", "start_offset": 33, "end_offset": 52 } ]
[ { "id": 58, "from_id": 45026, "to_id": 45025, "type": "located-at" }, { "id": 219, "from_id": 45024, "to_id": 45023, "type": "located-at" } ]
[]
1,480
3. Third party app developers using the same key for all apps generated for all customers
[]
[]
[]
1,481
The app developer industry is booming.
[]
[]
[]
1,482
These developers help customers build mobile apps for their businesses easily and quickly.
[]
[]
[]
1,483
They serve an important role for the majority of businesses that do not have in-house developers.
[]
[]
[]
1,484
Unfortunately, we uncovered some of these developers using the same certificate for every app.
[]
[]
[]
1,485
Again, using the same private key is probably due to the convenience in app management.
[]
[]
[]
1,486
But as we noted earlier, apps signed by the same certificate can automatically grant sharing relationships amongst themselves.
[]
[]
[]
1,487
This means all of the apps created by these developers, regardless of intended use, could be used maliciously.
[]
[]
[]
1,488
Table 2 shows select top app developers using the same certificate in signing all their apps.
[]
[]
[]
1,489
For security reasons, we have masked the names.
[]
[]
[]
1,490
Table 2 Digital certificates are a critical component of the security of Android apps.
[ { "id": 46778, "label": "SOFTWARE", "start_offset": 75, "end_offset": 82 } ]
[]
[]
1,491
Unfortunately, many app developers in the Google Play Store have ignored these concerns in favor of convenience.
[ { "id": 45027, "label": "SOFTWARE", "start_offset": 42, "end_offset": 59 } ]
[]
[]
1,492
While in some cases that may be justified – the app may not contain any important or identifying information – in many of the cases we discovered it is not.
[]
[]
[]
1,493
This poses great potential security risks to both app users and app owners.
[]
[]
[]
1,494
We encourage developers to reconsider their stance on this issue and where necessary make changes before a significant security event happens.
[]
[]
[]
1,495
Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!
[]
[]
[]
1,496
Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
[]
[]
[]
1,497
A backdoor implant is an increasingly common mechanism for maintaining unauthorized access and control over a computer asset.
[ { "id": 45029, "label": "attack-pattern", "start_offset": 71, "end_offset": 90 } ]
[]
[]
1,498
The terms remote administration tool (RAT) and trojan downloader are often used synonymously with such implants.
[]
[]
[]
1,499
Once installed (i.e. implanted on a system), the modern backdoor typically offers much more than simple (i.e. command line) access to a system.
[]
[]
[]
1,500
Depending on the backdoor’s specialization and sophistication, it can also capture keystrokes, take screenshots, scrape memory for valuable information, search for files meeting certain criteria, query databases, download files and additional malware, exfiltrate data and files, and even serve as an attack platform.
[]
[]
[]
1,501
Effectively, a backdoor implant affects loss of control over a computer asset.
[]
[]
[]
1,502
The tangible and intangible impacts of this loss of control vary based on respective backdoor capabilities, and may include the following: leakage of authentication credentials, loss of intellectual property, exposure of sensitive information, negative standing or reputation, and various levels of liability for actions executed on or from the compromised asset.
[]
[]
[]
1,503
Recently Palo Alto Networks discovered a backdoor program ( md5: b826fb1253a52a3b53afa3b7543d7694, sha256: 6bedd1b0716fe7632188932451f75295346836545e6d2bfee1b56121e02ca110 ) that is used to control a linux operating system.
[ { "id": 45032, "label": "SHA2", "start_offset": 108, "end_offset": 172 }, { "id": 45033, "label": "identity", "start_offset": 10, "end_offset": 28 }, { "id": 45031, "label": "MD5", "start_offset": 66, "end_offset": 98 }, { "id": 45034, "label": "SOFTWARE", "start_offset": 201, "end_offset": 223 } ]
[ { "id": 220, "from_id": 45031, "to_id": 45032, "type": "related-to" } ]
[]
1,504
This particular linux backdoor will install itself to "/usr/bin/btdaemon" and create a startup service at "/etc/init.d/bluetoothdaemon" with symbolic links so that it will run in any startup mode. The file contents are a simple bash script that runs the original btdaemon file.
[ { "id": 46779, "label": "FILEPATH", "start_offset": 56, "end_offset": 73 }, { "id": 46780, "label": "FILEPATH", "start_offset": 108, "end_offset": 135 } ]
[]
[]
1,505
The backdoor when run will create threads for each connection listed in its config file. The sample that was caught by our systems contains 3 IP addresses in its config file.
[]
[]
[]
1,506
For each IP address the btdaemon service will attempt to make a connection on UDP ports 53, 80, 110, and 443.
[]
[]
[]
1,507
Upon successful connection it will send the string "¡°MlCROS0FT|1.2 Apr 26 2014 02:37:05|Linux Kernel Version¡±" and will wait for an "Auth" packet from the server.
[]
[]
[]
1,508
If the backdoor receives a packet in the form of a "cmdType|cmdBody" it will check the cmdType list and execute the equivalent instruction. Valid instructions are between 0-9 and there functionality varies depending on the command.
[]
[]
[]
1,509
While running the btdaemon process also inspects whether there is an ".IptabLes" or ".IptabLex" local process, and sends back status for monitoring purposes. If the "disablerun" command is sent the backdoor will download a file named "run.txt" from one of the following URLs: The file data is in the format "exe_path_1 | exe_path_2 | ... | exe_path_N". If none of the paths is correct then a "getsetup.rar" file is downloaded and run.
[ { "id": 45035, "label": "FILEPATH", "start_offset": 397, "end_offset": 409 }, { "id": 45037, "label": "FILEPATH", "start_offset": 237, "end_offset": 244 } ]
[]
[]
1,510
This is an ELF file and there are various encrypted portions within it.
[]
[]
[]
1,511
There exist two embedded zlib-encrypted blocks at file offset 0x8C0C0 and 0xE6B40 respectively.
[ { "id": 4493, "label": "tools", "start_offset": 26, "end_offset": 30 } ]
[]
[]
1,512
When run if the filename does not include the "IptabLes" string then the data is decrypted, written to disk, and then executed, installing itself as a startup service on the machine and place itself in one of the following locations: The second encrypted block is configuration data, which includes some IP addresses and DNS data which is used when it writes the first decrypted block to a file.
[]
[]
[]
1,513
"dns.po888.com|122.228.242.51|119.145.148.56|162.221.13.82".
[ { "id": 46781, "label": "DOMAIN", "start_offset": 2, "end_offset": 15 }, { "id": 46782, "label": "IPV4", "start_offset": 16, "end_offset": 30 }, { "id": 46783, "label": "IPV4", "start_offset": 31, "end_offset": 45 }, { "id": 46784, "label": "IPV4", "start_offset": 46, "end_offset": 59 } ]
[]
[]
1,514
If the file is run in a path including the "IptabLes" string then it installs itself as a startup service and proceeds into its main loop.
[]
[]
[]
1,515
Either path the "getsetup.rar" file takes is meant to ensure that it is installed as a startup service, ensuring persistence. Once the file is running it creates a process identifier (PID) so that only one instance is running at any given time.
[ { "id": 46785, "label": "FILEPATH", "start_offset": 18, "end_offset": 30 } ]
[]
[]
1,516
The file will connect to an IP and port configured from the configuration data and sends along information that includes the cpu and memory information.
[]
[]
[]