Android Update Vulnerabilities Could Allow Data Thieves On Phones

Weaknesses in the app update process on Google’s Android operating system could allow attackers to sneak malicious applications onto user devices.

The “pileup” (privilege escalation through updating) vulnerabilities would let an ostensibly nonthreatening app, with limited permissions, turn into a piece of data-stealing software after an update to the OS, according to researchers from Microsoft and Indiana University.

Android update danger

An app could gain permissions that were not previously available on the old OS version, such as access to voicemail, the researchers said.

They uncovered six  Pileup flaws within Android Package Manager Service, looking into 3,522 Android source code versions customised by Samsung, LG and HTC.

The researchers said exploits would have potentially dire consequences for users. Using a shared user ID (UID) across apps, they were able to show how a malicious app could substitute for system apps such as Google Calendar. This “package name trick” was found to work on the Android browser, allowing them to toy with cookies, cache, security configurations and bookmarks.

A malicious app could also get permission to access voicemails, user credentials, call logs, notifications of other apps and text messages.

Exploits could also be used to prevent the user from installing system critical apps, like Play Services, which is  used to update Google apps and apps from the company’s store.

“The malware can also gain complete control of new signature and system permissions, lowering their protection levels to “normal” and arbitrarily changing their descriptions that the user needs to read when deciding on whether to grant them to an app,” the paper read.

“Particularly, we found that customised OSes are highly susceptible to the Pileup attacks, due to a large number of system capabilities they bring in for each upgrade.”

They said they had informed Google and the relevant manufacturers of their findings and were working on patches.

The researchers created software called SecUP, which deploys a scanner on the user’s device to detect apps that would get malicious upgrades. The app can now be found on Google Play.

Google had not responded to a request for comment at the time of publication.

How well do you know Google’s secrets? Find out with our quiz!

Thomas Brewster

Tom Brewster is TechWeek Europe's Security Correspondent. He has also been named BT Information Security Journalist of the Year in 2012 and 2013.

Recent Posts

Apple Sales Rise 6 Percent After Early iPhone 16 Demand

Fourth quarter results beat Wall Street expectations, as overall sales rise 6 percent, but EU…

19 hours ago

X’s Community Notes Fails To Stem US Election Misinformation – Report

Hate speech non-profit that defeated Elon Musk's lawsuit, warns X's Community Notes is failing to…

20 hours ago

Google Fined More Than World’s GDP By Russia

Good luck. Russia demands Google pay a fine worth more than the world's total GDP,…

21 hours ago

Spotify, Paramount Sign Up To Use Google Cloud ARM Chips

Google Cloud signs up Spotify, Paramount Global as early customers of its first ARM-based cloud…

2 days ago

Meta Warns Of Accelerating AI Infrastructure Costs

Facebook parent Meta warns of 'significant acceleration' in expenditures on AI infrastructure as revenue, profits…

2 days ago

AI Helps Boost Microsoft Cloud Revenues By 33 Percent

Microsoft says Azure cloud revenues up 33 percent for September quarter as capital expenditures surge…

2 days ago