Share

Related Links

  • Black Hat
  • Reed Exhibitions Ltd is not responsible for the content of external websites.

Top 5 Stories

News

Android apps are leaking private info says researcher

20 July 2011

Neil Daswani, CTO of Dasient, will be giving a presentation at next month's Black Hat USA event in which he will detail how large numbers of Android apps are leaking private information.

According to the Dark Reading newswire, Daswani has analysed around 10,000 Android apps and found around 800 were leaking data to an unauthorised server.

In addition, says the newswire, Daswani and his team found that 11 of the applications were sending potentially unwanted text messages out to other smartphones.

"Some of these applications, once started, were sending premium SMS messages," Daswani told the newswire. "The user ends up paying for those messages, and they can be pretty expensive. It's sort of like the old [premium rate] number scams, where if you called once, your phone would continue to incur the charges over and over again."

And these scams, he says, are likely to continue until the cellcos - as well as the Android device vendors - can work out a methodology of how to handle marketing and sales messages on SMS.

In some cases, he adds, legitimate application providers are simply initiating SMS communications without the user's consent, because there aren't any rules that require such consent yet

Daswani's study will also reveal the results of a forensic analysis of Android apps, which already have been infected earlier this year with the Droid Dream malware

Interestingly, Dasient says it found many other instances of malware that attempts to take over control of the device at the root level, and even seeks to spread to other devices in a worm-like fashion.

"Once you have root-level control, you pretty much own the phone", Daswani told the newswire, adding that this is a problem that carriers and device makers will have to soon take action on.

Dasient also reportedly found that mobile malware can be delivered via drive-by downloads from legitimate applications, which Daswani says has interesting implications, since it means that mobile malware can be delivered through legitimate and popular applications.

Daswani went on to tell Dark Reading that drive-by downloads are likely be buried in the most popular applications, such as those listed at the top of the Android Marketplace screens.

This article is featured in:
Application Security  •  Data Loss  •  Wireless and Mobile Security

 

Comment on this article

You must be registered and logged in to leave a comment about this article.

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×