{"id":11997,"date":"2018-04-12T10:45:16","date_gmt":"2018-04-12T18:45:16","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/04\/12\/news-5766\/"},"modified":"2018-04-12T10:45:16","modified_gmt":"2018-04-12T18:45:16","slug":"news-5766","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/04\/12\/news-5766\/","title":{"rendered":"How Android Phones Hide Missed Security Updates From You"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5acd6226ca7afd490baac198\/master\/pass\/AndroidSecurity-91620751.jpg\"\/><\/p>\n<p><strong>Credit to Author: Andy Greenberg| Date: Thu, 12 Apr 2018 11:00:00 +0000<\/strong><\/p>\n<p><span class=\"lede\">Google has long <\/span>struggled with how best to get dozens of Android smartphone manufacturers\u2014and hundreds of carriers\u2014to <a href=\"https:\/\/www.wired.com\/2015\/08\/google-samsung-lg-roll-regular-android-security-updates\/\">regularly push out<\/a> security-focused software updates. But when one German security firm looked under the hood of hundreds of Android phones, it found a troubling new wrinkle: Not only do many Android phone vendors <a href=\"https:\/\/www.wired.com\/2017\/03\/good-news-androids-huge-security-problem-getting-less-huge\/\">fail to make patches available<\/a> to their users, or delay their release for months; they sometimes also tell users their phone&#x27;s firmware is fully up to date, even while they&#x27;ve secretly skipped patches.<\/p>\n<p>On Friday at the Hack in the Box security conference in Amsterdam, researchers Karsten Nohl and Jakob Lell of the firm Security Research Labs plan to present the results of two years of reverse-engineering hundreds of Android phones&#x27; operating system code, painstakingly checking if each device actually contained the security patches indicated in its settings. They found what they call a &quot;patch gap&quot;: In many cases, certain vendors&#x27; phones would tell users that they had all of Android&#x27;s security patches up to a certain date, while in reality missing as many as a dozen patches from that period\u2014leaving phones vulnerable to a broad collection of known hacking techniques.<\/p>\n<p class=\"paywall\">&quot;We find that there&#x27;s a gap between patching claims and the actual patches installed on a device. It\u2019s small for some devices and pretty significant for others,&quot; says Nohl, a well-known security researcher and SRL&#x27;s founder. In the worst cases, Nohl says, Android phone manufacturers intentionally misrepresented when the device had last been patched. &quot;Sometimes these guys just change the date without installing any patches. Probably for marketing reasons, they just set the patch level to almost an arbitrary date, whatever looks best.&quot;<\/p>\n<p class=\"paywall\">SRL tested the firmware of 1,200 phones,\u00a0from more than a dozen\u00a0phone manufacturers,\u00a0for every Android patch released in 2017.\u00a0The\u00a0devices were made by\u00a0Google itself\u00a0as\u00a0well as\u00a0major Android phone makers like Samsung, Motorola,\u00a0and HTC,\u00a0and\u00a0lesser-known Chinese-owned companies like ZTE and TCL. Their testing found that other than Google&#x27;s own flagship phones like the Pixel and\u00a0<a href=\"https:\/\/www.wired.com\/2017\/10\/review-google-pixel-2\/\">Pixel 2<\/a>,\u00a0even top-tier phone vendors sometimes claimed to have patches installed that they actually lacked. And the lower-tier collection of manufacturers had a far messier record.<\/p>\n<p>&#x27;Sometimes these guys just change the date without installing any patches.&#x27;<\/p>\n<p name=\"inset-left\" class=\"inset-left-component__el\">Karsten Nohl, Security Research Labs<\/p>\n<p class=\"paywall\">The problem, Nohl points out, is worse than vendors merely neglecting to patch older devices, a common phenomenon. Instead, it&#x27;s that they tell users they install patches that they in fact don&#x27;t, creating a false sense of security. &quot;We found several vendors that didn\u2019t install a single patch but changed the patch date forward by several months,&quot; Nohl says. &quot;That\u2019s deliberate deception, and it&#x27;s not very common.&quot;<\/p>\n<p class=\"paywall\">More often, Nohl believes, companies like Sony or Samsung would miss a patch or two by accident. But in other cases, the results were harder to explain: SRL found that one Samsung phone, the 2016 J5, was perfectly honest about telling the user which patches it had installed and which it still lacked, while Samsung&#x27;s 2016 J3 claimed to have every Android patch issued in 2017 but lacked 12 of them\u2014two considered as &quot;critical&quot; for the phone&#x27;s security.<\/p>\n<p class=\"paywall\">Given that kind of hidden inconsistency, &quot;it&#x27;s almost impossible for the user to know which patches are actually installed,&quot; Nohl says.  In an effort to solve that missing patch transparency problem, SRL Labs is also releasing an <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=de.srlabs.snoopsnitch&amp;hl=en\" target=\"_blank\">update to its Android app SnoopSnitch<\/a> that will let users check their phone&#x27;s code for the actual state of its security updates.<\/p>\n<p class=\"paywall\">After averaging out the results of every phone tested for each vendor, SRL labs produced the chart below, which splits vendors into three categories based how faithfully their patching claims matched reality in 2017, focusing only on phones that received at least one patch in October of 2017 or later. Phones from major Android vendors including Xiaomi and Nokia had on average between one and three missing patches, and even major vendors like HTC, Motorola, and LG missed between three and four of the patches they claimed to have installed. But the lowest-performing companies on the list were the Chinese firms TCL and ZTE, all of whose phones had on average more than four patches that they&#x27;d claimed to have installed, but hadn&#x27;t.<\/p>\n<p class=\"paywall\">SRL also points to chip suppliers as one possible reason for missing patches: While phones with processors from Samsung had very few silently skipped patches, ones that used chips from the Taiwanese firm MediaTek lacked a whopping 9.7 patches on average. That may in some cases be simply because cheaper phones are more likely to skip patches, and also tend to use cheaper chips. But in other cases, it&#x27;s because bugs are found in the phone&#x27;s chips rather than in its operating system, and the phone manufacturer depends on the chipmaker to offer a patch. As a result, cheaper phones that source chips from lower-end suppliers inherit those suppliers&#x27; missed patches. &quot;The lessons is that if you go for a cheaper device, you end up in a less well maintained part to this ecosystem,&quot; Nohl says.<\/p>\n<p class=\"paywall\">When WIRED reached out to Google, the company said that it appreciated SRL&#x27;s research, but responded by pointing out that some of the devices SRL analyzed may not have been Android <a href=\"https:\/\/www.android.com\/certified\/partners\/\" target=\"_blank\">certified devices<\/a>, meaning they&#x27;re not held to Google&#x27;s standards of security. They noted that modern Android phones have security features that make them difficult to hack even when they do have unpatched security vulnerabilities. And they argued that in some cases, patches might have been missing from devices because the phone vendors responded by simply removing a vulnerable feature from the phone rather than patch it, or the phone didn&#x27;t have that feature in the first place. The company says it&#x27;s working with SRL Labs to further investigate its findings. &quot;Security updates are one of many layers used to protect Android devices and users,&quot; added Scott Roberts, Android product security lead, a statement to WIRED.  &quot;Built-in platform protections, such as application sandboxing, and security services, such as Google Play Protect, are just as important. These layers of security\u2014combined with the tremendous diversity of the Android ecosystem\u2014contribute to the researchers&#x27; conclusions that remote exploitation of Android devices remains challenging.&quot;<sup>1<\/sup><\/p>\n<p class=\"paywall\">In response to Google&#x27;s assertion that some patches may have been unnecessary due to the vulnerable feature being missing from the phone or removed in response to the vulnerability, Nohl counters that those situations very rare. &quot;It\u2019s definitely not a significant number,&quot; he says.<\/p>\n<p class=\"paywall\">More surprisingly, Nohl agrees with Google&#x27;s other major point: Hacking Android phones by exploiting their missing patches is far harder than it sounds. Even Android phones that don&#x27;t have solid patching records still benefit from Android&#x27;s broader security measures, like address space layout randomization\u2014which since Android 4.0 (Lollipop) has randomized the location of a program in memory to make it harder for malware to exploit other parts of the phone\u2014and sandboxing, which limits a malicious program&#x27;s access to the rest of the device.<\/p>\n<p class=\"paywall\">That means most hacking techniques, known as exploits, that can gain full control of a target Android phone requires taking advantage of a series of vulnerabilities in a phone&#x27;s software, not just one missed patch. &quot;Even if you miss certain patches, chances are they\u2019re not aligned in a certain way that allows you to exploit them,&quot; Nohl says.<\/p>\n<p class=\"paywall\">As a result, he says, Android phones are far more often hacked with simpler schemes, namely\u00a0<a href=\"https:\/\/www.wired.com\/story\/google-play-store-malware\/\">rogue apps that find their way into\u00a0the\u00a0Google\u00a0Play Store<\/a>\u00a0or that trick users into installing them from other sources\u00a0<a href=\"https:\/\/www.wired.com\/2016\/12\/never-ever-ever-download-android-apps-outside-google-play\/\">outside of\u00a0the\u00a0Play\u00a0Store<\/a>.\u00a0&quot;Criminals will most likely stick with social engineering as long as humans are gullible and install free or pirated software that comes packaged with malware,&quot; Nohl says.<\/p>\n<p class=\"paywall\">Advanced,\u00a0<a href=\"https:\/\/www.wired.com\/story\/lipizzan-android-malware-nation-state\/\">state-sponsored hackers carrying out more targeted attacks<\/a>\u00a0on Android devices, however, may be another story. For the most part, Nohl argues they likely use zero-day vulnerabilities\u2014secret hackable bugs for which no patch exists at all\u2014rather than known but unpatched vulnerabilities. But in many cases they might use known and yet unpatched bugs in phones in combination with zero day vulnerabilities; he refers, as an example, to the spyware FinFisher, which at one point took advantage of a known Android vulnerability called Dirty COW in addition to its own fresh zero-day exploits.<\/p>\n<p class=\"paywall\">Nohl cites the security principle of &quot;defense in depth&quot;\u2014that security is most effectively implemented in multiple layers. And every missed patch is potentially one less layer of protection. &quot;You should never make it any easier for the attacker by leaving open bugs that in your view don\u2019t constitute a risk by themselves, but may be one of the pieces of someone else&#x27;s puzzle,&quot; Nohl says. &quot;Defense in depth means install all the patches.&quot;<\/p>\n<p class=\"paywall\"><sup>1<\/sup><em>Updated 4\/12\/2018 with an additional statement from Google.<\/em><\/p>\n<p class=\"related-cne-video-component__dek\">It\u2019s 2017! It\u2019s time to start using an encrypted messaging app. Why? Using end-to-end encryption means that no one can see what you\u2019re sharing back and forth.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/android-phones-hide-missed-security-updates-from-you\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5acd6226ca7afd490baac198\/master\/pass\/AndroidSecurity-91620751.jpg\"\/><\/p>\n<p><strong>Credit to Author: Andy Greenberg| Date: Thu, 12 Apr 2018 11:00:00 +0000<\/strong><\/p>\n<p>A study finds that Android phones aren&#8217;t just slow to get patched; sometimes they lie about being patched when they&#8217;re not.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714],"class_list":["post-11997","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11997","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11997"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11997\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11997"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11997"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11997"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}