{"id":15904,"date":"2019-07-25T02:30:25","date_gmt":"2019-07-25T10:30:25","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/07\/25\/news-9649\/"},"modified":"2019-07-25T02:30:25","modified_gmt":"2019-07-25T10:30:25","slug":"news-9649","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/07\/25\/news-9649\/","title":{"rendered":"5 smart questions that&#039;ll smother most Android security scares"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2019\/07\/android-security-scares-100802716-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: JR Raphael| Date: Thu, 25 Jul 2019 03:00:00 -0700<\/strong><\/p>\n<p>I haven&#8217;t looked at today&#8217;s tech news too closely just yet, but I have a sneaking suspicion some evil-sounding virtual gremlin or other is probably on the brink of invading my smartphone, stealing my secrets, and setting me up for a lifetime of dread and despair.<\/p>\n<p>He might even be covertly eating all the salty snacks from my kitchen this very second. ALL THE SALTY SNACKS, DAMN IT!<\/p>\n<p>I don&#8217;t <em>have<\/em> to scan the headlines too closely to know there&#8217;s a decent chance of all of this happening \u2014 because all of this happens practically every other week here in the Android world. A solid few to several times a month, it seems, some hilariously named and made-to-seem-scary new piece of malware (ViperRat! Desert Scorpion! Ooga-Booga-Meanie-Monster!) is making its way onto our phones and into our lives. Or so we&#8217;re told, rather convincingly and repeatedly. (All right, so I may have made Ooga-Booga-Meanie-Monster up just now, but c&#8217;mon: It&#8217;s probably only a matter of time til we see something using that name.)<\/p>\n<p>In reality, these big, bad bogeyman are almost always sought out, carefully branded, and deliberately played up by the marketing departments of companies that have plenty to gain from perpetuating the idea that our phones are constantly under attack. They&#8217;re <a href=\"https:\/\/www.computerworld.com\/article\/3105569\/android-quadrooter.html\">publicity stunts<\/a>, plain and simple \u2014 and <a href=\"https:\/\/www.computerworld.com\/article\/3105569\/android-quadrooter.html?nsdr=true\">pretty shameless ones<\/a>, at that.<\/p>\n<p>But hey, you&#8217;re here. You&#8217;re a step ahead of the uninformed and innocent smartphone-carrying masses \u2014 the men, women, parakeets, and Pok\u00e9-people who tote around Android phones and remain at the highest risk of all. Not of getting infected by some vicious Android malware monster, mind you, but of getting duped by some misleading, sensational scare campaign orchestrated by a company desperate to profit off their fear.<\/p>\n<p>Luckily, there&#8217;s one foolproof form of protection \u2014 and it&#8217;s information. I&#8217;ve come up with a simple five-question test to run on any Android security scare you see on this wild, untamed internet of ours, and I promise you: It&#8217;ll save you and your mobile-tech charges countless hours of undue anxiety.<\/p>\n<p>So read over these questions, sing &#8217;em out loud in the shower, tattoo &#8217;em on your thorax \u2014 whatever it takes to internalize them and remember &#8217;em for the future. Then, <em>you<\/em> can become the voice of reason among your less knowledgeable friends, family members, co-workers, and kittens.<\/p>\n<p>Ready?<\/p>\n<p>This is an important question to ask with <em>any<\/em> kind of research, really \u2014 but within the realm of Android security scares, specifically, it&#8217;s rare to encounter a story that can&#8217;t ultimately be traced back to some company that stands to profit from selling you security software for your Android phone.<\/p>\n<p>And you know what? Such third-party security software is <a href=\"https:\/\/www.csoonline.com\/article\/3235521\/best-android-security-app-why-youre-asking-the-wrong-question.html\" rel=\"noopener\" target=\"_blank\">almost always unnecessary<\/a> on Android. It&#8217;s little more than mobile-tech snake oil, and that&#8217;s precisely why the companies that make it have to resort to over-the-top scare-campaigns to trick you into thinking you need it.<\/p>\n<p>Now, just because a company that sells security software is behind a security scare story, should you automatically disregard its findings? Of course not. But you should \u2014 nay, you <em>have to<\/em> \u2014 consider that company&#8217;s motivation as part of the context.<\/p>\n<p>These companies, y&#8217;see, devote a substantial amount of resources to searching for untapped security situations and then creating marketing campaigns around them. Remember, anyone can report a vulnerability to Google. These folks deliberately concoct memorable, scary-sounding names for whatever they uncover and then conduct full-fledged publicity operations to get their findings published in as many places as possible. And the narrative they push never fails to mention how <em>their<\/em> software and their software <em>alone<\/em> can protect us all from these evil malware monsters \u2014 while simultaneously downplaying the layers of protection that are already in place and making the threats of little to no real-world consequence for the vast majority of us.<\/p>\n<p>And that, conveniently, brings us to our second question:<\/p>\n<p>When you really stop and read the fine print of most Android malware reports, you realize that a significant percentage of them require you to sign into some obscure Russian porn forum to find and install a shady-looking app (which would <em>then <\/em>require you to authorize your phone to allow the installation of such an app in the first place \u2014 something Android doesn&#8217;t permit by default and no corporate security policy is likely to allow in any circumstance).<\/p>\n<p>Even if you do for some reason regularly install apps from random non-Play-Store sources, your odds of encountering something truly dangerous are still incredibly low. According to Google&#8217;s <a href=\"https:\/\/source.android.com\/security\/reports\/Google_Android_Security_2018_Report_Final.pdf\" rel=\"noopener nofollow\" target=\"_blank\">latest platform-wide statistics<\/a>, just 0.68 percent of devices that installed apps from outside of Google Play were affected by what the company calls &#8220;potentially harmful applications&#8221; throughout 2018. That&#8217;s less than one percent, globally.<\/p>\n<p>And when you look at phones that stuck to the Play Store for app installation \u2014 what most regular Android owners and certainly most business users do \u2014 the number drops down to a mere <em>0.08 <\/em>percent.<\/p>\n<p>Hmmmmm.<\/p>\n<p>Let&#8217;s go down a bit of a metaphorical rabbit hole and assume you <em>did<\/em> run into and install the scary-sounding app demon of the moment. That&#8217;s already overcoming an awful lot of odds and venturing into pretty hypothetical terrain \u2014 but even if we play that game, chances are your phone would <em>still <\/em>stop the offending app before it was able to do much of anything.<\/p>\n<p>Remember, Android has multiple layers of security: There&#8217;s the operating system itself, which uses a sandboxing system to keep every app separate from other areas of the device and limit the ways in which it can go beyond those barriers; the permissions system, which limits the types of data and system functions an app is able to access without your explicit authorization; the <a href=\"https:\/\/source.android.com\/security\/verifiedboot\" rel=\"noopener nofollow\" target=\"_blank\">Verified Boot system<\/a>, which verifies the integrity of system software every time your phone starts up; and then <a href=\"https:\/\/www.computerworld.com\/article\/3210587\/google-play-protect-android.html\">Google Play Protect<\/a>, which continuously scans the Play Store <em>and <\/em>your actual device for signs of suspicious behavior (and remains active and up to date independently, without the need for any manufacturer- or carrier-provided updates).<\/p>\n<p>The Chrome Android browser also watches out for any website-based threats, and Android itself keeps an eye out for any signs of SMS-based scams.<\/p>\n<p>Like any security setup, those systems <a href=\"https:\/\/www.computerworld.com\/article\/3236194\/android\/google-play-protect.html\">aren&#8217;t flawless<\/a> \u2014 but they fail far less frequently than the security software vendors would lead you to believe. More often than not, even on the extremely low chance that you do encounter anything dangerous, at least one of those layers will keep it from doing anything.<\/p>\n<p>And if not&#8230;<\/p>\n<p>When we hear about problematic apps making their way into the Play Store, the apps are by and large programs that do something shady in order to make extra money for the developer \u2014 like click fraud, which accounted for more than half of all potentially harmful app installs from the Play Store in 2018, according to Google&#8217;s internal stats.<\/p>\n<p>Click fraud is just a fancy way of saying an app quietly clicks on ads in the background in order to run up a tally. It&#8217;s by no means <em>good <\/em>or something you want to be involved with, but it&#8217;s also a far cry from identity theft, data compromise, or any of the other life-altering fears these security scare campaigns tend to play off of.<\/p>\n<p>Take, for instance, this week&#8217;s terrifying-sounding &#8220;Agent Smith&#8221; malware (yes, I just checked this week&#8217;s headlines \u2014 and sure enough, there was no shortage of examples). Discovered and publicized by mobile security software vendor <a href=\"https:\/\/www.checkpoint.com\/press\/2019\/25-million-infected-devices-check-point-research-discovers-new-variant-of-mobile-malware\/\" rel=\"noopener nofollow\" target=\"_blank\">Check Point<\/a> (mhmm), the malware &#8220;exploits known Android vulnerabilities and automatically replaces installed apps with malicious versions without users&#8217; knowledge or interaction.&#8221;<\/p>\n<p>HOLY HELLFIRE! That&#8217;s it: I&#8217;m hiding under my desk.<\/p>\n<p>But wait \u2014 what&#8217;s that you say? (It&#8217;s hard to hear from all the way under here.) What does this blood-curdling beast actually do?<\/p>\n<p>Oh: &#8220;The malware currently uses its broad access to the devices&#8217; resources to show fraudulent ads for financial gain.&#8221;<\/p>\n<p>Right.<\/p>\n<p>Beyond that, the app has primarily been found on third-party app stores that, if you&#8217;re reading this, you probably haven&#8217;t ever used. And even <em>in <\/em>those stores, it&#8217;s typically tucked into &#8220;barely functioning photo [utilities], games, or sex-related apps,&#8221; according to some fine print <a href=\"https:\/\/research.checkpoint.com\/agent-smith-a-new-species-of-mobile-malware\/\" rel=\"noopener nofollow\" target=\"_blank\">in Check Point&#8217;s materials<\/a> (fine print that, by the by, is oh-so-conveniently not included in any of the company&#8217;s widely promoted blogs or press releases).<\/p>\n<p>As I&#8217;ve <a href=\"https:\/\/www.computerworld.com\/article\/3268904\/android-security-facts.html#2\">said before<\/a>, Android malware is mostly the terrain of low-level pickpockets who pounce on easy opportunities to snag dangling dollars \u2014 usually indirectly, at that \u2014 and not sophisticated identity thieves who infiltrate their victims&#8217; lives.<\/p>\n<p>And finally:<\/p>\n<p>Lemme ask you this: Of all the folks you know who use Android, how many have actually been affected by legitimate malware on their mobile devices? Once you factor in all the caveats we just finished discussing, the answer \u2014 for most of us \u2014 tends to be somewhere between &#8220;zero&#8221; and &#8220;none.&#8221;<\/p>\n<p>And the scarier the software sounds, it seems, the more likely it is to be completely irrelevant to your life. Look, for instance, at this week&#8217;s thoughtfully branded &#8220;Monokle&#8221; malware. (The &#8220;k&#8221; in &#8220;Monokle&#8221; makes it seem extra unusual and intimidating \u2014 and also has the side perk of making it easy to own as a search term. See what they did there?)<\/p>\n<p>&#8220;Monokle&#8221; was uncovered by <a href=\"https:\/\/blog.lookout.com\/monokle\" rel=\"noopener nofollow\" target=\"_blank\">Lookout<\/a>, one of Android&#8217;s longest-standing security-scare-campaign orchestrators. The software, according to the company, &#8220;possesses remote access trojan (RAT) functionality, uses advanced data exfiltration techniques, and has the ability to install an attacker-specified certificate to the trusted certificates store on an infected device that would facilitate man-in-the-middle (MITM) attacks.&#8221;<\/p>\n<p>Well, by golly, I think I&#8217;ve just soiled my trousers. Hang on, though: When exactly will this thing jump out and attack me? Oh \u2014 no one has ever actually <em>seen <\/em>this terrifying ogre out in the wild, you say? No one knows how it&#8217;s distributed or has any reason to believe any normal person would ever encounter it in any way?<\/p>\n<p>All righty, then.<\/p>\n<p>But, take heart: &#8220;Lookout customers have been protected against Monokle since early 2018.&#8221;<\/p>\n<p>Yuuuup.<\/p>\n<p>Here&#8217;s the reality, my amigo: Android absolutely <em>does<\/em> have a troubling security epidemic. It&#8217;s in the way companies take advantage of naivety among average phone-owners in order to create a persistent fear that serves business goals. Without that fear in place, these companies wouldn&#8217;t be able to sell their software. And if they didn&#8217;t sell their software, they wouldn&#8217;t be in business.<\/p>\n<p>At the end of the day, a teensy touch of Android knowledge and <a href=\"https:\/\/www.computerworld.com\/article\/3268904\/android-security-facts.html#6\">a healthy pinch of common sense<\/a> will go a long way in keeping you safe \u2014 both from the big, bad bogeyman security software vendors love to tell tales about and, more significantly, from the software vendors themselves and the sensational exaggerations they never stop spreading.<\/p>\n<p>Keep these questions handy \u2014 and make sure you&#8217;re always keeping up with your own basic\u00a0<a href=\"https:\/\/www.computerworld.com\/article\/3012630\/android-security-audit.html\">Android security hygiene<\/a> \u2014 and you&#8217;ll find there&#8217;s rarely a reason to worry, no matter how much huffing and puffing the latest Android malware monster may do.<\/p>\n<p><i>Sign up for <a href=\"https:\/\/www.androidintel.net\" rel=\"noopener nofollow\" target=\"_blank\">my weekly newsletter<\/a> to get more practical tips, personal recommendations, and plain-English perspective on the news that matters.<\/i><\/p>\n<p><strong>[<a href=\"https:\/\/www.computerworld.com\/video\/series\/8536\/android\">Android Intelligence videos at Computerworld<\/a>]<\/strong><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3411440\/android-security-scares.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2019\/07\/android-security-scares-100802716-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: JR Raphael| Date: Thu, 25 Jul 2019 03:00:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>I haven&#8217;t looked at today&#8217;s tech news too closely just yet, but I have a sneaking suspicion some evil-sounding virtual gremlin or other is probably on the brink of invading my smartphone, stealing my secrets, and setting me up for a lifetime of dread and despair.<\/p>\n<p>He might even be covertly eating all the salty snacks from my kitchen this very second. ALL THE SALTY SNACKS, DAMN IT!<\/p>\n<p>I don&#8217;t <em>have<\/em> to scan the headlines too closely to know there&#8217;s a decent chance of all of this happening \u2014 because all of this happens practically every other week here in the Android world. A solid few to several times a month, it seems, some hilariously named and made-to-seem-scary new piece of malware (ViperRat! Desert Scorpion! Ooga-Booga-Meanie-Monster!) is making its way onto our phones and into our lives. Or so we&#8217;re told, rather convincingly and repeatedly. (All right, so I may have made Ooga-Booga-Meanie-Monster up just now, but c&#8217;mon: It&#8217;s probably only a matter of time til we see something using that name.)<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3411440\/android-security-scares.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10462,11271,714,11619],"class_list":["post-15904","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-android","tag-operating-systems","tag-security","tag-software"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15904","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15904"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15904\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15904"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15904"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15904"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}