{"id":10330,"date":"2017-11-07T10:30:27","date_gmt":"2017-11-07T18:30:27","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/11\/07\/news-4103\/"},"modified":"2017-11-07T10:30:27","modified_gmt":"2017-11-07T18:30:27","slug":"news-4103","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/11\/07\/news-4103\/","title":{"rendered":"When Google Play Protect fails"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/11\/google-play-protect-100741236-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: JR Raphael| Date: Tue, 07 Nov 2017 08:34:00 -0800<\/strong><\/p>\n<p>I&#8217;ve written a lot about Android security over the years \u2014 and more often than not, it&#8217;s the same ol&#8217; story time and time again:<\/p>\n<p>A company that sells mobile security software finds some theoretical threat \u2014 something that (a) hasn&#8217;t affected any actual users in the real world and (b) <a href=\"https:\/\/www.computerworld.com\/article\/3105569\/android\/android-quadrooter.html\">couldn&#8217;t affect any actual users<\/a> in the real world, outside of a highly improbable scenario in which <a href=\"https:\/\/www.computerworld.com\/article\/3027231\/android\/android-malware-monster.html\">all native security measures are disabled<\/a> <em>and <\/em>the user goes out of his way to download a questionable-looking app from some shady porn forum.<\/p>\n<p>Those critical points then become footnotes in a fear-inducing narrative, complete with a carefully crafted memorable name for the Big, Bad Virus\u2122 and a strongly worded reminder about how only such-and-such security software can possibly keep you safe.<\/p>\n<p>It&#8217;s an effective form of marketing \u2014 that&#8217;s for damn sure. But it&#8217;s also about as sensational as can be.<\/p>\n<p>If you&#8217;ve read this column for long, you know about <a href=\"https:\/\/www.computerworld.com\/article\/3210587\/\">the long-standing realities of Android security<\/a> and why these sorts of highly publicized hype campaigns are generally best taken with a grain of salt. Lately, though, we&#8217;ve seen a handful of genuine malware situations that don&#8217;t fall into that same category of silliness \u2014 things like the headline-making <a href=\"https:\/\/blog.cloudflare.com\/the-wirex-botnet\/\" rel=\"noopener nofollow\" target=\"_blank\">WireX botnet<\/a>, in which a few hundred internet-traffic-generating-apps made their way into the Play Store and onto users&#8217; devices, or the more recent <a href=\"http:\/\/www.eweek.com\/security\/fake-whatapp-update-for-android-dodges-google-play-vetting-process\" rel=\"noopener nofollow\" target=\"_blank\">phony WhatsApp incident<\/a>, in which an app pretended to be WhatsApp and then just served up ads to anyone who installed it.<\/p>\n<p>Those were both the real deal, and the native <a href=\"https:\/\/www.computerworld.com\/article\/3210587\/android\/google-play-protect-android.html\">Google Play Protect<\/a> security system absolutely failed to recognize the breaches and stop them before they affected a fair number of Android device owners. Even if the level of direct harm to end-users was ultimately pretty minimal \u2014 basically just having their devices send out web traffic or show some stupid ads, behaviors that&#8217;d stop as soon as the offending app was uninstalled \u2014 these types of programs clearly have no place in the Play Store and shouldn&#8217;t be getting past Google&#8217;s gates.<\/p>\n<p>You know what, though? There&#8217;s <em>still <\/em>no reason to panic. And, as I wrote for CSO.com \u00a0this week, <a href=\"https:\/\/www.csoonline.com\/article\/3235521\/android\/best-android-security-app-why-youre-asking-the-wrong-question.html\" rel=\"noopener\" target=\"_blank\">you still don&#8217;t need a third-party security app to stay safe<\/a>. There&#8217;s a strong argument, in fact, that installing one is pointless at best \u2014 and at worst, could actually be\u00a0<em>counterproductive <\/em>to your personal and\/or company-oriented interests.<\/p>\n<p>I&#8217;ll <a href=\"https:\/\/www.csoonline.com\/article\/3235521\" rel=\"noopener\" target=\"_blank\">direct you to CSO<\/a> for the full context on that point, because there are quite a few layers to it. Here, I want to delve a bit more deeply into what actually happens in a situation like WireX, when Google Play Protect fails, and how such missteps can take place on a practical level \u2014 all directly from the perspective of the company that controls the platform.<\/p>\n<p>I had the chance to ask Google&#8217;s director of Android security, Adrian Ludwig, about this very area. And while the discussion proved to be a bit superfluous to my main story, I thought it made for an interesting little sidebar that&#8217;d be worth sharing here.<\/p>\n<p>Here&#8217;s what Ludwig had to say:<\/p>\n<p>&#8220;The challenge that all detection technology runs into, inclusive of Google Play Protect, is when we see a completely new family coming from a different environment \u2014 especially if [the apps] are on the borderline of behavior that might be considered to be potentially harmful and not quite potentially harmful.&#8221;<\/p>\n<p>&#8220;Most of the time when we see those variations, our automated systems are able to detect them and take action on them very quickly. In fact, the improvements that we&#8217;ve been making in machine learning over the past six months to a year have been primarily focused on \u2014 and very effective at \u2014 finding new variations on existing families.&#8221;<\/p>\n<p>&#8220;We have an extraordinarily high bar in terms of the expectations of what [our] protections will provide, which is being able to scan all the applications, being able to discover every potential bad behavior, and never making a mistake \u2014 and we come very, very close to that. Our goal is to get to a point where there&#8217;s fewer than one in a million apps that make it through Google Play Protect that represent a risk to the user. We&#8217;re not there yet, but we&#8217;re well above 99.9% in terms of our ability to detect things, and we&#8217;re continuing to get stronger.&#8221;<\/p>\n<p>&#8220;It&#8217;s not necessarily a type of app we&#8217;ve seen in the past. It might [involve] relatively low-risk abusive ads, for example, or [something that] makes network connections that are not obviously harmful but that on further inspection, we&#8217;re able to track down and see that there&#8217;s an issue.&#8221;<\/p>\n<p>&#8220;They have visibility a lot of times to what&#8217;s happening on the server side of some of these malware networks, and so sometimes it&#8217;s only in partnership with the data they have through their installations in those environments that the actual bad behavior is visible. On the Android side, there&#8217;s [sometimes] nothing about the traffic that is obviously harmful to the user.&#8221;<\/p>\n<p>&#8220;Certainly by the time there&#8217;s publicity around one of these [malware] families, it&#8217;s already gonna have been cleaned up \u2014 so the publicity around the families tends to be a way to draw attention to security vendors and the products that they make available. By the time something becomes public, Google Play Protect already has rolled out its protections, [and] the applications have been taken down and removed.&#8221;<\/p>\n<p>For a more detailed dive into the current state of Android security, click over to my full feature story:<\/p>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/3235521\/android\/best-android-security-app-why-youre-asking-the-wrong-question.html\" rel=\"noopener\" target=\"_blank\"><strong>Best Android security app? Why you&#8217;re asking the wrong question<\/strong><\/a><a href=\"https:\/\/www.computerworld.com\/article\/3220446\/android\/android-8-oreo-security.html\"> <\/a><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3236194\/android\/google-play-protect.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/11\/google-play-protect-100741236-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: JR Raphael| Date: Tue, 07 Nov 2017 08:34:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>I&#8217;ve written a lot about Android security over the years \u2014 and more often than not, it&#8217;s the same ol&#8217; story time and time again:<\/p>\n<p>A company that sells mobile security software finds some theoretical threat \u2014 something that (a) hasn&#8217;t affected any actual users in the real world and (b) <a href=\"https:\/\/www.computerworld.com\/article\/3105569\/android\/android-quadrooter.html\">couldn&#8217;t affect any actual users<\/a> in the real world, outside of a highly improbable scenario in which <a href=\"https:\/\/www.computerworld.com\/article\/3027231\/android\/android-malware-monster.html\">all native security measures are disabled<\/a> <em>and <\/em>the user goes out of his way to download a questionable-looking app from some shady porn forum.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3236194\/android\/google-play-protect.html#jump\">To read this article in full or to leave a comment, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10462,10554,10463,714],"class_list":["post-10330","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-android","tag-mobile","tag-mobile-security","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10330","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10330"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10330\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10330"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10330"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}