{"id":9166,"date":"2017-09-07T20:45:51","date_gmt":"2017-09-08T04:45:51","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/09\/07\/news-2939\/"},"modified":"2017-09-07T20:45:51","modified_gmt":"2017-09-08T04:45:51","slug":"news-2939","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/09\/07\/news-2939\/","title":{"rendered":"Hack Brief: Patch Your Android Phone To Block An Evil \u2018Toast\u2019 Attack"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/59b1f1f659b7637a62e95b6c\/master\/pass\/android_patch-01.png\"\/><\/p>\n<p><strong>Credit to Author: Andy Greenberg| Date: Fri, 08 Sep 2017 04:16:44 +0000<\/strong><\/p>\n<p data-reactid=\"247\"><span class=\"lede\" data-reactid=\"248\"><!-- react-text: 249 -->Modern smartphones take <!-- \/react-text --><\/span><!-- react-text: 250 -->pains to \u201csandbox\u201d apps, keeping them carefully segregated so that no mischievous program can meddle in another app\u2019s sensitive business. But security researchers have found an unexpected feature of Android that can surreptitiously grant an app the permission to not merely reach outside its sandbox but fully redraw the phone\u2019s screen while another part of the operating system is running, tricking users into tapping on fake buttons that can have unexpected consequences. And while that hijacking of your finger inputs isn\u2019t a new feat for Android hackers, a fresh tweak on the attack makes it easier than ever to pull off.<!-- \/react-text --><\/p>\n<p data-reactid=\"253\"><!-- react-text: 254 -->On Thursday researchers at Palo Alto networks <!-- \/react-text --><a href=\"https:\/\/researchcenter.paloaltonetworks.com\/2017\/09\/unit42-android-toast-overlay-attack-cloak-and-dagger-with-no-permissions\/\" target=\"_blank\" data-reactid=\"255\"><!-- react-text: 256 -->warned in a blog post<!-- \/react-text --><\/a><!-- react-text: 257 --> that users should rush to patch their Android phones against what they\u2019re calling a \u201ctoast overlay\u201d attack: For all versions of Android other than the recently released Oreo, they describe how users can be tricked into installing a piece of malware that can overlay images atop other apps and elements of the phone\u2019s controls and settings. It could, for instance, insert a picture of an innocent \u201ccontinue installation\u201d or mere \u201cOK\u201d button over another hidden button that invisibly gives the malware more privileges in the phone\u2019s operating system or silently installs a rogue app\u2014or it could simply take over the screen and lock the user out of all other parts of the phone in a form of ransomware.<!-- \/react-text --><\/p>\n<p data-reactid=\"258\"><!-- react-text: 259 -->\u201cThey can make it look like you\u2019re touching one thing when you\u2019re touching another,\u201d says Palo Alto researcher Ryan Olson. \u201cAll they have to do is put an overlay a button over \u2018activate this app to be a device admin\u2019 and they\u2019ve tricked you into giving them control of your device.\u201d<!-- \/react-text --><\/p>\n<p data-reactid=\"260\"><!-- react-text: 261 -->Android overlay attacks have existed for <!-- \/react-text --><a href=\"https:\/\/www.forbes.com\/sites\/andygreenberg\/2011\/07\/18\/researchers-show-android-vulnerable-to-app-hijacking-attacks\/#50b61b7a6aea\" target=\"_blank\" data-reactid=\"262\"><!-- react-text: 263 -->almost as long as Android itself<!-- \/react-text --><\/a><!-- react-text: 264 -->. But despite repeated efforts from Android&#x27;s developers at Google to fix the problem, another version of the overlay attack was presented earlier this year at the Black Hat security conference. That new attack, known as <!-- \/react-text --><a href=\"https:\/\/www.wired.com\/story\/cloak-and-dagger-android-malware\/\" data-reactid=\"265\"><!-- react-text: 266 -->Cloak and Dagger<!-- \/react-text --><\/a><!-- react-text: 267 -->, took advantage of two features of Android to make overlay attacks possible again: One that\u2019s called SYSTEM_ALERT_WINDOW designed to allow apps to display alerts and another known as BIND_ACCESSIBILITY_SERVICE that allows apps for disabled users such as the seeing-impaired to manipulate other apps, magnifying their text or reading it aloud. Any malware that performs the Cloak and Dagger attack would need to ask the user\u2019s permission for those features when it\u2019s installed, and the system alert feature is only allowed in apps inside the Google Play store.<!-- \/react-text --><\/p>\n<p class=\"article-list-item-embed-component__title\" data-reactid=\"282\">How My Instagram Hacker Changed My Life<\/p>\n<p class=\"article-list-item-embed-component__title\" data-reactid=\"292\">The Greatest Hits of Samy Kamkar, YouTube&#39;s Favorite Hacker<\/p>\n<p class=\"article-list-item-embed-component__title\" data-reactid=\"302\">A Deep Flaw in Your Car Lets Hackers Shut Down Safety Features<\/p>\n<p data-reactid=\"303\"><!-- react-text: 304 -->The toast overly attack takes Cloak and Dagger one step further, the Palo Alto researchers say. They found that they could hijack the accessibility feature to perform a specific form of overlay using so-called \u201ctoast\u201d notifications that pop up and fill the screen, with no need for the system alert permission. That tweak not only reduces the permissions that the user must be tricked into granting but also means the malware could be distributed from outside the Google Play store, where it wouldn\u2019t be subject to Google\u2019s security checks.<!-- \/react-text --><\/p>\n<p data-reactid=\"305\"><!-- react-text: 306 -->When WIRED reached out to Google about the attack, a spokesperson declined to comment but noted that Google released a patch for the problem Tuesday.<!-- \/react-text --><\/p>\n<p data-reactid=\"309\"><!-- react-text: 310 -->Every version of Android prior to Oreo is vulnerable to the new version of the overlay attack, according to Palo Alto\u2014unless you\u2019ve already installed Google\u2019s patch. (Thanks to the complexities of Android\u2019s entanglements with carriers and handset manufacturers, <!-- \/react-text --><a href=\"https:\/\/www.wired.com\/2017\/03\/good-news-androids-huge-security-problem-getting-less-huge\/\" data-reactid=\"311\"><!-- react-text: 312 -->you most likely haven\u2019t<!-- \/react-text --><\/a><!-- react-text: 313 -->.)<!-- \/react-text --><\/p>\n<p data-reactid=\"314\"><!-- react-text: 315 -->The most recent version of Android prior to Oreo does have a safeguard that only allows toast notifications to be displayed for 3.5 seconds. But that can be circumvented by putting the notification on a repeated, timed loop. \u201cIf you do it over and over and over, you can create a continuous overlay that\u2019s not visible to the user as changing,\u201d  Olson says.<!-- \/react-text --><\/p>\n<p data-reactid=\"318\"><!-- react-text: 319 -->While Palo Alto calls its toast overlay method a \u201chigh severity vulnerability,\u201d it\u2019s not exactly cause for panic. Palo Alto notes that it has yet to see the attack used in the wild. And users would have to make a series of mistakes (albeit forgivable ones) before the attack can wreak its havoc: You\u2019d have to first install the malware that\u2019s equipped with the method after it already snuck into the Play store\u2014or you made the <!-- \/react-text --><a href=\"https:\/\/www.wired.com\/2016\/12\/never-ever-ever-download-android-apps-outside-google-play\/\" data-reactid=\"320\"><!-- react-text: 321 -->less forgivable mistake<!-- \/react-text --><\/a><!-- react-text: 322 --> of installing it from a source outside Play\u2014and then grant it \u201caccessibility\u201d permissions before it could start popping up its deceptive toast notifications.<!-- \/react-text --><\/p>\n<p data-reactid=\"323\"><!-- react-text: 324 -->But that doesn\u2019t mean the toast overlay attack isn\u2019t worth a quick update to fix: Better to patch your phone\u2019s operating system now than worry about malicious toast seizing its screen for ransom.<!-- \/react-text --><\/p>\n<p class=\"related-cne-video-component__dek\" data-reactid=\"334\">Using Bluetooth and firmware authentication hacks to steer a Segway\/Ninebot MiniPRO Hoverboard from afar and even turn it off while a rider is on it. Researcher Thomas Kilbride, an embedded devices security consultant at IOActive, was able to further weaponize these attacks using a now-disabled GPS tracking feature that surfaced location data for MiniPRO Hoverboard users in a given area.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/hack-brief-patch-your-android-phone-to-block-an-evil-toast-attack\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/59b1f1f659b7637a62e95b6c\/master\/pass\/android_patch-01.png\"\/><\/p>\n<p><strong>Credit to Author: Andy Greenberg| Date: Fri, 08 Sep 2017 04:16:44 +0000<\/strong><\/p>\n<p>Google has released a fix against a devious new form of &#8220;overlay&#8221; attack against Android phones.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714],"class_list":["post-9166","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9166","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=9166"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9166\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=9166"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=9166"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=9166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}