Beware of "the man on the disc": the new way to hack an Android



[ad_1]

Everyone knows the man at the center (MITM), strangely called "man in the middle": an attack in which data exchanged between two parties are intercepted by a third party. Kaspersky has discovered a new component focused on Android smartphones. But this time, it's called man-in-the-disk (MITD).

"One of the key principles of Android is that all applications must be isolated from each other.This is achieved through the use of what are called sandboxes. as well as its private files, reside in a "sandbox" which others can not access, "explains Kasperksy about Android. "The idea is to prevent a malicious program, even to infiltrate your Android device, steal data that other good applications store, such as the username and pbadword of your bank account or message history, so it's no surprise that hackers are struggling to find new ways to get around the engine by looking for what's known as an "emergency exit." And they're running out of time For example, Slava Makkaveev's presentation at the DEF CON 26 conference focused on an application for which no particularly dangerous or suspicious authorizations came out of the sandbox, nicknamed the "Man-in-the-Disk" method. ", due to the recognized type of Man-in-the-Middle attack."

The problem is that any program with read / write access to external storage may be able to access and modify files, and at jousting something malicious

Understand the attack: Android also has a shared external storage called … "External storage". For an application to access, the user This external storage access permission gives you access to files, media files and photos on your smartphone, like most applications already installed on your phone. . You will be able to free it easily so that another application has this access.

"Applications use external storage for many useful tasks, such as replacing or transferring files between a smartphone and a computer.However, external storage is also often used to temporarily store this data. first inserted in the shared part of the disk, then transferred to an isolated area to which only specific applications can access, "explains Kaspersky. For example, an application might temporarily use the zone to store additional modules that it installs to extend its functionality, additional content such as dictionaries, or updates. read / write access to external storage can access files, edit them and add a malicious item. "

In exploring external storage, Slava Makkaveev showed some examples of such an attack on DEF WITH 26 with exploits of the vulnerability of Google Translate, Yandex.Translate, Google Voice Typing and Google Text-to-Speech, as well as system applications from LG and Xiaomi browser.

  • Summary of the attack: accessible applications. to Shared External Storage can fool you and ask you to download malicious programs.

As always, Kaspersky has listed some points that should help you protect yourself from "man on disk":

  • Install apps only from stores. like Google Play. Malware can infiltrate, but they are much rarer – and deleted regularly
  • Disable the installation of third-party applications in the configurations of your smartphone or tablet; are the most dangerous sources. To do this, select Settings -> Security and deselect Unknown Sources.
  • Choose verified development applications. Check the app note and read the user notes. Avoid installing anything that looks suspicious
  • do not install what you do not need. The fewer applications you have on your smartphone, the better
  • Do not forget to delete applications you no longer need
  • Use a trusted mobile antivirus application

. TecMundo Coupons:

[ad_2]
Source link