beware: malicious apps could smuggle in dangerous code masquerading as regular files.
by rick richardson
technology this week
a recent bleeping computer report claims that microsoft has discovered a severe security flaw that might impact many android apps. this vulnerability, dubbed “dirty stream,” poses a significant risk because it might allow someone to take control of apps and steal essential user data.
more: fool’s gold may not be so foolish now | ai-engineered enzyme could be solution to plastic pollution | german researchers develop ev motor with no rare-earth magnets | educators can benefit from new generative ai course | ai named the highest-paying in-demand tech skill for 2024 | ai generates revolutionary new battery design | breakthrough implant uses excess blood sugar to generate electricity | nuclear battery could keep your future phone running for 50 years | mit tests new ingestible vital signs sensor | study: solar will lead global energy by 2050
exclusively for pro members. log in here or 2022世界杯足球排名 today.
the ability for malicious android apps to change and abuse android’s content provider system is at the core of the dirty stream vulnerability. usually, this technology enables safe data transfer between several apps on a device. it incorporates security measures such as stringent data isolation, applying rights linked to certain uris (uniform resource identifiers), and careful file path validation to prevent unwanted access.
however, if this system is implemented carelessly, it could be vulnerable to abuse. researchers at microsoft discovered that improper use of “custom intents,” the communications system that connects android app components, can reveal private portions of an application. vulnerable programs, for instance, might not properly verify file names or paths, which allows malicious apps to smuggle in dangerous code masquerading as regular files.
an attacker might use the dirty stream issue to fool a susceptible app into overwriting important files in its private storage space. in such an attack scenario, the attacker might completely control the app’s behavior, obtain sensitive user data without authorization or intercept private login credentials.
microsoft’s examination showed that this vulnerability is not unique because many well-known android apps were found to have erroneous content provider system implementations. xiaomi’s file manager software, with over a billion installs, and wps office, with over 500 million installs, are two noteworthy instances.
microsoft researcher dimitrios valsamaras highlighted the astounding number of devices in danger: “we identified several vulnerable applications in the google play store that represented over four billion installations.”
microsoft has aggressively shared its findings, notified developers of potentially weak programs and worked with them to release updates. the two companies mentioned by microsoft have swiftly acknowledged the flaws found in their software.
by revising its app security rules and giving more weight to vulnerable common content provider design weaknesses, google has taken action to stop similar vulnerabilities in the future.
what actions can android users take?
android users can take a few straightforward safety measures as developers work to identify and fix insecure apps. it’s essential to watch for software upgrades because developers will probably release fixes quickly.
it’s also a good idea to only download apps from the official google play store; unofficial sources, which are more likely to include harmful apps, should be avoided.