A security firm has found how to turn an Android smartphone device in complete surveillance.
At a time when European countries are discovering the extent of the espionage Prism NSA program, the Kindsight laboratory, a subsidiary of Alcatel-Lucent has developed an experimental program capable of tracking a user's knowledge, of intercept his messages, record telephone conversations and even take pictures and videos. "Our program is capable of converting smatrphone Android in mobile spy," said Kevin McNamee, director of laboratory Kindsight. It intends to present its espionage tool at the Black Hat USA conference to be held from July 27 to August 1, next to Las Vegas.
This called DroidWhisper technology can be hidden in a component. Integrated into an Android app, it can be run secretly in the background and automatically activate the start of the terminal. Once installed, the spyware can receive instructions from a server command and control (C & C), or by Internet or by SMS used for messaging. From a control panel on the server, criminals or spies in the service of a government have the ability to control the phone's camera, as well as to take photos, videos, and even hack into the microphone and use Recording functions of the device. In fact, the panel could also be used to retrieve all the records, all images, and all personal data on your mobile.
Mobile, an ideal platform for corporate espionage and government
"The smartphone is an ideal platform to launch an attack against a corporate network or government network," said Kevin McNamee. "The camera really all the features for it. It can connect to the Internet via WiFi, you can take pictures, and it can record sound. It is a platform powerful surveillance ". Although it is not part of the proof of concept, "the platform espionage can be used to download tools to find flaws in a corporate network when the employee connects to the WiFi network" , the researcher added. Indeed, "the phone has a complete and fully functional network stack. So, if they have access to Wi-Fi network of the company, then yes, it can scan the network, "he said.
To introduce the spyware secretly on mobile, just include a link in an email that redirects to a malicious website, or integrate a downloadable application at a store apps online. For example, the component may be injected into a fake version of a popular game. If Google Play, the official store for Android applications, malware scans before putting it online, most third-party stores do not. As noted by the recent report from Juniper Networks on threats to the mobile sphere, about three out of five shops are located in China and Russia. In March 2013, more than 90% of mobile malware detected by Juniper targeting the Android platform, which is almost two times more than in 2011.
To install and run the component laboratory Kindsight on a terminal, the criminal must also find a way to bypass the security features built into Android. By default, applications have no permission to perform operations affecting other applications or the device itself. These permissions must be granted by the user. But, assuming that the spyware through these defenses, only a system able to detect the traffic between the server and the component command and control at the enterprise network can be used to detect the presence of spyware.
At a time when European countries are discovering the extent of the espionage Prism NSA program, the Kindsight laboratory, a subsidiary of Alcatel-Lucent has developed an experimental program capable of tracking a user's knowledge, of intercept his messages, record telephone conversations and even take pictures and videos. "Our program is capable of converting smatrphone Android in mobile spy," said Kevin McNamee, director of laboratory Kindsight. It intends to present its espionage tool at the Black Hat USA conference to be held from July 27 to August 1, next to Las Vegas.
This called DroidWhisper technology can be hidden in a component. Integrated into an Android app, it can be run secretly in the background and automatically activate the start of the terminal. Once installed, the spyware can receive instructions from a server command and control (C & C), or by Internet or by SMS used for messaging. From a control panel on the server, criminals or spies in the service of a government have the ability to control the phone's camera, as well as to take photos, videos, and even hack into the microphone and use Recording functions of the device. In fact, the panel could also be used to retrieve all the records, all images, and all personal data on your mobile.
Mobile, an ideal platform for corporate espionage and government
"The smartphone is an ideal platform to launch an attack against a corporate network or government network," said Kevin McNamee. "The camera really all the features for it. It can connect to the Internet via WiFi, you can take pictures, and it can record sound. It is a platform powerful surveillance ". Although it is not part of the proof of concept, "the platform espionage can be used to download tools to find flaws in a corporate network when the employee connects to the WiFi network" , the researcher added. Indeed, "the phone has a complete and fully functional network stack. So, if they have access to Wi-Fi network of the company, then yes, it can scan the network, "he said.
To introduce the spyware secretly on mobile, just include a link in an email that redirects to a malicious website, or integrate a downloadable application at a store apps online. For example, the component may be injected into a fake version of a popular game. If Google Play, the official store for Android applications, malware scans before putting it online, most third-party stores do not. As noted by the recent report from Juniper Networks on threats to the mobile sphere, about three out of five shops are located in China and Russia. In March 2013, more than 90% of mobile malware detected by Juniper targeting the Android platform, which is almost two times more than in 2011.
To install and run the component laboratory Kindsight on a terminal, the criminal must also find a way to bypass the security features built into Android. By default, applications have no permission to perform operations affecting other applications or the device itself. These permissions must be granted by the user. But, assuming that the spyware through these defenses, only a system able to detect the traffic between the server and the component command and control at the enterprise network can be used to detect the presence of spyware.
0 comments:
Post a Comment