Really, guys? I had to find this on the BBC website? Not here or any other websites? And days late, I might add. This is a serious issue and no one in the tech world is talking about it? Disappointed...
LINK
LINK
'Master key' to Android phones uncovered
A "master key" that could give cyber-thieves unfettered access to almost any
Android phone has been discovered by security research firm BlueBox.
The bug could be exploited to let an attacker do what they want to a phone
including stealing data, eavesdropping or using it to send junk messages.
The loophole has been present in every version of the Android operating system
released since 2009.
Google said it currently had no comment to make on BlueBox's discovery.
Writing on the BlueBox blog, Jeff Forristal, said the implications of the
discovery were "huge".
The bug emerges because of the way Android handles cryptographic verification
of the programs installed on the phone.
Android uses the cryptographic signature as a way to check that an app or
program is legitimate and to ensure it has not been tampered with. Mr Forristal
and his colleagues have found a method of tricking the way Android checks
these signatures so malicious changes to apps go unnoticed.
Any app or program written to exploit the bug would enjoy the same access to
a phone that the legitimate version of that application enjoyed.
"It can essentially take over the normal functioning of the phone and control
any function thereof," wrote Mr Forristal. BlueBox reported finding the bug to
Google in February. Mr Forristal is planning to reveal more information about
the problem at the Black Hat hacker conference being held in August this year.
Marc Rogers, principal security researcher at mobile security firm Lookout said
it had replicated the attack and its ability to compromise Android apps.
Mr Rogers added that Google had been informed about the bug by Mr Forristal
and had added checking systems to its Play store to spot and stop apps that
had been tampered with in this way.
The danger from the loophole remains theoretical because, as yet, there is no
evidence that it is being exploited by cyber-thieves.