Targeted Attack Campaign Uses Android Malware 74
Trailrunner7 writes "Android attacks have become all the rage in the last year or two, and targeted attacks against political activists in Tibet, Iran and other countries have been bubbling up to the surface more and more often. Now, those two trends have converged with the discovery of a targeted attack campaign that's going after Tibetan and Uyghur activists with a spear-phishing message containing a malicious APK file. Researchers say the attack appears to be coming from Chinese sources. The new campaign began a few days ago when unknown attackers were able to compromise the email account of a well-known Tibetan activist. The attackers then used that account to begin sending a series of spear-phishing messages to other activists in the victim's contact list. One of the messages referred to a human rights conference in Geneva in March, using the recipients' legitimate interest in the conference as bait to get them to open the attachment. The malicious attachment in the emails is named 'WUC's Conference.apk.'"
Re: (Score:3, Funny)
I feel like helping you (Score:2)
Re: (Score:1, Insightful)
Cue the Fandroid apologists.
Phandroid checking in.
Shit can't be fixed if the vendor is shit. Get a Nexus device and always have a secure fucking awesome device.
Re: (Score:1)
Sure it can, you can take all of the users rights and abilities to choose what software they can install. Apparently some people need that and are willing to sacrifice truly owning their own hardware to get it. Strangely, most of them are proud of it too.
Re: (Score:2)
Yes, with the exception of Burma/Myanmar. Movies, Books, Music, and buying the device directly from Google Play are restricted to a small handful of Western countries, but Apps and Updates are available pretty much everywhere (except China and countries under embargo by US).
Yes, in Hongkong and Taiwan (Score:2)
Nexus devices are available in Hongkong and in Taiwan
Re: (Score:2)
The whole point of Android is freedom, as in secure your own shit as much as you want freedom, if you can't handle it I believe they make iOS for those people. Till them most of android's security apps come from the community / vendors.
Then again, these guys installed APK files they got in their email, there is little to no hope there, most ppl don't know what an apk file is much less whether to click on it. Solution? Treat APKs as .exe , which email providers block for the very reason listed in this art
Re: (Score:1, Troll)
Re: (Score:2)
No....
Re: (Score:2)
Re: (Score:2)
In case you failed to read my post somehow let me restate it for you: Android is as secure as you make it. Now go read some books or something.
Re: (Score:1)
Re: (Score:2)
so... when your friend sends you an apk file w/o prior notice... does that not strike you as the least bit odd?
And... do you realize in regards to phishing / spear phishing that both Android and iOS are equally vulnerable to it? Apple just likes to keep the blind fold on its customers while it collects their anatomical sizes.
Re:Lol (Score:5, Insightful)
No apologies here. If someone is stupid enough to install a program they receive in email and they weren't expecting one? C'mon!
I'd still rather be able to choose what I want to install than to have the maker and/or seller of the device make those decisions for me.
Re:Lol (Score:5, Insightful)
It's called spear phishing. Where instead of blasting a million messages to everyone at random, you send a very plausible message to someone who ought to know the sender.
Basically, what happened here is someone hacked an activiist's email account, and used it to send a plausible looking message to their contacts, like say, something about an upcoming human rights conference. The recipient sees it's from someone they trust and the message is appropriate to their relationship (i.e., it came from a human rights activist and is about a human rights conference).
Yes, you probably should not be clicking links from anyone, even those of your trusted friends and relatives, but for most people, they believe it's authentic. Hell, the RSA hack happened the same way - a faked email coming from the hiriing company RSA uses went to the HR coordinator claiming to be a list of new hires.
Re:Lol (Score:4, Informative)
It's still no excuse. YOU DO NOT OPEN ATTACHMENTS THAT YOU ARE NOT EXPECTING. It doesn't matter who the source is. Anyone could get hacked. Even if the source is someone you trust, but the message seems out of the blue and not something you expect, you get back in touch with them and ask if they sent it. Just because the message seems authentic doesn't mean that it is. It's still your fault as the user for trusting something that you shouldn't.
Re: (Score:2)
Can't Help (Score:1)
Tuppe666 should be here shortly to meet your needs.
I'd love to to I am just running through my daily ceremony of eating each of Androids codenames, which I do three times[On friday I fast to remind myself of less fortunate Operating Systems], followed by bathing and chanting the words "smarter mobile devices that are more aware of its owner's location and preferences". Then I do the holy "status bar emptying"....The daily cleansing of the internet doesn't start for hours.
Re: (Score:2)
Phishing is not a flaw in the software - it's a flaw in the human that's using the software. PEBKAC, if you will (metaphorically of course).
Coming from a disillusioned Android user who's hoping to switch to FirefoxOS when possible.
Harvests info (Score:4, Insightful)
The Android App harvests information (contacts, SMS messages, location, SIM data) and reports it back only when ordered to by the reception of a SMS message command. The location is particularly troubling because they can just keep pinging the phone to track the individual in real-time, then who knows what could happen next.
Re: (Score:3)
Re:Harvests info (Score:4, Insightful)
Or are you pushing a straw man argument here, that I was suggesting the US government didn't do anything like that?
Honestly, fuck off. Bad government is bad government, no matter if my government is the same or worse.
Trust No One (Score:1)
Any communication method you use can and will be compromised.
Superior Unix Architecture? (Score:2, Insightful)
Whatever happened to the folks who claimed in +5 insightful posts that Linux has better security because of the superior Unix architecture? And that Windows malware, spyware, viruses and etc. were because of the crappy Windows code and not just because of popularity?
As Macs grow more popular, so does the malware targeting it. And Android has a huge malware problem. Perhaps those posts were wrong?
Re:Superior Unix Architecture? (Score:5, Insightful)
Dealing with incompetent device owner (Score:1)
Re: (Score:3)
Exactly right! That is the solution. To be able to do what you like you need $99/yr and enough knowledge to run Xcode. I think it's a pretty good solution.
Re:Dealing with incompetent device owner (Score:4, Informative)
... yeah, don't you need to buy a Mac as well? I think a check box in the settings works perfectly fine.
Re: (Score:2)
... yeah, don't you need to buy a Mac as well? I think a check box in the settings works perfectly fine.
I'm sympathetic to the idea that it might be useful to make it a bit more difficult, like downloading a free app with the checkbox in, or executing an adb command. But it's ridiculous to expect the user to spend any amount of money to control their own device.
Re: (Score:3)
The dancing bunnies problem (Score:2)
How about take away the privilege by default, and require that the user enable the ability install potentially insecure apps?
That's what Android does (the "Unknown sources" checkbox) and what Mac OS X does (Gatekeeper choosing among App Store only, registered Mac developers only, or all executables). But you'll end up with the majority of users having enabled that ability and left it enabled because at some time in the past they wanted to see dancing bunnies [wikipedia.org].
Re: (Score:2)
There is no solution for stupidity. You accept that it will happen, try to mitigate it as best you can, and you move on. It's still not worth giving up your rights over.
Re: (Score:2)
Regardless of the system, an incompetent privileged user is always going to be a vulnerability.
And that's why the malware problem on Android is so bad - the users are more incompetent than the iOS users.
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
I don't think anyone is saying:
1) it's impossible to write a layer of abstraction above Linux, and
2) for that system to support the installation of software outside of the control of the vendor of that layer of abstraction, and
3) for that software to potentially perform some action the user isn't aware of
Re: (Score:2)
And that Windows malware, spyware, viruses and etc. were because of the crappy Windows code and not just because of popularity?
Microsoft isn't off the hook by any means.
There are still several orders of magnitude more malware for Windows than any other platform, despite Android overtaking it in the market. Android malware is also almost exclusively socially engineered, rather than exploiting OS flaws. The same can't be said for Windows.
Re: (Score:2)
Windows has a bigger install base than Android, and PCs are far more lucrative target than a weak phone with a weak data connection.
Android malware is also almost exclusively socially engineered, rather than exploiting OS flaws. The same can't be said for Windows.
What OS flaws? Reference? The vast majority of Windows malware is through downloads, like fake codecs.
Re: (Score:2)
Windows being crappy code isn't the only complaint by any means. The fact that it is locked down so the user doesn't have control is as big a complaint. Having to hack your phone to gain control is a perfect example of lack of control.
User installed malware and Unix architecture? (Score:2)
What has the actions of some user in installing malware got to do with the security of the architecture?
Re: (Score:2)
More to the point, this has nothing to do with Linux security. The kernel is not being compromised in this exploit.
Re: (Score:1)
It's worth pointing out that Android does everything right. By default "unknown sources" is disabled, so the user has to go and turn that on and see the warning. Then when they for install it tells them that the apple will know where they are, read their contacts, read SMS messages etc. Really if you are dumb enough to fall for this, especially when you know people are out to get you and basic online safety says don't install stuff from attachments then it's your own fault, not Android.
chinese culture itself is corrupt and poisonous (Score:1)
There is no concept of the worth of an individual. A person is only worth as much as he can be used by his rulers. Anyone who isn't enthusiastically supporting the rulers is considered subhuman to be disposed of like any other vermin.
I really hope the US has a doomsday satellite in orbit because better humanity be wiped out that be subject to chinese rule.
Re:Targeted Phone Attacks (Score:4, Interesting)
Before cellular phones existed the Israelis targeted one of the people responsible for the Munich Olympic killings using a good ole fashion public phone. Technology marches on but usually the end result remains basically the same.
Free Tibet, but not Uyghurs (Score:1)
I am all for Tibet becoming independent of China. However, for Xinxiang and any other Uyghur lands, I don't. The Tibetans would happily settle down in peace (sorta like Bhutan) if made independent and left alone. The Uyghurs would probably try and enable Jihad in the neighboring Soviet '-stans' with the goal of getting a greater Turkestan made up of the Soviet '-stans' and Xinxiang, and gang up with Turkey for bigger Jihads
Malicious APK spear-phishing malware .. (Score:2)
Except a user tricked into downloading and installing malware from some third party location, in no way shape or form, relates to Android security !
Re: (Score:2)
Oh, attactment from unknown source! (Score:2)
Let's click it. What is this, 1995?
Re: (Score:2)
It will be forever. :(