Android phones open to remote wipe vulnerability

Powered by SC Magazine
 

Vendors slow to patch issue.

A newly discovered vulnerability in the Android operating system allows attackers to remotely wipe data from unpatched smartphones — including several available in Australia — a security researcher has found.

Ravi Borgaonkar, a researcher at the Telecommunications Department at the Technical University of Berlin, demonstrated the vulnerability at the Ekoparty security conference in Argentina.

The vulnerability allowed Borgaonkar to effectively render the phone inoperable by sending a website, QR code, NFC transmission or pushed SMS message to the device.

Though most methods of attack required the user to open a website link,he demonstrated some affected Samsung devices allowing remote wiping without user intervention through a pushed SMS message with WAP formatting.

The attack uses Unstructured Supplementary Service Data (USSD) codes, a protocol that allows GSM phones to communicate with computers at telco providers for a range of services, and is found in the majority of devices. It is primarily used to top up prepay phones, check balances, provide callbacks and a range of other services.

However, USSD codes can also be used to activate features on the phones themselves, including initiating a factory reset of the device or locking out the user.

Borgaonkar said a Samsung Galaxy SIII could effectively have its SIM card deactivated and the phone wiped in three seconds, without the user being able to stop the attack.

All Android devices are vulnerable to USSD attacks delivered via QR barcodes as they open websites, Borgaonkar said. Phones with the Near Field Communications (NFC) feature could also be attacked.

Since discovery of the attack this week, users have reported mixed success in using the hack in different Android phones, using both the stock operating system developed by Google and variants of the system.

Researcher Borgaonkar demonstrates remote attacks on a Samsung device at Ekoparty

Tests conducted by iTnews found the Samsung Galaxy Tab 10.1 was not receptive the attack, which requires a phone dialler interface, but was able to successful replicate the remote wipe vulnerability on a HTC Velocity, which is sold in Australia by Telstra.

Users have since reported varying USSD codes required to trigger a factory reset, including for Samsung's latest Android phone, the Galaxy SIII.

The vulnerability also reportedly affected the 4G version of the smartphone, set to be sold by Telstra and Optus in Australia.

Android Police reported that Samsung had issued a firmware patch to fix the vulnerability in its Galaxy SIII device that prevents USSD code attacks.

The vulnerability is an Android specific one, the site said, and has been known for some time with vendors being slow to issue security patches.

Video editor Dylan Reeve developed a website that displays the International Mobile Equipment Identity (IMEI) number sequence if the vulnerability works on that device.

An iPhone 3GS, which runs Apple's iOS operating system, displayed a dialog with the USSD code but not the IMEI number sequence. A Nokia Symbian^3 phone showed an "invalid phone number" dialog.

A Windows Phone 7.5 device from HTC refused to execute the USSD code through the web page.

Borgaonkar suggested the vulnerability could be mitigated by turning off the Service Loading feature to prevent USSD codes from executing via SMS, and also to uninstall popular barcode scanner applications like QR Droid. He also suggested users turn off NFC connectivity.

Using a second dialler app on the phone could also work, as Android will ask users to select one if it encounters a USSD code.

Copyright © iTnews.com.au . All rights reserved.


Android phones open to remote wipe vulnerability
 
 
 
Top Stories
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
Who'd have picked a BlackBerry for the Internet of Things?
[Blog] BlackBerry has a more secure future in the physical world.
 
Will Nutanix be outflanked before reaching IPO?
VMware muscles in on storage startup in hyper-converged infrastructure.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 611

Vote