Android malware scanner spoofed by security researchers
Highly rated gadgets
-
9.1
Apple iPhone XS
-
10.0
FujiFilm X-T3
-
10.0
Nikon Z 7
-
8.0
BlackBerry Motion
-
8.5
Xiaomi Mi A2
-
9.0
FujiFilm XF10
-
9.0
Panasonic LUMIX LX100 II
-
9.0
Sony WH-1000XM3
-
9.1
Apple iPhone XS Max
Android security researchers Jon Oberheide and Charlie Miller have devised ways to circumvent the cloud-based security filter that Google uses to attempt to keep the market devoid of malicious Android apps. By feeding the scanner a maliciously crafted file and shell commands to reveal files and list system attributes, the research team were able to procure information about how the malware scanner works.
"So this is just one technique to fingerprint the Bouncer environment, allowing a malicious app to appear benign when run within Bouncer, and yet still perform malicious activities when run on a real user's device," Oberheide said in a demonstration video (seen below). Oberheide and Miller a... »read more
More at: Electronista Add additional source
Filed in: Operating SystemsGoogleAndroid