MIAMI – More than a third of all Google Android applications contain some form of malware, according to tests conducted by BT. A security expert for the U.K. telecom service provider said it expects to test apps for other mobile operating systems and find similar results.
“We analyzed more than 1,000 Android applications and found a third compromised with some form of active or dormant malware,” said Jill Knesek, head of the global security practice at BT. “Almost every device is compromised with some kind of malware, although often it’s not clear if that code is active or what it is doing,” she said in a panel discussion at the NetEvents Americas conference here.
Wayne Rash, a technology journalist moderating the panel, said he was reviewing a Samsung Galaxy S3 handset and found malware in an Android applications provided by Google. “This is a device considered by some people to be the best smartphone on the market right now,” Rash said.
“There’s plenty of anti-malware software available for Android and other mobile operating systems, but companies don’t often insist on using it,” Rash added.
Malicious code is just one example of the many security vulnerabilities in mobile systems. GPS devices can also be hacked, said Knesek.
“It’s going to take one young woman to be stalked, raped and killed before people realize the need security on GPS,” said Knesek a former cybersecurity expert for the U.S. FBI who worked on the Kevin Mitnick case.
Indeed, a U.S. researcher testified before Congress last week about the security holes in civilian GPS. At least a dozen presentations at this week’s Black Hat conference talked about vulnerabilities in mobile systems.
Even security technologies working their way out of the lab, such as biometrics, have their vulnerabilities. “I think hackers will steal biometrics with man in the middle hacks--handsets need to be encrypted end-to-end as the Backberry does,” she said.
The good news is thanks to the latest deep-packet inspection (DPI) chips, a new wave application-aware firewalls is emerging from companies including Cisco Systems, Juniper Networks and Palo Alto Networks. The chips can detect and block individual applications, said Jurrie van den Breekel, a director of marketing for test specialist Spirent Communications (Calabasas, Calif.).
“We see this as a very big market, and we get a lot of demand for testing the technologies,: said van den Breekel, speaking on the panel. “You will be able to select what kind of app you allow--you can block DropBox and Skype, for example, to prevent corporate data from winding up on those services.
One Latin America service provider already uses DPI to create separate mobile data packages for email and social networking apps such as Facebook and Twitter, said van den Breekel.
“Service providers will have the option to allow access to only certain apps—they will offer one thing and block the rest,” he said. “We are just at the very start of this trend,” he added.
Until someone gets hurt either financially or personally then the issue like they say " that dog won't hunt". I also was wondering what the effect on the performance of the android machines the "malware" software was causing and what was it doing? It was not clear to me from the article that they knew what all the rogue software was doing (if anything). It does not surprise me that there are those who will try to piggyback on software to get access to machines, what does surprise me is this is the first I have heard of it on Androids.
So did anyone actually buy these wild claims that BT seems to have retracted already, for example http://www.zdnet.com/bt-backpedals-on-claims-almost-every-android-device-has-malware-7000001837/
Seems like a FUD campaign to me. So really the question is, whose? Should the headline start with "According to Apple,..." or perhaps "According to Microsoft,..."?
I think the attack that's being described here involves GPS but GPS itself isn't being hacked. The malware initiates GPS tracking. That is, it samples location periodically and surreptitiously sends it (e.g., via silent text message or http) to a stalker.
I mean, to prevent the user of this cell phone from being vulnerable to stalking, of course.
The reason to authenticate the GPS broadcast is different. It is to prevent a hacker from introducing fake GPS position information. But that would not be targetted to just one user device, unless that one user device is the only device in that general area. Any device within range of the hacker's signal would be equally vulnerable.
Once again, our cool technology is a double edged sword. Are there any single edged swords?
Malware or not, these phones can allow trouble to happen.Photos can have location and time data embedded in them. Unsecure texts or Twitter posts can expose such information. All of the marvelous capabilities in the smart phone in my pocket could make my life so much easier while at the same time making my entire life much more vulnerable to theft and or exploitation.
David Patterson, known for his pioneering research that led to RAID, clusters and more, is part of a team at UC Berkeley that recently made its RISC-V processor architecture an open source hardware offering. We talk with Patterson and one of his colleagues behind the effort about the opportunities they see, what new kinds of designs they hope to enable and what it means for today’s commercial processor giants such as Intel, ARM and Imagination Technologies.