Google researcher reports leaking certificate signing keys (CERTIFICATES) of her Samsung, LG, Mediatek and many other OEMs.
Lukasz Siewierski, member of Google's Android Security Team, he published in the Android Partner Vulnerability Initiative (AVPI) issue tracker its certificate keys platforms that were leaked and are used for signing malicioussoftware.
The post is a list of certificates, but if you run each of them through the APKMirror or the website VirusTotal of Google well-known names will appear: h SamsungThe LG and Mediatek are the big hits on the list of leaked certificates, along with some smaller OEMs like Revoview and Szroco, maker of Walmart's Onn tablets.
Senior Technical Editor Mishaal Rahman, also posted excellent information for the specific leak on Twitter.
As he explains, having an app that has the same UID as Android's system isn't quite root access, but it's close and allows that app to escape any sandboxing restrictions that exist for system apps.
These apps can communicate directly with (or, in the case of malware, spy on) other apps on your phone. Imagine a malicious one version of Google Play Services to get an idea.