Apps override Google's policy of rights

Problems with Google Play: Researchers ESET have discovered counterfeit cryptocurrency applications that use an unprecedented SMS-based 2FA authentication bypass technique, in violation of Google's recent SMS licensing restrictions. In March 2019, Google restricted the use of licenses for SMS messages and the Call Log in Android applications, in order to protect users from annoying applications with illegal purposes.Google

The applications, called "BTCTurk Pro Beta", "BtcTurk Pro Beta" and "BTCTURK PRO" imitate the Turkish cryptocurrency exchange BtcTurk and "fish" connection credentials to the service. These malicious applications do not steal SMS messages to bypass the 2FA protection of users' accounts and transactions, instead, they obtain the one-time code (OTP) from the notifications that appear on the screen of the compromised device.

But in addition to the ability to "read" 2FA alerts, applications can also delete them, preventing victims from detecting illegal transactions. All three applications were uploaded to Google Play in June 2019 and were removed immediately after the ESET update.

Once installed and running, the fake applications request permission to access the notifications. They can then read notifications displayed by other applications installed on the device, reject them, or click buttons that contain them. According to ESET analysis, the cybercriminals behind these applications specifically target notifications from SMS and email applications.

"Thanks to the restrictions imposed by Google in March 2019, applications that stole login credentials had lost the ability to abuse the licenses they needed to bypass the mechanisms. 2FA based on SMS. However, by discovering these fake applications, we have for the first time seen malware bypass this restriction on SMS licenses, "said ESET researcher and author of the study, Lukáš ftefanko.

The right to access notifications first appeared in Android Jelly Bean 4.3, which means that almost all active Android devices are vulnerable to this new technique. Fake BtcTurk applications can run on Android version 5.0 (KitKat) and above. This practically means that they affect about 90% of Android devices.

This technique has some limitations in its effectiveness in bypassing 2FA authentication – attackers only have access to text that matches its text field s, therefore, it is not certain that the text will include the OTP code. Sta SMS for 2FA, messages are generally short and OTP codes are likely to match the alert message. However, in 2FA emails, the length and format of the message is more varied, possibly affecting cybercrime access to the data.

ESET urges users who suspect they have used one of these malicious applications to uninstall them immediately by checking their account for suspicious transactions. To remain generally safe from each into a Android, ESET provides the following advice:

  • Trust cryptic and financial services applications only if they are linked to their official website.
  • Only enter your sensitive information in online forms if you are sure about it and their legitimacy.
  • Keep your device up to date.
  • Use a reliable mobile security solution to block and remove threats.
  • Prefer software-based (OTP) code-based services or token-based services over SMS or email.
  • Use only trusted applications, but even then, allow them to access notifications only if there is a good reason.

More details can be found in the relevant article by Lukáš ftefanko: «Malware sidesteps Google permissions policy with new 2FA bypass technique».

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by newsbot

Although the press releases will be from very select to rarely, I said to go ... because sometimes the authors are hiding.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).