Stories
Slash Boxes
Comments

SoylentNews is people

posted by Fnord666 on Monday October 02 2017, @11:29AM   Printer-friendly
from the ground-beef dept.

Submitted via IRC for SoyCow5743

A serious vulnerability that remains unfixed in many Android devices is under active exploit, marking the first known time real-world attackers have used it to bypass key security protections built in to the mobile operating system.

Dirty Cow, as the vulnerability has been dubbed, came to light last October after lurking in the kernel of the Linux operating system for nine years. While it amounts to a mere privilege-escalation bug—as opposed to a more critical code-execution flaw—several characteristics make it particularly potent. For one, the vulnerability is located in a part of the Linux kernel that's almost universally available. And for another, reliable exploits are relatively easy to develop.

By the time it was disclosed, it was already under active exploit on Linux servers. Within days of its disclosure, researchers and hobbyists were using the vulnerability, indexed as CVE-2016-5195, to root Android phones.

Now, more than 1,200 apps available in third-party marketplaces are exploiting Dirty Cow as part of a scam that uses text-based payment services to make fraudulent charges to the phone owner, researchers from antivirus provider Trend Micro reported on Monday.

Source: https://arstechnica.com/information-technology/2017/09/in-a-first-android-apps-abuse-serious-dirty-cow-bug-to-backdoor-phones/


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 4, Insightful) by halcyon1234 on Monday October 02 2017, @01:25PM (4 children)

    by halcyon1234 (1082) on Monday October 02 2017, @01:25PM (#575882)
    May your phone a payment device! You can pay with your phone! WOW your phone can be used to pay at your favorite retailer! Who needs a piece of dumb plastic anymore?

    Because what could possibly go wrong with all your payment info being directly attached to an always-on, internet-connected, general purpose computer that is perpetually running black-box third party code (code which also mutates at the whim of whoever controls the dev account via auto-updates)

    Next up: crowd-source driven! Put your car on the Internet, then just sit back and relax while the Wisdom of the Crowds controls your morning drive.
    --
    Original Submission [thedailywtf.com]
    Starting Score:    1  point
    Moderation   +2  
       Insightful=2, Total=2
    Extra 'Insightful' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   4  
  • (Score: 2) by DannyB on Monday October 02 2017, @02:13PM (2 children)

    by DannyB (5839) Subscriber Badge on Monday October 02 2017, @02:13PM (#575897) Journal

    (code which also mutates at the whim of whoever controls the dev account via auto-updates)

    There are a lot of those whoevers. Not just one whoever. Each App has a 'whoever' that developed the app and can update it. So the number of whoevers can potentially match the number of installed apps. You could have several apps from the same whoever.

    There is a mapping between whoevers and apps. The set of whoevers is a non empty subset of the apps.

    don't drive like that! Let's try to get there in as few pieces as possible.

    --
    The lower I set my standards the more accomplishments I have.
    • (Score: 3, Funny) by Whoever on Monday October 02 2017, @05:36PM (1 child)

      by Whoever (4524) on Monday October 02 2017, @05:36PM (#576011) Journal

      There are a lot of those whoevers. Not just one whoever.

      ... but only one here at Soylentnews. [soylentnews.org]

      • (Score: 2) by bob_super on Monday October 02 2017, @06:47PM

        by bob_super (1357) on Monday October 02 2017, @06:47PM (#576072)

        But there could be a whoevers, making us all wonder is you are that whoevers and therefore all the whoevers, or if somehow whoevers doesn't include just any whoever.

  • (Score: 2) by TheRaven on Monday October 02 2017, @02:23PM

    by TheRaven (270) on Monday October 02 2017, @02:23PM (#575902) Journal
    This isn't quite so bad with Apple Pay, because the card details are stored in the secure element, where they can't be accessed by code running on the application processor, and where they will simply sign transactions. Malware that compromises the iOS kernel could potentially create a load of fraudulent payments, but it couldn't exfiltrate the card details. Most Google Pay implementations don't have an equivalent of the secure element (though a few do), so an OS compromise can extract the card info directly.
    --
    sudo mod me up