“Mobile” intrigue … A prying eyes to carry around …

Let we use these ingredients to start some serious reflection on safety issues related to mobile devices:

  • Robust growth in the mobile market, accompanied by technological advances that have made ​​these devices real PC.
  • No awareness of those who use mobile terminals in relation to threats that they face.
  • 2011 years of overtaking sales of mobile devices based on Android than Apple’s iPhone OS.

At this point what would happen if it turns out that it was possible to deploy an app on the device that is able to log the main operations performed on these systems. Communications, banking transaction , geographic locations, information about the preferences shown in the web browsing, a mine of information that uniquely qualify the holder. A massive espionage operation conducted for purposes not yet well known, at least I hope.

An Android app developer has declared that he has the proof that millions of smartphones are secretly monitoring all the above information. Amazing!

Trevor Eckhart has posted a video on YouTube showed how software from Carrier IQ recorded in real time every action made on the handset which he had reset to factory settings prior to the test. With a a packet sniffer he has demonstrated that while his device was in airplane mode how each numeric tap and every received text message is logged by the software.

It would seem that the software used is able to operate silently for which reason he wassingled out by the developer as a Rootkit, a software that enables continued privileged access to a computer whilea ctively hiding from its presence administrators by subverting standard operating system functionality or other applications.

The allegations were rejected by the development by the Carrier IQ, which argues thatlogging operations are random, not transferred fully to their own servers and used withdiagnostic purposes only. Frankly disappointing as a official communication and leaves too many disturbing questions about potential violations of privacy resulting from the events.

We have always discussed about a backdoor applications in devices such as processors and other large deployment unit, what happened could materialize the nightmare of many of us.

The Big Brother is constantly updated on our “experienced”. Who and why would commission such an application? Why is the application itself is present in the major handset vendors? Why has never been declared before?
Published article on the Register website conclude with this passage that I desire to share
“The 17-minute video Concluded with questions, Including:” Why does SMSNotify showand get Called to Be dispatch text messages to [Carrier IQ]? “And” Why is my browser onBeing read, HTTPS Especially on my Wi-Fi? “

Another coincidence ….  few days after the surprise discovery a group of researchers announced they had discovered a vulnerability in devices with Android OS allows attackers to secretly spy That device usage.

HTC, Samsung, Motorola, Google and all devices are vulnerable. How is possible that the best development teams of the main Firms have missed this threat?
Whom and to what extent would have benefited so far? The spread of Android OS based devices are thin and the event is disheartening. Politicians, heads of state, police, ordinary people. All potentially exposed.

Just yesterday I was discussing with a friend enthusiast of the various jailbreaks for iPhone available on the Internet. Do we know how much consumers risk for these versions that include only some stupid extra features? And if the jailbreak is a cracked versions packed with the intent to spy and control us?

Are we really willing to put ourself the leash around our neck?

Pierluigi Paganini

2011/12/01

Let me add the following interesting material published on cryptome.org

http://cryptome.org/isp-spy/carrier-iq-spy1.pdf

http://cryptome.org/isp-spy/carrier-iq-spy2.pdf

 

References

http://www.theregister.co.uk/2011/11/30/google_android_security_bug/

http://www.csc.ncsu.edu/faculty/jiang/pubs/NDSS12_WOODPECKER.pdf

http://www.youtube.com/watch?v=T17XQI_AYNo&feature=player_embedded

http://www.wired.com/threatlevel/2011/12/carrier-iq-data-vacuum/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+wired%2Findex+%28Wired%3A+Index+3+%28Top+Stories+2%29%29

http://thehackernews.com/2011/11/your-android-phone-is-spying-on-you-use.html

http://www.youtube.com/watch?feature=player_embedded&v=T17XQI_AYNo&gl=IT

 

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 84

Security Affairs Malware newsletter includes a collection of the best articles and research on malware…

24 minutes ago

Security Affairs newsletter Round 563 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly Security Affairs newsletter has arrived! Every week, the best…

57 minutes ago

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

21 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

22 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

This website uses cookies.