LightBlog

mercredi 25 janvier 2017

Security Analysts Identify a Trojan that Quietly Purchase Apps, a Rootkit that takes over your Device, and Ransomware that Locks your Device

For the average user on our forums, you are probably safe from most malicious threats to your device. After all, you are more likely to be running on the latest Android version with the latest security patches thanks to the effort of developers on our forums. Furthermore, you are likely more conscious of what permissions each application requests and actively avoid applications where the permissions don't match its functionality.

But for every member here who stays on top of their own cyber security, we have friends and family who don't. You might know a few people who are still rocking those Android Jellybean or KitKat phones, or perhaps they do use the latest flagship devices but they don't really care about what applications they install so long as it works for them. For the average Android user out there with nary a care in the world as to what software they are running, they are far more likely to be susceptible to security threats. And so, malicious actors take advantage of that fact, and develop software to steal information or force unwanted purchases on an end user's device.

Fortunately, we have various security companies out there whose job it is to identify, inform, and protect users from these threats. Two such firms, Doctor Web and Check Point, have identified several threats this week that we at XDA would like to share so you can ensure your friends and family don't fall for these tricks.

While we are providing the summary of the security findings outlined by these two companies, we implore you to follow the links within to see the full list of affected applications so you can see what you will need to avoid.


An application commonly installed by the Skyfin Trojan

Skyfin Trojan

This software, identified by Doctor Web earlier this week, acts as a Trojan on your device. Masquerading as a seemingly legitimate application, this Trojan can inject additional code into the Play Store's running process in order to steal your information and subsequently make covert installations and purchases behind your back. The module can simulate many functions of a regular Play Store query, including searching, purchasing, and rating, in order to artificially inflate any Play Store app listing.

The trojan is typically found within packages from third-party (non-Google) sources on the web, such as cracked game APKs. Once installed, the Android.Skyfin.1.origin implements an additional Trojan module called Android.Skyfin.2.origin into the Play Store process so it can collect the necessary information it needs to authenticate to the Play Store on your behalf. The malicious software also sends back uniquely identifying information about your device, such as the IMEI, device model, geolocation, and system language, so it will be notified that your device has been successfully compromised.

The criminals can then direct your device to download any application of their choosing on the Play Store. The downloaded app is not actually installed, but rather stored on the external storage directory so as to avoid detection. As the malware installs itself in the system directory (using a rootkit which should be noted does not affect Android devices running Marshmallow or later), it cannot be removed without root access.


The Return of HummingBad

A malware discovered last year named HummingBad is making a return, according to Check Point. This new variant which they are naming HummingWhale seems to be much more potent than its predecessor. HummingWhale, unlike HummingBad, has found a way to hide its malicious package and has accordingly sneaked its way into the Google Play Store. Check Point identified over 20 applications that were infected by this malware, with the infected apps attaining several million installations prior to Google removing them after being notified by Check Point.

To recap, HummingBad was a malware which employed a chain-attack tactic (successively installing additional malicious packages) and a rootkit to gain elevated privileges on a user's device. The malware had widespread penetration – over 10 million victims – until third-party application stores began to catch on. But now, its successor HummingWhale has been identified in several malicious applications that were uploaded under fake Chinese pseudonyms. Check Point identified a suspiciously large asset in the APK files of these malicious apps – a 1.3MB encrypted file which is actually an APK file itself that contains the main payload of the malware.

Some of the malicious code run to collect user data

This payload acts as a dropper which downloads additional malicious packages, but also employed something new called DroidPlugin to upload apps on a virtual machine. The malicious actor's server would feed the user fake ads and apps. When the user tries to close the advertisement, the app which was already installed quietly is uploaded to the virtual machine and run as if it was running on the actual device. This generates a false referrer ID for the ad, which generates ad revenue for the malicious actor.

The developers behind HummingWhale also went further in their malicious endeavors. The malware would hide the original app downloaded from the Play Store after it was installed, and the team would use fraudulent ratings to boost the reputation of the malicious applications. In the end, it's simply not enough to rely on Play Store reviews to vouch for the authenticity of an application.


Charger Ransomware

A seemingly innocuous battery saving app, at least to the average user

The last malware that we will discuss, and which was also disclosed by Check Point, is the Charger malware. This malware was found embedded within a Play Store application called EnergyRescue. Once installed, the application mines your SMS messages and contact information. But what's most concerning is what happens after it requests (and if the user grants) administrator privileges. The ransomware locks the device and demands that you send the criminals payment if you do not want them to sell your information:

You need to pay for us, otherwise we will sell portion of your personal information on black market every 30 minutes. WE GIVE 100% GUARANTEE THAT ALL FILES WILL RESTORE AFTER WE RECEIVE PAYMENT. WE WILL UNLOCK THE MOBILE DEVICE AND DELETE ALL YOUR DATA FROM OUR SERVER!TURNING OFF YOUR PHONE IS MEANINGLESS, ALL YOUR DATA IS ALREADY STORED ON OUR SERVERS! WE STILL CAN SELLING IT FOR SPAM, FAKE, BANK CRIME etc… We collect and download all of your personal data. All information about your social networks, Bank accounts, Credit Cards. We collect all data about your friends and family.

The user is asked to send 0.2 BTC (bitcoins), roughly $180, to disable the ransomware. The ransomware seemingly does not target users living in Ukraine, Russia, or Belarus which are locations likely where the attackers may be located.

Given the permissions and possible information that the application can extract, it is of course far fetched that this ransomware can do any real damage to your well-being. However, the mere threat presented may scare an unwitting user into acquiescing to its demands. Fortunately, the malware was quickly identified by Check Point who states there is no evidence it has yet infected any devices. Google has already been notified and has removed the offending application from the Play Store as well as added the identifying strings to its own malware database.


We would like to state that we aren't suggesting that Android is insecure, or that we are trying to scare you into believing that your device may be compromised. As we mentioned in the beginning, you are likely among the group of users who are less prone to falling for these tricks, but that doesn't mean you are entirely safe. In addition, you may have friends and family who do not pay attention to what they install, so we hope that by informing you of the existence of these threats you can better identify them to keep yourself and your close ones safe from malicious attacks.



from xda-developers http://ift.tt/2kjtyYC
via IFTTT

Samsung Confirms a Galaxy Note 8 for Release in 2017

Samsung's Galaxy Note brand took a devastating blow this year with the recall and eventually being discontinued entirely due to some battery issues. This has sparked a new trend in the Android community, and with news publications in general, where each and every Samsung phone that catches fire seemingly needs to be reported on.

Don't get me wrong, the Galaxy Note 7 issue was huge and it deserved the attention it received. But the batteries we use in our phones are not 100% safe and these defective units do pop up from time to time.

With Samsung being highlighted in headline after headline about smartphone fires, many started to speculate about what the company was going to do with the Galaxy Note brand in general. This even started some rumors that Samsung would release a variant of the Galaxy S8 that was bigger and included an S Pen so they could retain some of their Galaxy Note fans without having to use the brand name. This speculation was stretched even further with some people thinking Samsung would ditch the Galaxy Note brand entirely.

The loss of revenue from the Galaxy Note 7 debacle didn't seem to hurt Samsung's overall profits during the fourth quarter of last year. Granted, a lot of this profit is from their component, display and appliance divisions, but they still managed to bring in over $7 billion in pure profit for the quarter. CNET was able to sit down with Samsung's mobile chief, D.J. Koh recently, and they talked about how the battery issue would impact the Galaxy Note series as a whole.

Mr. Koh isn't scared and feels they can win back the trust of their customers by creating a "better, safer and very innovative Note 8." He feels the fans of the Galaxy Note series are very dedicated and that it will be too difficult to simply walk away from that segment of the market. This makes a lot of sense too considering there aren't many OEMs who currently offer a premium smartphone experience that includes a stylus.

Source: CNET



from xda-developers http://ift.tt/2j55Tyx
via IFTTT

New Report Reveals Possible Galaxy S8 Display, Camera, & Release Date Details

We've seen a number of Galaxy S8 rumors circulating throughout the Android community, from developing a new personal assistant, to moving the fingerprint sensor to the back of the device, and aiming for IP68 water and dust resistance. The device is said to come with the largest 5.7″ display, and we've heard that Samsung will be heavily leveraging their new personal assistant feature in multiple ways with the Galaxy S8.

Now, we have a report from The Guardian who backs up some of these claims and refutes some of the other rumors we have heard about.

Many have worried about whether or not Samsung's upcoming flagship phone will ditch the 3.5mm headphone port like other OEMs have done already. Sources close to The Guardian are backing up previously leaked renders that say the 3.5mm headphone port is still there on the Galaxy S8. We've known that Samsung is investing heavily into edge-to-edge displays and this new report describes the panel on the Galaxy S8 as an "infinity display."

The new rumor claims the camera will be similar to last year's with only an incremental increase in performance. They're under the belief that 64GB will be the smallest storage size option and that Samsung is keeping the microSD card slot as well. The Galaxy S8 should have a USB Type-C port and they're carrying over the iris scanner that was debuted with the Galaxy Note 7. The Guardian is backing up the rumors about the fingerprint scanner being on the back of the Galaxy S8, but doesn't mention anything about the physical buttons transitioning to software ones.

Their sources are telling them the Galaxy S8 will be released in two different size variants, with both of them being in the range of 5 to 6 inches. This clashes with the rumors we've heard that the bigger one could be as large as 6.2″. They're even being told that the phone will be available on April 21st, but it's unclear if that is the worldwide launch date, or specific to a certain region.

Source: The Guardian



from xda-developers http://ift.tt/2kt1ipP
via IFTTT

The Last Android Wear 2.0 Dev Preview Includes Support for iOS

We've heard rumors that Android Wear 2.0 is going to be launched next month on February 9th. We've seen this huge update to Google's wearable platform be delayed already, so it will be interesting to see if they'll get it close to this rumored launch date.

Before things can be finalized though, Google has rolled out one last developer preview build to make sure the developers have their applications ready for the official release.

As we've seen with all of these developer preview releases for Android Wear 2.0, this last one is bringing some incremental changes to the table. The biggest one that will impact developers of the Android platform is the inclusion of an update to the Wearable Support Library. If your Android Wear application is compiled with API level 25 and this support library, then it is considered ready for deployment in the Google Play Store. There are some enhancements and bug fixes included, but it does not come with any updates to the preview watch image or emulator.

As far as enhancements and bug fixes are concerned, Google tells us this update includes support for NFC HCE (Host Card Emulation). We also learn there is a way to toggle to the single-page, icon-only action drawer with this new Android Wear 2.0 update. This change provides a faster and more streamlined navigation to different views in your app. We're also seeing some changes to the ProGuard and Complication API so the new configuration means complication data container classes will no longer be obfuscated.

The last thing Google talks about in this Android Wear 2.0 developer preview update is the addition of iOS support. This means that developers can distribute your applications to iPhone-paired watches by setting the standalone=true flag in your watch app manifest. This setting will tell the Play Store that the user doesn't have to have the Android phone application in order to use yours.

Source: Android Developers Blog



from xda-developers http://ift.tt/2k3pa2W
via IFTTT

LineageOS On the Nexus 6P

In this video, TK compares a device running CM 14.1 with a device running LineageOS. You'll be familiar with most of the features in LineageOS if you have ever used a Cyanogenmod ROM. Since this is a really early look at LineageOS, there's only a few differences that you'll find. Let's take a look at what you can expect.

Boot Animation

This video gives us a good look at the new boot animation for LineageOS.

Contributors

In the contributors section, the logo to Lineage is shown where the CM logo used to be.

Updates

This is what you will find in the updates page for Lineage.

Besides this, you'll find that everything else is about the same between the two ROMs. Stay updated with LineageOS development in the XDA forums here.



from xda-developers http://ift.tt/2jYS4k8
via IFTTT

Xiaomi’s Redmi Note 4 Launch Smashes Sales Records in India

Following the release of the Redmi Note 4, Xiaomi India PR has reported by email that its initial sales have broken several records both in the Indian market and worldwide. According to the press release, more than 250,000 Redmi Note 4s were sold through Mi.com and Flipkart over the course of just 10 minutes, reportedly breaking the previous record for online sales of a smartphone.

Amidst the success of Xiaomi's popular Redmi Note 3, a device which broke the Indian record for highest-shipped smartphone, the Redmi Note 4 sold at least five times as well in its first online sale. XDA has previously deemed the Redmi Note 3 "the king of the low end", matching much of the praise that the Redmi Note series has received for its combination of respectable specifications and extraordinary sub-$200 price point. The Redmi Note 4 has also received many glowing reviews following its international release in the second half of 2016, with most agreeing that it improved significantly upon the Redmi Note 3.

Of course, the main (and potentially significant) difference between the Chinese variant of the Redmi Note 4 and the Indian version is a change in SoC from Mediatek's Helio X20 to the Snapdragon 625. Aside from this change, the specifications remain essentially the same. The Indian market Redmi Note 4 features three different SKUs, ranging from 2 to 4GBs of LPDDR3 RAM, 32 or 64GBs of internal storage, and all with microSD expansion and a 5.5 inch 1080p LCD display. It will also house a fingerprint reader and likely continue the Redmi Note trend of excellent battery life as it sports a gargantuan 4100 mAh battery. As expected, the Redmi Note 4 will retain the all-metal construction and will also excitingly ship with an Android Nougat-based version of MIUI 8.

Responding to the impressive initial success of the Redmi Note 4, Xiaomi India's head Manu Jain had words of thanks and excitement for those who have supported the Mi brand in India.

"We are really thankful to everyone for making the first sale of Redmi Note 4 a great success. We are extremely ambitious about this product and it gives me immense joy to start the year with such acceptance and love for Redmi Note 4. This love motivates us to work harder to make more quantities available for our Mi Fans and build a beautiful Redmi Note 4 story in India. We are excited as we take the first step in 2017 and look forward to achieving many more milestones this year."

Given the rapid growth of Xiaomi's brand in India, having just surpassed $1 billion in annual revenue after entering the market only 2 years prior, the company will undoubtedly strive to ensure that their success continues into 2017 and beyond. Some have recently expressed uncertainty about the future of the company, citing a decision to not publish sales figures for 2016 and an admittedly rough Q2 2016. However, these concerns are likely rather inconsequential, and may be a result of a nearly-myopic obsession with growth in the mobile market.


In fact, CEO Lei Jin published a letter for his employees early this year in which he acknowledged that the company may have "pushed ahead too fast", and has in a sense responded to this misstep by setting the same revenue goal it had in 2015 ($14.5 billion). He also reiterated that the company must remain committed to the admirable approach it began with which is to develop and produce high-quality devices at accessible prices while also ensuring that the pursuit of profit does not become the primary goal of the company. Given its successes in India, Xiaomi certainly appears prepared to continue making true on those promises.

According to Xiaomi, the Redmi Note 4 will be next available on Jan 30, 2016 on Flipkart and Feb 03, 2016 on Mi.com starting at Rs 9999 (2GB RAM + 32GB Flash), Rs 10,999 (3GB RAM + 32GB Flash) and Rs 12,999 (4GB RAM + 64GB Flash).



from xda-developers http://ift.tt/2jYNG4y
via IFTTT

mardi 24 janvier 2017

Hexa ROM on the Pixel XL

In this video, Miles walks us through the Hexa ROM for the Pixel XL. This is one of the first LineageOS-based ROMs for the Pixel XL. This ROM has many of the same customizations as the Pure Nexus ROM that was reviewed a while back. You will find the LineageOS installer as will as a preloaded Cyanogenmod recovery. Check out the full video to see some of the best features in this ROM.

Download this ROM for your Pixel XL from the XDA thread here:

Hexa-Project Thread



from xda-developers http://ift.tt/2k0RXow
via IFTTT