Cyber security researchers uncover hidden backdoors and secret commands in 12,000 Android apps
The use of mobile apps is a part of our daily routine, and anyone using a smartphone has downloaded and installed a variety of them on his device, be it a game, delivery or streaming app.
While most of these apps appear harmless to a typical user, researchers from Ohio State University, New York University and CISPA Helmholtz Center for Information Security have analyzed the top 150,000 Android apps, uncovering hidden backdoors and suspicious behavior in 12,706.
The app selection was as follows:
â€¢ 100,000 apps based on the number of downloads from Google Play store
â€¢ 20,000 from an alternative market
â€¢ 30,000 from pre-installed apps on Android smartphones
“We identified 12,706 apps containing a variety of backdoors such as secret access keys, master passwords, and secret commands that can allow users to access admin-only functions or attackers to gain unauthorized access to users” accounts,” said the researchers in the study.
For their research, the team developed InputScope, a custom tool allowing them to uncover hidden traits of mobile applications by analyzing input validation behavior. The tool revealed three types of “input-triggered hidden behaviors using secret access keys, master passwords and secret commands.”
Secret keys can be used to access the administrator interface of an app, and allow users to change its configuration. For example, if a successful login is made, a bad actor could alter network IDs, configuration URLs, and reset arbitrary user passwords.
To show the vulnerability of passwords, the researchers analyzed popular screen-locking apps. They noted that an attacker “can simply trigger a hidden button after multiple trials with a wrong password.” The hidden interface that appears requests the input of a special code. “Then, attackers can click the hidden button to get a new interface where a special code is requested. By providing this code, the password for unlocking the screen can be reset.”
The team also identified 4,028 apps featuring input blacklisting for keywords in categories such as pornography, escort services, racial discrimination, bullying, etc.
“Also, our analysis discovered 4,028 apps validating user input against blacklisted words of different categories such as insults, racial discrimination, political leader names, and mass incidents,” the researchers said.
After the study was completed, the team of security researchers disclosed their findings to app developers. While some apps have already patched their hidden functionalities that could be exploited by malicious actors, researchers said they will continue to offer their help and support so developers can better understand the weaknesses in their apps.
The Holiday Guide to Tech Support: Fixing the Family Computer
November 24, 2021
Bitdefender Celebrates 20 Years of Cybersecurity Leadership
November 04, 2021
Bitdefender Study Reveals How Consumers Like (and Dislike) Managing Passwords
October 26, 2021
What are drive-by download attacks and how do you prevent them?
October 25, 2021
Criminals Can't Wait to Add Your IoT Device to Their DDoS Networks
October 22, 2021
Six in 10 Consumers Faced a Cyber Threat in 2021, New Bitdefender Study Reveals
October 20, 2021