2 min read

Cyber security researchers uncover hidden backdoors and secret commands in 12,000 Android apps

Alina BÎZGĂ

April 15, 2020

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
Cyber security researchers uncover hidden backdoors and secret commands in 12,000 Android apps

The use of mobile apps is a part of our daily routine, and anyone using a smartphone has downloaded and installed a variety of them on his device, be it a game, delivery or streaming app.

While most of these apps appear harmless to a typical user, researchers from Ohio State University, New York University and CISPA Helmholtz Center for Information Security have analyzed the top 150,000 Android apps, uncovering hidden backdoors and suspicious behavior in 12,706.

The app selection was as follows:

• 100,000 apps based on the number of downloads from Google Play store
• 20,000 from an alternative market
• 30,000 from pre-installed apps on Android smartphones

“We identified 12,706 apps containing a variety of backdoors such as secret access keys, master passwords, and secret commands that can allow users to access admin-only functions or attackers to gain unauthorized access to users” accounts,” said the researchers in the study.

For their research, the team developed InputScope, a custom tool allowing them to uncover hidden traits of mobile applications by analyzing input validation behavior. The tool revealed three types of “input-triggered hidden behaviors using secret access keys, master passwords and secret commands.”

Secret keys can be used to access the administrator interface of an app, and allow users to change its configuration. For example, if a successful login is made, a bad actor could alter network IDs, configuration URLs, and reset arbitrary user passwords.

To show the vulnerability of passwords, the researchers analyzed popular screen-locking apps. They noted that an attacker “can simply trigger a hidden button after multiple trials with a wrong password.” The hidden interface that appears requests the input of a special code. “Then, attackers can click the hidden button to get a new interface where a special code is requested. By providing this code, the password for unlocking the screen can be reset.”

The team also identified 4,028 apps featuring input blacklisting for keywords in categories such as pornography, escort services, racial discrimination, bullying, etc.

“Also, our analysis discovered 4,028 apps validating user input against blacklisted words of different categories such as insults, racial discrimination, political leader names, and mass incidents,” the researchers said.

After the study was completed, the team of security researchers disclosed their findings to app developers. While some apps have already patched their hidden functionalities that could be exploited by malicious actors, researchers said they will continue to offer their help and support so developers can better understand the weaknesses in their apps.

tags


Author



Right now

Top posts

What is medical identity theft and how to protect against it

What is medical identity theft and how to protect against it

July 27, 2022

2 min read
Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

July 07, 2022

5 min read
Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

June 28, 2022

2 min read
Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

June 28, 2022

3 min read
Bitdefender Reveals the Top Cyber Threats Faced by Consumers in 2021

Bitdefender Reveals the Top Cyber Threats Faced by Consumers in 2021

June 22, 2022

1 min read
Scam alert: Cybercrooks use shady investment domain to scam keen investors out of money and data

Scam alert: Cybercrooks use shady investment domain to scam keen investors out of money and data

May 24, 2022

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Chinese criminals scam kids desperate to play games for more than three hours a week Chinese criminals scam kids desperate to play games for more than three hours a week
Graham CLULEY

August 12, 2022

2 min read
Sophisticated Smishing Attack on Twilio Leads to Employee Credential Leak and Data Breach Sophisticated Smishing Attack on Twilio Leads to Employee Credential Leak and Data Breach
Silviu STAHIE

August 09, 2022

1 min read
Attackers Hit German Chambers of Industry and Commerce; All Digital Services Down Attackers Hit German Chambers of Industry and Commerce; All Digital Services Down
Silviu STAHIE

August 05, 2022

1 min read