Ice Cream Sandwich Clickjacking Easy as Pie
A research team at North Carolina State University developed a proof-of-concept prototype rootkit for Android 4.0.4 OS to demonstrate that clickjacking attacks can be pulled off effortlessly.
The novelty behind this rootkit is that it attacks the Android framework rather than performing deep modifications of the underlying kernel, like previous exploits did. For example, the rootkit could hide or redirect a particular app (or all apps) and replace it with a fake one that could be designed to steal personal information or sniff credit card data.
Clickjacking is particularly dangerous because the rootkit that`s bundled with an infected app could manipulate the smartphone without arousing the user`s suspicion. The malicious code starts running without having to reboot the device, making it the most dangerous type of attack to date. Installing background apps is within the rootkit`s capabilities, implying that attackers can customize their attacks based on specific goals.
“This would be a more sophisticated type of attack than we`ve seen before,“ says Professor Xuxian Jiang, leader of the research team, “specifically tailored to smartphone platforms. The rootkit was not that difficult to develop, and no existing mobile security software is able to detect it. But there is good news. Now that we`ve identified the problem, we can begin working on ways to protect against attacks like these.“
The research team claims that no mobile security software can detect the rootkit, but they`re currently exploring ways of neutralizing the threat. The UI readdressing attack is demonstrated in a small video posted by Professor Juang`s team, in which a stock Nexus S is used to prove the attack.
Watch Out for These Ongoing Bank of America Phishing Campaigns Targeting Customers in the US
July 16, 2021
How to protect yourself against cyberstalking
July 06, 2021
The Top Five Security Risks Smartphone Users Face Today
July 02, 2021
Phishing Alert: Scammers Use Fake SharePoint and DocuSign Messages to Steal Users’ Login Credentials
July 02, 2021
Your Doxxing Dossier Will Keep Growing Thicker Until You See the Danger
June 30, 2021
FOLLOW US ON
You might also like
August 05, 2021
August 04, 2021