99% of Android devices leak secure information

Richard1864

Well-known member
Apr 2, 2011
116
26
0
Visit site
99% of Android phones leak secret account credentials ?€? The Register

99% of Android phones leak secret account credentials

'Impersonation attacks' target Google services

By Dan Goodin in San Francisco • Get more from this author

Posted in Security, 16th May 2011 21:44 GMT

The vast majority of devices running Google's Android operating system are vulnerable to attacks that allow adversaries to steal the digital credentials used to access calendars, contacts, and other sensitive data stored on the search giant's servers, university researchers have warned.

The weakness stems from the improper implementation of an authentication protocol known as ClientLogin in Android versions 2.3.3 and earlier, the researchers from Germany's University of Ulm said. After a user submits valid credentials for Google Calendar, Contacts and possibly other accounts, the programming interface retrieves an authentication token that is sent in cleartext. Because the authToken can be used for up to 14 days in any subsequent requests on the service, attackers can exploit them to gain unauthorized access to accounts.

... More
 
Last edited by a moderator:

Dark Wizard Matoya

Well-known member
Feb 21, 2011
2,039
227
0
Visit site
If this is true then it's a really serious problem. Just one more reason to kill the custom manufacturer UI's, reduce fragmentation, and get updates for all Android devices pushed out as quickly as possible.

In any case my Droid Incredible is running the latest CM7 nightly, which is 2.3.4, so hopefully I should be OK. Now I'm really glad that I don't have the patience to wait for the official OTA update. Thank God for Cyanogenmod.
 

DenverRalphy

Retired Network Mod
May 11, 2010
518
54
0
Visit site
As I search the interwebz for more info, it seems that services using OAuth aren't susceptible to the attack in the article. Which all apps and services seem to already be using.

The ClientLogin API is a tool that's only supposed to be used in a closed environment, like communication between your device plugged directly to your PC. Similar to the differences between using Telnet over SSH.

I'm still researching, but it seems (so far) to be more scare tactic journalism on a proof of concept. As it stands right now based on what I've been reading, no services or apps are using the ClientLogin API over OAuth in any case, rendering the point somewhat moot. For somebody to intentionally spoof another WiFi network, they'd still have to have me install an app first.
 

ahammond1024

New member
May 18, 2011
1
0
0
Visit site
I think its would be nice to track all of this stuff.

I assumed my facinate would be like the iphone. Where Verizon could track the gps locations as I use its GPS program.
 

Johnly

Retired Moderator
Oct 6, 2010
4,916
319
0
Visit site
Lol! A bot has to mine it on wifi.....solved on googles current OS. Don't think it is a manufactured from a skin. Pretty big gap eh, thanks bgill for the news.
 

srkmagnus

Retired Moderator
May 23, 2010
13,434
210
0
Visit site
A little disturbing to say the least. Sounds like you will only be affected by not practicing safe measures or by trusting known access points. It's going to be interesting to hear from everyone regarding this issue.