Google's Android malware scanner bouncer gepwned

Succeeded apparently Jon Oberheide and Charlie Miller, to hijack Google's bouncer which Android apps to investigate possible harmful functions.
 
Nov. 3, 2012 - PRLog -- In a lecture at the end of the week want they also disclose, as they have over smuggled software with harmful functions on Google's tests in the market Google play.

Since 2011, Google crawling the in-house app store after potentially harmful programs. The apps are running in a virtual environment and observed. The now advance released video shows how an app while it is running in the virtual environment of the bouncer, home opens a connection and provides a Linux command line shell two researchers there. Within this virtual machine, can it which then move freely and see among other things, that it is an instance of QEMU. A Trojan could determine this also - as to the existence of the directory / sys/qemu_trace - and are then only by his good side.
The whole thing is intended as advertising for their talk towards the end of the week on the Summercon in New York. The experts want to show how scammers can accommodate malware in Google play, without fear of a discovery by Google's bouncer. However no real surprise is that an automated review of apps on virtual machines work around leaves. Windows Trojan often deliberately look for signs for VMware or other Virtualisierungtechniken and make dead then, to make analysis more difficult. Also, the manufacturer of Antirviren software found recently that they had copies of super spy flame for years in their software pools, their test programs on it but not were accessed.
The 75% of Android Smartphone market
http://goodtechsystems.com/the-75-of-android-smartphone-m...
End
Source: » Follow
Email:***@goodtechsystems.com Email Verified
Zip:75025
Tags:Android, News, Google, Malware
Industry:Open source
Location:Lahore - Punjab - Pakistan
Account Phone Number Verified     Disclaimer     Report Abuse
goodTechSystems News
Trending
Most Viewed
Daily News



Like PRLog?
9K2K1K
Click to Share