Here comes Google with its remote kill switch. The company's using its great power to remove Trojans from users' Android devices. If you downloaded a rogue Trojan from the Android Market last week, expect email from la GOOG explaining how it's murdered your malware. Also, the vulnerability that the Droid Dream rootkit exploits is patched.
By Richi Jennings
. March 7, 2011. Google has flipped the remote kill switch for the 60-odd Trojans that contained the Droid Dream malware rootkit. Its also closing the vulnerability that the rootkit exploited. In IT Blogwatch, bloggers ponder the perils of the kill switch.
Your humble blogwatcher curated these bloggy bits for your entertainment. Not to mention The Ten Most Sinister Cereal Box Mascots
(GOOG) Dean Takahashi details Google's response to the incident:
The company says the malicious apps were downloaded to 260,000 devices before Google removed them. ... The phones IMEI number (which identifies a device) was leaked, but no other personal data or account information was transferred. ... The whole incident has created a big scare about mobile security. Ryan Paul adds:
The user doesnt have to do anything. Google will automatically send a security update ... that should remove the malware, known as a root kit. Users will receive an email notification about it. ... Google said it is taking steps to stop this from happening again. But its not saying what it is doing. ... Google doesnt screen apps. Rather, it institutes some security for users by requiring apps to notify users ... whenever they intend to access sensitive information.
The programs exploited a vulnerability in the platform that allows attackers to gain root access and ... deploy further malware. ... The company is also pushing out an update to the Android Market that can reverse the exploit. Google's Rich Cannings blogs thuswise:
The bug is fixed in Android 2.2.2. ... Google is [also] making a patch available, but it's going to be up to the carriers and handset makers to make sure that the patch gets deployed. In light of the mobile industry's poor track record ... it's possible that this flaw will continue to be exploitable on a considerable number of handsets. ... It's troubling that many users will have to rely on the mobile carriers in order to get critical security updates.
Within minutes of becoming aware, we identified and removed the malicious applications. The applications took advantage of known vulnerabilities which dont affect Android versions 2.2.2 or higher. ... [The] remote application removal feature is one of many security controls the Android team Seth Weintraub notes that the situation's worse than we thought last week:
If your device has been affected, you will receive an email from email@example.com over the next 72 hours. ... You are not required to take any action ... the update will automatically undo the exploit.
Since Droid Police initially found the 21 apps, a security firm has found 30 more apps by a few more developers. ... It is baffling to me that ... apps like these were able to make it to the market in the first place and hopefully measures are put in place so that ... [this] can't repeat in the future. Meanwhile, Charlie White has kill-switch background:
Google has contacted law enforcement. As far as I know, this is the first time. ... The kill switch process in itself is controversial because it can't be stopped by the user. ... I don't see users becoming upset over this issue, however.
Googles had this kill switch in place since 2008, and it used the remote application removal capability for the first time in June, 2010. ... The kill switch is not going to completely fix this problem ... [unless] an Android phone is running the latest software. Dude, Joe Wilcox is all, totally, like, "whoa" and stuff:
Whoa. That's scary reassuring: Knowing Google can reach down to Android handsets to swat malicious code ... and simply that Google can reach down into devices at all. I mean whoa. But Cade Metz reminds us that it's not just Android:
I've got mixed feelings about the remote removal capabilities, which gives me mixed feelings of security and sense of Big Brother watching.
Apple maintains its own "kill switch" for the iPhone. In 2008, an iPhone hacker told the world that Apple had added an app kill switch to the iPhone. ... "Hopefully, we never have to pull that lever," Jobs said, "but we would be irresponsible not to have a lever like that to pull." And Finally...The Ten Most Sinister Cereal Box Mascots
EVER! [Warning: a few swears and other unsavory content]
Don't miss out on IT Blogwatch:
You can also read Richi's full profile and disclosure of his industry affiliations.
| || ||Richi Jennings is an independent analyst/consultant, specializing in blogging, email, and security. A cross-functional IT geek since 1985, you can follow him as @richi on Twitter, pretend to be richij's friend on Facebook, or just use good old email: firstname.lastname@example.org. |