Search This Blog

Powered by Blogger.

Blog Archive

Labels

About Me

Showing posts with label Google Exploit. Show all posts

Google Patches Android Zero-Day Flaws Used to Unlock Phones

 

Google recently addressed critical security flaws in Android that allowed authorities to unlock phones using forensic tools, according to a report by Amnesty International. The report, released on Friday, detailed three previously unknown vulnerabilities exploited by phone-unlocking company Cellebrite. Amnesty’s researchers discovered these flaws while investigating the hacking of a student protester’s phone in Serbia. Since the vulnerabilities were found in the core Linux USB kernel, they could have potentially affected over a billion Android devices. 

Zero-day vulnerabilities, which remain unknown to software and hardware makers until discovered, are particularly dangerous as they can be exploited without any existing patches. Amnesty first noticed traces of one such flaw in mid-2024. Later, while examining the phone of an activist in Serbia, the organization shared its findings with Google’s Threat Analysis Group. This led Google to identify and fix the three security loopholes. During its investigation, Amnesty found that Serbian authorities had used Cellebrite’s forensic tools to exploit a USB vulnerability, allowing them to bypass security measures and unlock the activist’s device. 

Amnesty had previously reported in December that Serbian officials had used similar tools to access the phones of both an activist and a journalist, later installing the Android spyware NoviSpy. Following these allegations, Cellebrite stated earlier this week that it had discontinued its services for its Serbian customers. A Cellebrite spokesperson, Victor Cooper, pointed to a company statement that acknowledged the Amnesty report. The statement emphasized that Cellebrite had reviewed the allegations from Amnesty’s December 2024 report and conducted an internal investigation. As a result, the company decided to halt the use of its products by the Serbian authorities. 

In January, Amnesty was contacted to analyze another case involving a youth activist who was arrested by Serbia’s Security Information Agency (BIA) late last year. According to the report, the circumstances of his arrest and the actions of BIA officers closely resembled previous incidents documented in Amnesty’s December findings. A forensic analysis of the activist’s device confirmed that Cellebrite’s tools had been used to unlock his Samsung A32 without consent or legal authorization.  

Amnesty condemned the use of Cellebrite’s technology against individuals engaging in peaceful protests and exercising their right to free expression, stating that such actions violate human rights laws. Bill Marczak, a senior researcher at Citizen Lab, advised activists, journalists, and civil society members to consider switching to iPhones, which may offer stronger protection against these types of exploits. Amnesty’s Security Lab head, Donncha Ó Cearbhaill, warned thatCellebrite’s widespread availability raises serious concerns, suggesting that the full extent of its misuse may still be unknown. 

Google has not yet responded to requests for comment regarding the issue.

The Hidden Threat: Vulnerable App on Google Pixel Devices Puts Millions at Risk


A flaw was discovered in Google Pixel devices, raising concerns among users and experts alike. This blog delves into the details of this vulnerability, its implications, and the steps being taken to mitigate the risk.

The Discovery

A pre-installed app on Google Pixel devices, known as “Showcase.apk,” posed a severe security risk. This app, intended for demo purposes in retail stores, was found to have excessive system privileges. These privileges could potentially be exploited by malicious actors to execute remote code, install malicious packages, and gain unauthorized access to sensitive data.

The Scope of the Problem

The affected devices include Google Pixel phones sold through Verizon, with the vulnerability dating back to at least 2016. Millions of users could be at risk, as the app has been on devices for several years. The fact that such a critical flaw went unnoticed for so long highlights the challenges in ensuring the security of pre-installed software on smartphones.

Technical Details

The “Showcase.apk” app was designed to showcase the features of Google Pixel devices in retail environments. However, its extensive system privileges made it a potential target for exploitation. The app could be used to execute arbitrary code with elevated privileges, allowing attackers to install malicious software, access personal data, and even control the device remotely.

The vulnerability was classified as a high-severity issue due to the potential impact on users’ privacy and security. If exploited, it could lead to data breaches, identity theft, and other malicious activities.

Google’s Response

Upon discovering the vulnerability, Google acted swiftly to address the issue. The company acknowledged the problem and initiated steps to remove the “Showcase.apk” app from affected devices. Google also assured users that there was no evidence of active exploitation of the vulnerability at the time of discovery.

In addition to removing the app, Google has been working on enhancing its security measures to prevent similar issues in the future. This includes conducting thorough security audits of pre-installed software and improving the vetting process for apps that come pre-loaded on devices. Further details are yet to be disclosed by Google.