Android Virus: NotCompatible - Security Discussion

http://www.bbc.co.uk/news/technology-30143283
Saw this on the BBC website. Should we be worried and how can we stay safe?
Sorry if this is covered elsewhere and I've missed it.

Xave1 said:
http://www.bbc.co.uk/news/technology-30143283
Saw this on the BBC website. Should we be worried and how can we stay safe?
Sorry if this is covered elsewhere and I've missed it.
Click to expand...
Click to collapse
Simple, you can stay relatively safe if you don't surf suspicious websites, you don't open attachments you don't recognize from your email, and you are aware of what you're installing and the source of the app (eg. Play Store).
Be wise, and you're good to go!

Sure this tipp is a widly known myth that trusted sources are safe, they are not and even experts can't protect against this, there are several techniques such mitm, sql hacks and such that also affects normal sites. Because hacker have an huge interest on popular sites to get your data. In the past there were also infected apps months in the play store or some apps use 3th party connection to load there malware and and and. It's a good beginning but I recommend to all beginners to use an av, you not need it daily but it helps to scan once in a week or only for website scanning.
But this is a never ending story and matters which backround knowlage you have about how malware and social engeneering works.

Related

Security does matter!

I wrote this On Xperia Neo General forum but it belongs to here much more.
Original thread at: http://forum.xda-developers.com/showthread.php?t=1447095
Click to expand...
Click to collapse
Introduction
I have not seen much talk about security in XDA.
First, here's just one informative link talking about using and developing apps and security risks involved.
http://www.technologyreview.com/comp...1/?mod=related
Any bug in software could potentially be used as a security loophole to gain access to private information, spy on you, get your credit card info(should you do such things on phone).
What is kind of unsettling is that everyone seems fine with modding, tweaking, developing and using those ROMs made in XDA without worrying if there could be that kind of bug in your made or used ROM.
You don't need a malicious app only to have risks. Most people use Windows so they should know that it is OP systems bugs and vulnerabilities that allow for unwanted access to your files, data, etc.
Android itself is having very non-foolproof security system. All apps on unrooted phone are in sandbox. That's no security measure at all. It doesn't limit app from stealing your private info at all, it only cant delete the whole ROM. That's just idiotic security system, for it is the only thing beside encrypting shut off phone on 3.0 and 4.0. So that means Android on it's own has no security measures while it's working. Even Windows has... some... but not too much... so you could pay for antivirus and antispyware software ofc.
It has always been the goal of big corporations to make money from insecurity, be they software developers, arms dealers and you name it. They all benefit from insecurities existing. Same is with Google and it's Android. But the good news is that we the users can modify Android. We could all say "Au revoir security bugs and loopholes!" if we would care about developing ROMs designed to make Android more secure... alas that's not happening yet!
Overview of Linux/Android security issues.
It's a short condensed description just to get you interested in the topic. There's lots of material on net, you only need to search, read, watch videos.
Linux becomes more vulnerable with more applications with different permissions installed. Same is true for Android.
Say your Phone Exporer has root access, that means it has root access to whole Android. To remove unnecessary risks, this app's root access should be limited to only most necessary functions it needs to operate.
Currently for Android there is no such solution. For Linux there is Apparmor.
http://en.wikipedia.org/wiki/AppArmor
Total root access is obvious vulnerability, but it is at least known one. Let's look at possibility of apps having hidden permissions and what that could mean to you.
Blade Buddy from Market.
On market it does not list permission to "Unique Device ID"(IMEI for GSM and MEID; ESN for CDMA) for free nor for paid version.
That means the author of BB has left the code from free version in paid one. This permission is used by ads to track you. It's not necessary code for ads, but it helps the dev know who clicked on the add and generated him some money. To see your money generating zombie empire stretch across the whole globe.... quite a thrill, isn't it?
So it's a latent code, with no benefit to user and an exploit only calling to be abused.
Unique Device ID allows you to be tracked on net and also where you are physically. GPS is just one way to find you, police for example have scanners to locate your devices physical location by the IMEI code. You can count on the "bad guys" having this technology as well, for it's quite a tool for burglars and other criminals.
The risks of your home being marked as the next dungeon to be looted by some raiders, I mean criminals(or perhaps WoW players sleepwalking and sleepraiding?) or getting your ID and bank details stolen by trojan/hacker is random. Yet the threat would not exist without apps having so flagrant hidden permissions.
Next app with ludicrous permissions
Brightest Flashlight
It does list many permissions, among them "Hardware controls - take pictures and videos ". No, it does not need a permission to take photos through cameras to operate the flashlight. But it's fun nonetheless for the dev to see his trusty peasants, or maybe he just likes to observe people like some watch fish in aquarium or hamsters in cage( "Look at that dork!", "You're one ugly m...f...er","ummm a couple kissing in dark with ma flashlight, what are they searching?", "what's that you eat, mr Korean, brains?" "hey show me that document again.")
You don't even need to run the app yourself. It can be triggered by hacker on background and take a snapshot of you.
On top of this little needless permission it has following hidden permissions:
1. Unique IMSI, read about here http://en.wikipedia.org/wiki/IMSI
2. MCC+MNC (CDMA)
3. Unique Devide ID
4. Cell Tower Name.
That's a lot of needless permissions for flashlight, these are there just to track you the app user and have nothing to do with your comfortable use of the app.
These are just 2 apps with totally needless permissions for their intended functioning. If you don't want your Windows and Linux have such security holes then why do you want your Android have them?! You don't want, that's the point and these apps would not be so popular if people would really know and care about their phone being secure.
It can be stated for sure that above exemplified permissions not listed on market are more useful for pranksters, criminals or someone plainly looking-down-on-all-the-dumb-sheep and not at all for any legitimate, user or customer friendly purposes.
There are very few tools to check for security and privacy problems in apps. That gives a sense that majority of devs do not want Android to be secure and private, because Android is another revenue generating platform through Google ads business of course. Were people more educated about the matter then Google ads business would shrink down as well. A private and secure Android can't be tracked or annoyed with ads. No ads, no profit. No security therefore means profit. Unfortunately this lack of security can be exploited by anyone with criminal or malignant intentions so very easily.
In my honest opinion. If someone keeps files like ccinfo they have to worry about being jacked then they deserve it. Should it happen. U shouldn't keep things on your phoney don't want the rest if the world to have
Sent from my Cyanocrack using Xparent Blue Tapatalk
You don't need to keep credit card info on phone, your using the credit card via Market or logging in to bank on phones browser is enough to intercept your credit card info. Your browser may show you xxxxxxxxxxxx+"last four digits only" but that doesn't mean the data to and from your device doesn't contain exact credit card number. It's encrypted, but that is merely a minor inconvenience for a hacker.
That is why being rooted is not advised to everyone. Mainly if they don't know what they are doing. Also customs roms are not for everyone. People flash them cause they think its cool and don't understand what they are doing. That is their problem. People should pay attention to the permissions that am app asks for. Common sense is the best protection. Main reason I don't do anything that deals with a bank on my phone.
Raoa said:
I have not seen much talk about security in XDA.
Click to expand...
Click to collapse
There's talk. It's just not on important yet, because the android device is not being marketed like an OS is with a personal computer.
However, the more we do on our phones, the more we'll realize it needs protection like firewalls. We catch a few like CIQ or the Wimax exploit, but it's going to get worse as we advance in our integration. We do need to start now before exploits get worse and stay ahead of the curve.
Until that time, 4G exploits and root kit programs will run freely on our devices that houses a lot of our personal information.
Plus, for some stupid reason, there are a lot of people who think Linux is immuned to viruses and security holes due to it's code transparency. Android is being mainstreamed. It will soon be a continuous target like other existing popular software programs and operating systems.
And that's why iOS is far superior even without widgets or live wallpapers.
Something to think about.thanks for posting.
Sent from my HTC Glacier using XDA App
alex2792 said:
And that's why iOS is far superior even without widgets or live wallpapers.
Click to expand...
Click to collapse
IOS and Mac are just as vulnerable, maybe even more so because of there popularity and the misconception that IOS is secure and does not need AntiVirus protection. Just last week i removed a nasty virus on a brand new Macbook Pro so that is not the way to think. You need to act as if there are security issues and just be really careful at what link you click and what email you open.
mattfox27 said:
IOS and Mac are just as vulnerable, maybe even more so because of there popularity and the misconception that IOS is secure and does not need AntiVirus protection. Just last week i removed a nasty virus on a brand new Macbook Pro so that is not the way to think. You need to act as if there are security issues and just be really careful at what link you click and what email you open.
Click to expand...
Click to collapse
I'll give you OS X,but I've never heard of an iPhone virus while there are loads of malware on Android market.
Sent from my Galaxy Nexus using Tapatalk
I am not an expert on iOS nor do I have any wish to even know or use it, because Apple buys from suppliers that emply child labor and sweatshops.
When Linux started spreading around people also thought it has no viruses.
Same story repeats with every software.
For each different OS it takes merely time before people start to notice that their OS has viruses/trojans/spyware too. That doesn't mean their OS is not targeted. You should expect all sorts of thieves to use any and all opportunities.
Secondly OS does not matter so much as the matter that your device is connected to wifi, data, bluetooth, et or not. IP addresses, MAC, IMEI, etc they all stay the same on every platform. No matter which OS, they all connect to wireless networks, cell network, data, bluetooth, etc which all have set standards.
So someone wanting to track, spy, get your private info simply has to intercept the data your device sends to any network. If you don't use strong encryption to send info via network then it is easy to "wiretap" you.
Why is there so much spam, viruses, spyware in internet today? It's because the software managing internet is not made to be so secure. If it were secure then it would also be more private and safer for people to chat over net.
So not only OS's need to be more secure, but the very internet itself needs to be reformed.
This relates to SOPA and PIPA. Had those two bills been passed the next step would have been logically to make changes to all networks so you'd be more easily trackable, hackable, "wiretappable". It's simply logical, cause SOPA, PIPA were so defunctly worded as if asking/preparing for a third bill to regulate the networks.
So we must make sure that internet will be reformed for the private users and not for greedy corporations. We would not need to buy anti-spyware, anti-virus software if the internet were truly engineered for the welfare of humanity.
You could use any OS, bugged or not and not be afraid of loosing your property or privacy if the internet would stop such acts before they could harm you, the individual who is supposed to truly and freely benefit from the services; either for free or for honest price, but now you are robbed and think it is good to pay the thieves.
Raoa said:
Android itself is having very non-foolproof security system. All apps on unrooted phone are in sandbox. That's no security measure at all. It doesn't limit app from stealing your private info at all, it only cant delete the whole ROM.
Click to expand...
Click to collapse
Please elaborate. The sandbox does prevent one app from reading the data of another, such as the CC info from the Market.
Also, are you sure Market sends the entire CC number? There's no reason for it to send it, the transaction is performed on Google's servers.
alex2792 said:
I'll give you OS X,but I've never heard of an iPhone virus while there are loads of malware on Android market.
Click to expand...
Click to collapse
Are you talking about viruses or malware? Please don't conflate the two.
Malware is easy to take care of - check the apps you're downloading for what permissions they want. It's as simple as that.
alex2792 said:
I'll give you OS X,but I've never heard of an iPhone virus while there are loads of malware on Android market.
Sent from my Galaxy Nexus using Tapatalk
Click to expand...
Click to collapse
Just before xmas an iphone developer admitted to deliberately uploading malware in his ios app to show malware can easily affect iphone.
http://m.intomobile.com/2011/11/08/security-expert-sneaks-malware-into-iphone-app-store/
That was for normal iphones. For jailbroken ones there are more malware apps.
Dave
Sent from my LG P920 using Tapatalk
Raoa, your absolutely right.
I've had the exact same thought recently
Its like the overall view of the Android landscape is ridden from real security apps, for the simple purpose of have the platform as open as possible. And while this is good for developers and users of this and other serious forums, its also open for the "dark" communities as well.
I often ask myself, if the ROM devs onboard have these thoughts themselves, as in, what is my source of this modded apk, is is straight from the Market or from another dubious, (do I dare say chinese forum, just an example)
And how clean is my code really?
And is all mods just legit just cuz they are from here?
I love that we have so many ppl having a desire to mess around with the OS, but I miss, as you say, the talk about having a go on security as well.
I dont know, but I do think that awareness, as you initial post direct us to, should be raised, as a natural step for any serious dev and users in general on XDA, to be more aware, of the code.
Im on my first year as an Android user, and ofcourse did have to gain root on my splendid Sensation. Why?, cuz I needed the security tools requiring root.
Ask again, why? Cuz I came from Winblows 7, and know what a jungle software is, and that is is indeed exploitable, like hell, you might say.
And Im gladd I did gain s-off and root, cuz its really really needed fo youre just a little concerned about your privacy in, mails, sms, location, usage pattern, netbanking, dropobox deposits of your ****, some might even be work related and therefore hold more than just your own privacy.
And then there is what you mentioned, our devices unique ID's, the intent "app install referrer" to "plug" you into admob/google analyzer and so on.
I love one guy here, Treve, who made the HTC tool for scanning for ****, Logging Test Tool, and in version 10, he made it aware of admob/mobclix/analytics, and my god it find a lot...
So Treve, please, if you read this, just go on, as every version you make is getting finer and finer.
We could learn from this guy, and others here that got more code-insight.
What we CAN do as a community at the very least, is to share our knowledge and tips for securing our phones.
HOST filtering, code scanning of apks and so on. using AV's and firewalls and so on.
Right from the start I noticed that Android is not a clean OS, nor is its app market, and I noticed this cuz I have another splendid little Linux system at hand, Smoothwall Express with url filtering and proxy enabled
and My god is Android and its aps LEAKING!
Have a look in your urlfilters on a standalone firewall the step after your wireless android phone, and watch how much **** is going on.
Well, I can tell you for a start that I have added atleast 100 new domains to my custom urlfilter, besides the casual downloadable HOST filters around the net, like the ones found in AdblockPlus and so on. But after android, heh, you need more than just advertising filtering, that much I can say.
Just as an example, like those you mentioned, I have one too, that I was made aware of by Avast on my phone tonight, that ChompSMS was being flagged as malware/trojan.
I thought, **** man, why this crap, Im quite fund of Chomp, really.
So I thought, no, imma let more that Avast on my phone have a go.
So I File Expert dump the full apk, and uploaded it for a scan on virustotal, just for the sake of it. And whatta'ya know, ClamAV, GData, Kaspersky, NOD32, and Sophos flagged it as that same Plankton.G variant as my on-phone Avast.
Great, I thought (sarkasm intended)
I thought a bit further and picked up APK Multi-Tool, had a decompile and a content-scan for just "http" in is readable code.
12 different domains is mentioned so far, and I didnt even poke in all of its xml's, just the smali's
I know android is by a far stretch advertising born, and ofcuz the app devs have a right to earn their money, no doubt about that, and I gladly pay for the good ****, like most ppl here believeably do, but.. 12 different .com's mentioned in its code is a no go for me.
I have earlier used Privacy Blocker, and Privacy Inspector from XEUDOXUS in the market, to make permission scanning, beside using LBE/HOST/Avast, and I like those two aps, the Inspector one is free but only can scan.
The paid Blocker can "repair" as a feature, but its not maintained enuff, so it often fails to make installable apks, so not really worth it for me anymore, but as a free too, it can tell you more about those permissions you mentioned.
But enuff said from me for now, lets just collect and share our tips and tricks, ALSO for security, not just developing ROM and mod's and hacks, as thou they are fine, if not to say, so cool and great, but, we need to be secure too.
Please do not polute the discussion with IOS vs Android and what not, cuz thats not the purpose of it, even thou it definitly concerns (g)A(r)pple products too.
Sincerely, Omnius
alex2792 said:
I'll give you OS X,but I've never heard of an iPhone virus while there are loads of malware on Android market.
Sent from my Galaxy Nexus using Tapatalk
Click to expand...
Click to collapse
Iphones can get viruses they come through SMS's and other sources not as bad as android apple keeps there market much more under control, but everything is vulnerable i work in a security team for a big corp and believe me nothing is safe.
Check these articles out i just found them on google.
I remember a while ago maybe a year or so there was a huge security hole in IOS5 and Mac waited a long time to tell the public and release a patch. The one major problem with Apple is when there are security threats they really try to keep it hush...Iphone's OS is tight but not totally secure. Its not viruses either its moslty just malware that charges you tons of money in texting i saw once an iphone that turned into a bot and at midnight it would dial a 900 number and just sit there all night at like $20 bucks a minunte then disconnect when it felt the phone move.
http://www.mactrast.com/2010/07/iphone-virus-discovered-be-vigilant-and-seek-advice/
http://techfragments.com/news/982/Software/Apple_iPhone_Virus_Spreads_By_SMS_Messages.html
I'm going to fanboy MIUI for a second.
When you install an app you are presented with a screen (separate from the market) that allows you to toggle all the permissions an app ask for between Allowed/Ask/Disabled.
More roms should adopt this.
NB: I haven't checked CM9 so it might be a CM9 feature that MIUI has polished or it might be native to MIUI.
weedy2887 said:
I'm going to fanboy MIUI for a second.
When you install an app you are presented with a screen (separate from the market) that allows you to toggle all the permissions an app ask for between Allowed/Ask/Disabled.
More roms should adopt this.
NB: I haven't checked CM9 so it might be a CM9 feature that MIUI has polished or it might be native to MIUI.
Click to expand...
Click to collapse
I wouldn't be so fast to praise MIUI.
weedy2887 said:
I'm going to fanboy MIUI for a second.
When you install an app you are presented with a screen (separate from the market) that allows you to toggle all the permissions an app ask for between Allowed/Ask/Disabled.
More roms should adopt this.
NB: I haven't checked CM9 so it might be a CM9 feature that MIUI has polished or it might be native to MIUI.
Click to expand...
Click to collapse
The problem is the "Average Joe" doesn't even look at those or doesn't know what they mean. I see so many viruses/malware/open security holes just because of user error its insane. Almost 90% of security breaches or problems originate from the end users not paying attention or just not knowing or caring. Also another thing i see so much when new clients call me with there servers melting down and all there banking info being stolen is they haven't installed any updates on there servers since they were set up 2-5 years ago. I worked for a large industrial supply company and all there servers running MS Server 2008 no updates had been installed and they were using AVG free on there main SQL server...INSANE LOL
Then theirs the users, "my computer was fine until my friend on facebook wanted my SS# and mothers maiden name and insisted i open his email attachment, now its acting weird what do you think is wrong?"
Brutal
what is the 4g exploit that you are talking about? And is it only with wimax or is lte part of it as well?
Oneiricl said:
Malware is easy to take care of - check the apps you're downloading for what permissions they want. It's as simple as that.
Click to expand...
Click to collapse
It's absolutely amazing that people are willing to put up with something so ridiculous.
Sent from my SGH-I897

Is it safe to give my IMEI id to Leadbolt?

Leadbolt is provides ads in the notification of andoid similar to airpush. In order to opt out you go to their website where they request your mei imei id. Is it safe to provide this?
Thanks
JeffATL said:
Leadbolt is provides ads in the notification of andoid similar to airpush. In order to opt out you go to their website where they request your mei imei id. Is it safe to provide this?
Thanks
Click to expand...
Click to collapse
Yea, it's just a unique identifier for these networks to add to their list so those IDs never get served ads.
truste.com/developer/?p=86
cLin407 said:
Yea, it's just a unique identifier for these networks to add to their list so those IDs never get served ads.
truste.com/developer/?p=86
Click to expand...
Click to collapse
Cool. Your thanks meter just went from 0 to 1 =)
JeffATL said:
Leadbolt is provides ads in the notification of andoid similar to airpush. In order to opt out you go to their website where they request your mei imei id. Is it safe to provide this?
Thanks
Click to expand...
Click to collapse
I don't know who Leadbolt is, but that aside if you are wondering about whether they (or anyone for that matter) are or not. I would suggest researching about them first via third party reviews, and/or whois domaintools, wikipedia, types of resources. The reviews that are not generated by sites that do not bias their reviews due to being erm bribed for want of a better word will obviously be more accurate as to their legitimacy so sticking to well known and trusted review sites is a good start. I use WOT (web of trust ff addon) to help weed out the bad sites, it's not perfect, however it is far better than using nothing at all. This way you can get an idea if they are trustworthy or not. And if they are new new new I would be more careful as malicious groups start again with new names etc... once their old ones are burned out and no longer provide the gains they are looking for. Hope this helps
Generally speaking, you should never give out your IMEI to anyone.....especially an ad company asking for your IMEI tempting you with not receiving anymore ads? Sounds extremely fishy to me.
Unfortunately I did give my number before seeing other posts.
I do have a problem that may be a result of the foolish move or it may be unrelated. So far I see the problem with one particular website.
If I go to the a particular restaurant's website Eclipse D Luna found by google search, it is hosted by dudamobile. I believe the website is legit as it looks legit from a computer and I think dudamobile is a legit site that transform peoples websites for mobile phones. However when I navigate to the restaurants menu the page is filled with spam (i.e levitra, viagra ads) ?
Leadbolt is a notification ads provider (they also do banners and others). They use IMEI not to show you the notification ads. They are legit, you can give them your IMEI.
'ad.leadboltads.net' is Malware
JeffATL said:
Leadbolt is provides ads in the notification of andoid similar to airpush. In order to opt out you go to their website where they request your mei imei id. Is it safe to provide this?
Thanks
Click to expand...
Click to collapse
LEADBOLTADS IS MALWARE! DO NOT GIVE THEM ANYTHING!
My browser started popping open on reboot/start up to their page with advertising.
This behaviour is known as malware.
Lookout Security & Antivirus found mine in ChargeBar Free Edition,
ChargeBar came embedded in the NottachTrix 2.3.0 ROM.
I installed it (NottachTrix) and it (ChargeBar) didn't update for 3 months, then, BANG.
I've deleted ChargeBar's update, moved it from system apps to apps, deleted it, and the browser pop open 'ad.leadboltads.net' still persists.
Lookout Security & Antivirus can not find the new location of the malware, they do not have a forum.
By the very definition and behaviour, this is malware, and, ChargeBar (Asgard Casino Apps) is involved in the distribution of malware.
Asgard Casino Apps distributes 34 apps that behave this way.
They are using Google Play Store to distribute this malware, abet, that app is benign in its origin, its a pipeline, or conduit for malware.
Sneaky F##kers aren`t they.........
#1) I would like to get this crap off my phone.
#2) I need to bring this to Google's attention, and have the developer and apps banned from the Play store.
Sooo, starting with #1,,,how do I get this crap off my phone!
NOTE:
I will be linking to this post in the NottachTrix post, I'm asking the developers to to move ChargeBar from the ROM zip.
My MBAM forum post: https://forums.malwarebytes.org/inde...06#entry764184

A General Warning about flashing Unknown Roms

Hi.
I recently came across some chinese / asian websites which kang / modify and release a diversity of roms.
I'm not specifying sources / which roms are, this is a general announcement to be careful with what we download & flash into our devices, and why ?
I flashed in order to test some of these roms (not the sense 5 kang tho), since I work in network security, I had noticed on our firewall logs when my mobile connected through the wifi, a bunch of UDP requests / DNS queries to russian websites. This can be used to botnets, DoS, even malware / spam propagation (a diversity of not cool stuff, basically).
A colegue of mine which also has a 'droid had once an app which sent repeatedly ICMP requests in "not random" but specific hours / intervals, he asked me to test his rom which he downloaded and flashed from "another" website, and I confirmed the suspicious behavior. There was established connections to foreigner addresses through a diversity of protocols, data being sent / received and at times, a udp flood directed to specific addresses. This is bad, my friends.
We don't know what these roms have inside, what's their mechanism besides the standard transparent operations which most of us are familiar with, and they could be very well used to do illegal things which I guaranty we don't want to be part of.
Flashing a rom, connecting through 3G or Wifi, and then our mobile is now part of a botnet which participates without our knowledge on such illegal operations is just one of the things that could happen. Phishing is also very possible - in other hand, a lot of things are possible without our knowledge and consent. We don't want this do we ?
The last Rom which I have experienced this, the link was removed and is no longer online. So i'm not pointing URL's / Rom names because this is something that each one of us has to be careful about.
Fortunately we have ways to detect / avoid / remove and make sure our device is used only for us and does only what we "tell" it to do.
We can use this thread to report such roms (since they're not published on xda, we can only warn each other and be aware) and applications that have malicious content.
I'll also be updating this thread with methods, applications for android to detect malware / suspicious activities (I'm not going into depth like using a sniffer or protocol / packet analyzer (although we can) I'll try to keep as simple as possible.
Suggestions, reports are very welcome and should be reported here. We can use this thread to protect our droids and help each other making our devices secure.
This post has the intention of protecting ourselfs, but privacy tips / applications are also welcome. Be careful tho, would be ironic to suggest an app to protect user privacy and in the end the app itself sends private data to GodKnowsWhere.
To be continued / Updated Soon.
List of Applications to monitor / analyze traffic:
Netstat Professional - Allows you to see what connections your android has established. Allows whois info, Real time IP / Port and status information (pretty much like netstat -an), and what service is running / port information.
Wi.cap. Network Sniffer - Much like a network protocol analyzer / network sniffer. This neat app allows you to see what connections are estabilished / protocol / status / analyze packets. If there's a connection estabilished - it will be listed. [Root needed]
Shark for Root - Traffic sniffer for 3G & Wifi (supports FroYo tethered mode too). Records traffic which later you can open with WireShark. To preview you can use Shark Reader.
List of Applications fo scan for malware.
Coming Soon...
Procedures to discover / analyze / report malware / suspicious behaviours and such.
Coming Soon...
Post reserved for procedures which will include:
- Common Sense
- How a malware works (the term malware is used to include viruses, trojans, custom scripts and apps.
- What to look for / suspicious behavior which you should pay attention to (also included in Common Sense).
- Basic tools to detect / analyze / remove malware.
More to come.
Sent from my HTC Z710e using xda premium
Generally, i suggest to use ROMs from XDA only, except for CM/MIUI official website. The risk is real! Thanks to @MidnightDevil for his help and his time
I suggest to read this thread to all the users!
XxXPachaXxX said:
Generally, i suggest to use ROMs from XDA only, except for CM/MIUI official website. The risk is real! Thanks to @MidnightDevil for his help and his time
I suggest to read this thread to all the users!
Click to expand...
Click to collapse
Thank you for your support
If anyone has suggestions / knowledge about this sort of matter please share
There's a LOT of info that I tend to post on this thread in a way to educate / share knowledge with everyone.
Trusting the developers and sources is the first step for prevention. Be careful with dodgy websites and roms which you don't know about.
Scanning the rom zip file with a virus scanner is useless in this matter.
Unknown Rom
The threat is over when a secure rom is installed (after using a none xda rom) ??
MidnightDevil said:
Thank you for your support
If anyone has suggestions / knowledge about this sort of matter please share
There's a LOT of info that I tend to post on this thread in a way to educate / share knowledge with everyone.
Trusting the developers and sources is the first step for prevention. Be careful with dodgy websites and roms which you don't know about.
Scanning the rom zip file with a virus scanner is useless in this matter.
Click to expand...
Click to collapse
phearell said:
The threat is over when a secure rom is installed (after using a none xda rom) ??
Click to expand...
Click to collapse
So far there isn't malware which persists after full wipe. Can't speak of the contents of the sdcard tho. But usually yes. But then you have the apk's which can contain malicious code and so forth...
Those apps are usually banned from the PlayStore, but there's a short window between published / report / removed from Store which users can download it.
Unless I didn't understood your post
MidnightDevil said:
So far there isn't malware which persists after full wipe. Can't speak of the contents of the sdcard tho. But usually yes. But then you have the apk's which can contain malicious code and so forth...
Those apps are usually banned from the PlayStore, but there's a short window between published / report / removed from Store which users can download it.
Unless I didn't understood your post
Click to expand...
Click to collapse
AFAIK google also scan apps installed on the device. When installing a 3rd party app (not via Google Play), you get a prompt to allow google to scan it anyway for malicious content.
Also, there are a couple of anti-virus apps available from well known companies such Avast for android, and also from AVG.
I never really tried those, but they might help protecting your device. However I doubt if they scan system apps/services, for in most cases they are supposed to be safe (from the OEM itself).
It is well known that the biggest security hole is the user. So the best thing to do is to keep away from unknown ROMs/sources.
astar26 said:
AFAIK google also scan apps installed on the device. When installing a 3rd party app (not via Google Play), you get a prompt to allow google to scan it anyway for malicious content.
Also, there are a couple of anti-virus apps available from well known companies such Avast for android, and also from AVG.
I never really tried those, but they might help protecting your device. However I doubt if they scan system apps/services, for in most cases they are supposed to be safe (from the OEM itself).
It is well known that the biggest security hole is the user. So the best thing to do is to keep away from unknown ROMs/sources.
Click to expand...
Click to collapse
No doubt the biggest flaw usually comes from the end user.
But answering your statemente about anti viruses.
Usually anti viruses (specially in portable devices) act base upon a database of known signatures and suspicious behavior. They provide no protection against a custom developed script or code with a work-around for this behavior. Basically - avoids behaving like a malware.
A code is considered malicious when acts upon suspicious behavior (for example, on windows - when an app registers itself on registry autorun / startup folders / tries to load a file on temp directory / temporary internet files, hooks itself into a process / uses a windows process to deliver it's payload faking a signature, etc etc). Knowing this, any custom app / script that avoids suspicious behavior / does not have a present signature on a AV database and a few more details - all doors are "open" and is a highway to hell.
Google scan engine uses the same mechanism, in fact, I'm not even sure if it has any sort of protection against suspicious behavior as it only executes upon apk install.
Believe me, the biggest flaw is the user as the best protection is also a well educated user. It's a matter of knowing what can do and what should avoid. Fear or suspicion is an important thing these days, as they prevent us from making mistakes as installing an app from a dodgy site. We should know better.
MidnightDevil said:
No doubt the biggest flaw usually comes from the end user.
But answering your statemente about anti viruses.
Usually anti viruses (specially in portable devices) act base upon a database of known signatures and suspicious behavior. They provide no protection against a custom developed script or code with a work-around for this behavior. Basically - avoids behaving like a malware.
A code is considered malicious when acts upon suspicious behavior (for example, on windows - when an app registers itself on registry autorun / startup folders / tries to load a file on temp directory / temporary internet files, hooks itself into a process / uses a windows process to deliver it's payload faking a signature, etc etc). Knowing this, any custom app / script that avoids suspicious behavior / does not have a present signature on a AV database and a few more details - all doors are "open" and is a highway to hell.
Google scan engine uses the same mechanism, in fact, I'm not even sure if it has any sort of protection against suspicious behavior as it only executes upon apk install.
Believe me, the biggest flaw is the user as the best protection is also a well educated user. It's a matter of knowing what can do and what should avoid. Fear or suspicion is an important thing these days, as they prevent us from making mistakes as installing an app from a dodgy site. We should know better.
Click to expand...
Click to collapse
I just remembered of an app called "Who is tracking" (was featured on the portal a while ago), that also scans system files (bloatware) and tells you which app tracks you. tried using it a while ago, but didn'y really try to understand it, and it seems to have changed since. will try it myself.
Agreed with Patcha, unless you 100% trust the source (CM/MIUI are well known and if they did something untrustworthy a massive ****storm would ensue) then I would stick to ROM's posted on XDA (though frankly I avoid MIUI out of moral principle #SouceCodeMuch?). Anything untrustworthy that is posted on XDA is picked up very quickly and dealt with effectively.
More to come from me on this, I need to organize what I want to say so it doesn't sound like a mad persons ramblings
Edit: A thing to look out for in google play store is the permissions, READ THEM, read what they mean, read what permissions the app requests and if you don't know why an app needs that permission or if it looks dodgy (like the permission to send sms messages without the user knowing) then for God's sake don't use the app util you've found out what the app needs that permission for (quick google search or email to the developer). Don't just blindly agree to all the permissions without reading them.
These permissions are declared by the developer in the Android_manifest.xml file and pulled from there when publishing the app on play store. As far as I am aware, there is no way to fool this system - you can't edit the visible permissions through the developer panel of play store, only by editing the manifest - I have a developer account on play store so this I am 100% sure on.
Yup, very true. Something I forgot to mention earlier and is VERY important.
Always check the permissions and what for the permissions are used. Some good developers write what for they need the permissions. Some things are obvious, others not so quite.
Also reading the comments of an app helps as well. More experienced users tend to write a more complete review and sometimes they draw the attention to things that sometimes other users miss. About permissions or anything else.
Any user can write a review, so if you find something important, you can also write in the review. Just make sure you don't underrate an app because of a doubt
Usually developers also have their contact email in case of doubts, it can be used to to bring some things to light.

Alternatives to download official apps

Hi,
The vast majority of my apps come from F-droid and Github but a few ones can only be downloaded on the Google Play Store.
I don't have Google services on my device so I'm looking for a reliable tool/website to update those apps. I know Raccoon but a PC is required and I don't have one during the week.
I found APKpure a few weeks ago. Apparently all apps have to pass a signature verification so they guarantee safe downloads. It seems legit and I did compare the SHA1 of their apk and the one downloaded from Google Play. The apk hasn't been altered. One positive result doesn't mean that we can't have negative ones though
I don't like "mirror websites". The owner of apkpure, apkupdate and apkplz seems to be the same so it's more complicated for me to trust those sources. Why do they need all these websites? I didn't find any legal information BTW...
No paid apps can be downloaded on these websites so my only suspicion is that they could add malwares into some (famous) apps. Of course, original apps can also have malwares on Google Play.
For the record, I uploaded the few apks I downloaded to VirusToral and nothing has been detected.
Last but not least, Apkpure provides a dedicated app to install and update apps, which is great even if they suggest me new versions that aren't officially available yet. (probably related to a region restriction or a delay from Google to push the app update for all countries).
What do you think about these websites? Do you know a safer way?
I don't have google apps also, using apk pure for now, everything is well.
BlankStore should work for most free apps.
http://forum.xda-developers.com/showthread.php?t=1715375
Wakamatsu said:
BlankStore should work for most free apps.
http://forum.xda-developers.com/showthread.php?t=1715375
Click to expand...
Click to collapse
Yes, I know but it uses Gmail IDs (with a connection to Google servers). Last but not least, the project is discontinued for several months.
I was going to give a try to Blankstore this weekend and it doesn't seem to be a reliable alternative in the medium term.
Primokorn said:
Yes, I know but it uses Gmail IDs (with a connection to Google servers). Last but not least, the project is discontinued for several months.
I was going to give a try to Blankstore this weekend and it doesn't seem to be a reliable alternative in the medium term.
Click to expand...
Click to collapse
@Primokorn ,
what about its alternative.
http://forum.xda-developers.com/showthread.php?t=3217616
would really be interested in your opinion (if you look into it and dont mind ).
"err on the side of kindness"
Primokorn said:
Yes, I know but it uses Gmail IDs (with a connection to Google servers).
Click to expand...
Click to collapse
I created a throwaway gmail account for this but I get your point.
Primokorn said:
Last but not least, the project is discontinued for several months.
I was going to give a try to Blankstore this weekend and it doesn't seem to be a reliable alternative in the medium term.
Click to expand...
Click to collapse
It's discontinued in the sense that he will not move further with that particular project in favour of another but he will still make fixes when a Google update breaks BlankStore function. It's been "discontinued" since version 0.7.1.
I have a old device just for this purpose.
It has no info on it
Everything possible has been removed that's not needed
(Like calender and contacts etc)
All it does is connect to Wi-Fi to get apps from Google play
Even paid apps.
And I harp non stop to developers and leave feedback on apps that don't support offline use.
(Is in app purchases, online verification, etc things that can be stored on device over getting from internet every time)
I don't see the point of getting apps elsewhere when they will do the same thing to you as Google..But with less oversight.
Virus checkers are pointless when apps are Trojans..
Or have them built in.
I consider any software that mines any thing from your device, without declaring exactly what it is doing every time, nothing other than a Trojan.
Google and it's partners will always push for a proprietary distribution system claiming it will keep you secure
When I'm truth what it does is you your money going to them
When I've had to I've gotten my apks from some very unusual places.
But then you can get some very bad software from very official places.
mrrocketdog said:
@Primokorn ,
what about its alternative.
http://forum.xda-developers.com/showthread.php?t=3217616
would really be interested in your opinion (if you look into it and dont mind ).
"err on the side of kindness"
Click to expand...
Click to collapse
I use microG framework for several weeks now
Wakamatsu said:
It's discontinued in the sense that he will not move further with that particular project in favour of another but he will still make fixes when a Google update breaks BlankStore function. It's been "discontinued" since version 0.7.1.
Click to expand...
Click to collapse
I didn't know that. Thanks for the heads-up! I wanted to give a try this weekend but I had serious with my laptop I keep that in mind for the next time.
nutpants said:
I have a old device just for this purpose.
Click to expand...
Click to collapse
What an expensive alternative! I'm used to sell my current device to buy a new one and that's not handy IMHO.
nutpants said:
And I harp non stop to developers and leave feedback on apps that don't support offline use.
(Is in app purchases, online verification, etc things that can be stored on device over getting from internet every time)
Click to expand...
Click to collapse
Solutions exist for devs to not use Google Play online verification but they want to use it to punish users who download warez. Even if I can understand this point of view, we wouldn't have warez with FLOSS softwares.
nutpants said:
Google and it's partners will always push for a proprietary distribution system claiming it will keep you secure
When I'm truth what it does is you your money going to them
Click to expand...
Click to collapse
I have done some fruitful research to prepare an article about GAFAM and other big companies. In addition, Google doesn't protect our freedom of speech (I noticed this many times with 'ordinary people').
Now that I clearly know what they did/do/will do, how could I still use their services?!? My next Android work will be published under GPL v3, I already stopped any operations on Google Play and I try to push devs to offer free/libre softwares. Marcel (M66B on XDA) is the perfect example of an awesome developer :good:
Primokorn said:
I use microG framework for several weeks now
What an expensive alternative! I'm used to sell my current device to buy a new one and that's not handy IMHO.
Solutions exist for devs to not use Google Play online verification but they want to use it to punish users who download warez. Even if I can understand this point of view, we wouldn't have warez with FLOSS softwares.
Click to expand...
Click to collapse
I rarely sell my devices, (i have 6 of 9 that I play with somewhat regularly sadly)honestly i keep the last one as a back up in case the new one has issues or a failure. And when I do think of it, it not worth the money to make it worth the time..
I still have my Windows mobile 2003 Siemens sx66
(Not that is have been turned on in years)
But really it's an investment in my security.
(And I no longer get the hottest newest devices asap anymore, that's a zero sum game that has few benefits beyond bragging rights)
My tablet dual boots between Google play only rom and everything else internet rom also.
I have yet to hear of a protection scheme that had not been broken in hours. I think bluray was the last major public disaster. If the time spent on protection was spent on quality assurance I think it would be a different landscape in the digital world.
Even with floss you have warez.. just in different forms. Mods,hacks, cracks, custom roms It all just words that describe one developer modifying others work without permission for features that are not present, either added or removed.
It's point of view.like anything.
Myself, I stand back and promote security,offline abilities and operation and open source.
It's where my money goes, my time and my vote. Every chance I get.
XDA: Focus on making independence accessible to android users!
@Primokorn: Thanks a zillion for starting this crucial discussion. I don't know how often i pointed out these issues.
Of course, i also have some aesthetic preferences. But diving through endless reefs of startup animation replacements, battery monitor alternatives and half-baked theme studies is not what i expected xda-developers.com to end up, 12 years after i started being around.
In my eyes, the whole aftermarket ado should be concentrated on maintaining the independency of the most popular mobile operating system of the universe by it's users. Crucial topics be
Liberating the app distribution architecture
Optimizing the permission restriction system
There are great approaches like the Aroma Installer, that have been employed to supply user friendly means for debloating and debranding. Have a look at the Screenshots of stockymod.
@nutpants:
And I harp non stop to developers and leave feedback on apps that don't support offline use.
Click to expand...
Click to collapse
I do the same thing to official institutions when they release apps. If i wasn't in that hyper-busy age around 40, i'd start a little riot about publicly funded software that ends up being published behind the wellknown golden cages exclusively. The necessity to change this in a grassroot movement is obvious.
Apkmirror.com
Did not know these existed, going to check this out!

Google is tracking you.

I hope that with Lineage OS and avoiding Google apps anyone could avoid that... or maybe not.
https://www.youtube.com/watch?v=S0G6mUyIgyg
The video is uploaded at YouTube
NerfSKyd3R said:
I hope that with Lineage OS and avoiding Google apps anyone could avoid that... or maybe not.
The video is uploaded at YouTube
Click to expand...
Click to collapse
The only way to avoid that is to boycott google apps , take a look at the MicroG project :
https://microg.org/
And read carefully the google privacy policy for each app.
RaiZProduction said:
The only way to avoid that is to boycott google apps , take a look at the MicroG project :
https://microg.org/
And read carefully the google privacy policy for each app.
Click to expand...
Click to collapse
I'm even skipping the microg project. I would like to avoid the Google empire as much as possible.
But thanks for the info!
Nice to see in video form what I'd like to think most of us here have known for years. Google profits from invading your privacy....constantly.
As do Microsoft, Apple and countless app/game developers and governments worldwide. The problem is the video offers no recommended solutions which of course start with root and removing all bundled Google apps and related infrastructure, along with manufacturer-bundled spyware. That's a good first step. As is sourcing apps from f-droid.
I didn't watch the video because I already know Google, your mobile carrier, and the government already track every move you make geographically as well as online. You can delete/disable your Google location history, but if you use a mobile phone, your geographical position is always known by your carrier, which in turn can be relayed to the government and police if they want it. There is no avoiding this unless you completely take yourself "off the grid", which >95% of people are not willing to do. Big brother is *always* watching you.
Yeah, nothing new. Google, Facebook, Twitter, everyone is tracking you. It is better to ditch Google products and social media altogether. I personally use Duck Duck Go for searching, Protonmail for secure mail, Surfshark for a fast and secure VPN, Privacy Badger for managing cookies and always use Incognito mode.

Categories

Resources