Page 79 - Cyber Defense eMagazine September 2023
P. 79

The multi-step approach of the underlined experiment circumvents vetting policies and makes IMUTA
            successful, a quick overview is provided in Fig.1. Through this attack, researchers were able to collect
            and  exfiltrate  private  user  data  to  their  command-and-control  server.  The  key  to  their  success  is
            incremental malicious updates that apparently builds trust with the server causing no alarms to be raised.




             Why this attack is dangerous

            This attack is dangerous for several reasons. It evades Google Play Protect security mechanisms by
            exploiting its relatively lenient trust policies allowing package distribution and feature updates. It exploits
            users’ trust in the Google Play Store, which is a safe and authentic source of applications. Users are
            unlikely to suspect that an application downloaded from Google Play Store could become malicious
            through updates. Users may also grant permissions to the application without checking its functionality
            or content.

            It is not certain that these kinds of attacks are just specific to the Google Play store, and this cannot be
            assumed that other application distribution platforms are immune. According to  the researchers, the
            chosen  voice  search  application  is  just  one  example  and  can  be  simultaneously  replicated  in  other
            popular or sensitive applications such as banking, social media, or healthcare applications.

            These kinds of attacks are complex, sophisticated, persistent, and remain undetected for an extended
            period of time. They can be used for various malicious purposes, such as financial gain, political gain,
            and  sabotage.  Moreover,  the  collected  data  can  be  used  to  perform  identity  theft,  fraud,  blackmail,
            phishing, or espionage.



            What Google should do to prevent it

            There should be a reevaluation of vetting policies in order to improve the security posture of Google Play
            to  protect  its  users.  For  instance,  a  significant  portion  of  such  attacks  can  be  blocked  by  acquiring
            information on the updated application module from a developer individually and calculating the similarity
            index based on the code similarity of the earlier version with the new variant. This similarity index will
            help to spot significant differences and flag suspicious updates.

            Moreover, the updated code should be merged directly with the previous version instead of replacing an
            application entirely. Currently, a new version entirely replaces the older version, which increases the
            chances of dynamic code loading and reduces the trackability over malicious injections.

            In addition, the security mechanism deployed by Google should perform critical analysis of application
            updates with the same rigor as initial applications, including checking for maliciousness, hidden intents,
            requested  permissions,  provided  functionality,  and  comparing  the  code  of  published  versions  of  the
            application and its updates.

            Finally, it is essential to educate users about the risks of downloading and updating applications from any
            source,  even  from  Google  Play  Store.  They  should  be  encouraged  to  review  each  application's
            permissions, functionality, and content before installing or updating it. In order to ensure the security and




            Cyber Defense eMagazine – September 2023 Edition                                                                                                                                                                                                          79
            Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.
   74   75   76   77   78   79   80   81   82   83   84