Secret Keys in Google Play Apps

Monday, June 23, 2014 @ 10:06 AM gHale


After downloading and decompiling over 880,000 applications found on Google Play, researchers found app developers often embed secret authentication keys in the apps, which can lead to attackers stealing server resources or user data.

“Google Play has more than one million apps and over 50 billion app downloads, but no one reviews what gets put into Google Play. Anyone can get a $25 account and upload whatever they want. Very little is known about what’s there at an aggregate level,” said Jason Nieh, professor of computer science at Columbia University’s school of Engineering. “Given the huge popularity of Google Play and the potential risks to millions of users, we thought it was important to take a close look at Google Play content.”

RELATED STORIES
Which Mobile Platform is Secure? Toss a Coin
Breaches Continue Upward Trend
Attackers Exploit Privileged Accounts
Cloud Breach: Cost 3 Times Higher

You would think that Google would be able to prevent such a large-scale and automated scanning and downloading of its Android app market, but the researchers managed to circumvent Google’s defenses via a specially crafted crawler tool called PlayDrone, which randomly generates valid IMEI and MAC addresses to prevent device blacklisting by Google, and by using some 500 different Google accounts and reverse-engineering the various Google Play store APIs in order to implement them.

Other things researchers discovered are:
• The top 10 percent of most downloaded applications accounts for over 96 percent of the total downloads
• Popular applications tend to use more native libraries. “As an application rises in popularity, developers are perhaps more willing to spend time and money to use native libraries to optimize the user experience of the application,” the researchers said.
• 25 percent of all Google Play free apps are clones of other apps already in Google Play

The researchers have been working with the various service providers, including Amazon, Facebook, and Google, to identify and notify customers that have stored secret authentication keys in their apps so they could remove them.

“PlayDrone can serve as a useful tool to better understand Android applications and improve the quality of application content in Google Play,” the researchers said, adding Google has learned something from their research and is now using their techniques to scan apps for these types of problems.

Click here to download the paper.



Leave a Reply

You must be logged in to post a comment.