Leaked Samsung, MediaTek And LG Certificates Used to Hack Into Android Devices

Hackers are using leaked OEM platform certificates to pass malicious apps as legitimate ones.

December 6, 2022

Platform certificates used by Android device vendors to digitally ‘sign’ and verify mobile applications are being misused by malicious actors to sign apps containing malware. Android original equipment manufacturers (OEM) Samsung, LG, and MediaTek are some of the big wigs affected, along with Revociew and Szoroco.

Łukasz Siewierski, a reverse engineer at Google’s Android Security Team, posted on the Android Partner Vulnerability Initiative (AVPI) issue tracker detailing the abuse of OEM platform certificates to pass malicious apps as legitimate ones.

A platform certificate, also called platform key, “is the application signing certificate used to sign the ‘android’ application on the system image. The ‘android’ application runs with a highly privileged user id – android.uid.system – and holds system permissions, including permissions to access user data,” reads Siewierski’s postOpens a new window on AVPI.

“Any other application signed with the same certificate can declare that it wants to run with the same user id, giving it the same level of access to the Android operating system.”

Through malware signed with a legitimate platform certificate, threat actors can essentially grant themselves the key to the entire device, thus allowing unrestricted access to stored data. Moreover, threat actors can also push malware obfuscated as an update for existing apps without the target user or the device’s built-in protections noticing, given the malware would be digitally signed with the platform certificate.

Google listed ten malware samples and their corresponding SHA256 hashes. However, it is unclear how exactly the abused platform certificates were leaked or precisely where the malware/malicious apps were found or if they were previously distributed on Google Play Store, any third-party stores or APK distribution sites.

See More: Google Accuses Spanish Security Firm of Developing Exploit Tools for  Chrome And Microsoft Defender 

The ten malware-laden apps are listed below. These apps contained info stealers, malware droppers, trojans (HiddenAd), and Metasploit.

  • com.vantage.ectronic.cornmuni
  • com.russian.signato.renewis
  • com.sledsdffsjkh.Search
  • com.android.power
  • com.management.propaganda
  • com.sec.android.musicplayer
  • com.houla.quicken
  • com.attd.da
  • com.arlo.fappx
  • com.metasploit.stage

APKMirror’s Artem Russakovskii found that some of the malware samples legitimized with Samsung’s platform certificateOpens a new window were from 2016.

“Samsung takes the security of Galaxy devices seriously. We have issued security patches since 2016 upon being made aware of the issue, and there have been no known security incidents regarding this potential vulnerability. We always recommend that users keep their devices up-to-date with the latest software updates,” Samsung told XDA Developers.

However, Samsung’s statement raises more questions than it answers, like whether the company waited for any security incidents before patching or how exactly the South Korean giant patched the issue.

Nevertheless, Google said it informed all affected vendors and they have taken respective remediation measures. “All affected parties should rotate the platform certificate by replacing it with a new set of public and private keys. Additionally, they should conduct an internal investigation to find the root cause of the problem and take steps to prevent the incident from happening in the future,” Google said.

“We also strongly recommend minimizing the number of applications signed with the platform certificate, as it will significantly lower the cost of rotating platform keys should a similar incident occur in the future.”

For the list of malware signed with platform certificates of other vendors, replace the SHA256 hash in the search field on this APKMirror pageOpens a new window with that of the vendor.

Let us know if you enjoyed reading this news on LinkedInOpens a new window , TwitterOpens a new window , or FacebookOpens a new window . We would love to hear from you!

Image source: Shutterstock

MORE ON CYBER THREATS

Sumeet Wadhwani
Sumeet Wadhwani

Asst. Editor, Spiceworks Ziff Davis

An earnest copywriter at heart, Sumeet is what you'd call a jack of all trades, rather techs. A self-proclaimed 'half-engineer', he dropped out of Computer Engineering to answer his creative calling pertaining to all things digital. He now writes what techies engineer. As a technology editor and writer for News and Feature articles on Spiceworks (formerly Toolbox), Sumeet covers a broad range of topics from cybersecurity, cloud, AI, emerging tech innovation, hardware, semiconductors, et al. Sumeet compounds his geopolitical interests with cartophilia and antiquarianism, not to mention the economics of current world affairs. He bleeds Blue for Chelsea and Team India! To share quotes or your inputs for stories, please get in touch on sumeet_wadhwani@swzd.com
Take me to Community
Do you still have questions? Head over to the Spiceworks Community to find answers.