this post was submitted on 30 Aug 2023
317 points (98.8% liked)

Technology

59402 readers
3593 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Before linking an account, be sure the app you're using is legit.

top 19 comments
sorted by: hot top controversial new old
[–] expatriado@lemmy.world 53 points 1 year ago (1 children)

they were sending the wrong signal

[–] TurnItOff_OnAgain@lemmy.world 11 points 1 year ago

Got their telegram delivered to the wrong person

[–] FartsWithAnAccent@lemmy.world 33 points 1 year ago

Better late than never I guess?

Jesus Christ...

[–] autotldr@lemmings.world 9 points 1 year ago

This is the best summary I could come up with:


Researchers on Wednesday said they found fake apps in Google Play that masqueraded as legitimate ones for the Signal and Telegram messaging platforms.

The malicious apps could pull messages or other sensitive information from legitimate accounts when users took certain actions.

Doing so caused the malicious app to send a host of private information to the attacker, including the device IMEI number, phone number, MAC address, operator details, location data, Wi-Fi information, emails for Google accounts, contact list, and a PIN used to transfer texts in the event one was set up by the user.

The following screenshot shows the information in transit from the infected device to the attacker server:

BadBazaar, the malware responsible for the spying, bypasses the usual QR code scan and user click process by receiving the necessary URI from its C&C server, and directly triggering the necessary action when the Link device button is clicked.

In this case, if the official Signal clients were to display a notification whenever a new device is linked to the account, the fake version could simply disable that code path to bypass the warning and hide any maliciously linked devices.


The original article contains 780 words, the summary contains 191 words. Saved 76%. I'm a bot and I'm open source!

[–] Hyzerflip@lemmy.world 5 points 1 year ago (4 children)

Question for the iPhone vs Android crowd. Could this happen in the Apple App Store? Does Apple vet their apps better than Android?

[–] theluddite@lemmy.ml 18 points 1 year ago (1 children)

I've submitted apps to both stores many times.

I hesitate to use the word "rigorous," but Apple's process is certainly more involved, though I'd say it's also bureaucratic and even arbitrary. Their primary concern is clearly maintaining their tight control over their users' phones, which is an extremely lucrative monopoly. The play process, by comparison, is definitely lighter, though I don't know if I'd be comfortable saying it's less well vetted.

Philosophically, relying on either of the duopolies to screen the software we use for safety is ultimately a bad system, especially since they are creating this problem. Until very recently, the internet existed on websites. They are pushing us to use mobile apps because it is more lucrative for them. Apple takes something like a 20% cut of every single transaction that happens on any iPhone app. They don't even allow non-apple-webkit browsers on iOS, meaning that the iphone's chrome, firefox, etc. are actually different than Android's. They do this specifically to hamstring mobile browser development.

They've managed to align the incentives here by offering tech companies more advertising revenue through the mobile platform. Basically, if you make a mobile app, Apple takes a huge cut each time your users pay you, but companies also get to spy on you more, meaning more lucrative advertising.

[–] imaqtpie@sh.itjust.works -1 points 1 year ago (1 children)

This is a very informative comment. That last paragraph neatly sums up the anti-consumer nature of mobile apps. Thank you for your insight, and chef's kiss for the username/pfp.

[–] theluddite@lemmy.ml 2 points 1 year ago* (last edited 1 year ago) (1 children)

The username, profile pic, and even that last paragraph are all taken from my site, where I write about things just like this, if you're into that kind of thing :D

[–] imaqtpie@sh.itjust.works 1 points 1 year ago (1 children)

Brilliant. This is exactly the kind of content I am looking for 😊

[–] theluddite@lemmy.ml 2 points 1 year ago

Welcome aboard!

[–] dinckelman@lemmy.world 9 points 1 year ago

Apple's app submission process is definitely very involved and rigorous, sometimes to the point of absurdity, but that's just the rules they have. We can talk about it all day another time, but I would certainly be impressed if straight up fake malware garbage got uploaded the same way that Google allows it to go on

[–] Fingerthief@infosec.pub 5 points 1 year ago (1 children)

I used Apple for the last few years until recently and I can't say I've ever really noticed stuff like apps faking being another app. That's not to say it doesn't happen of course.

I do know the Apple app approval process is definitely more strict than what is required for the Play Store.

I'm not very experienced with Apple or Android development so I'd be curious to hear from devs that use both platforms as well.

[–] ShunkW@lemmy.world 6 points 1 year ago (1 children)

My experience is from years ago, but the vetting process seemed about the same for both when I was working on an app. The initial publish process takes forever. The update process through Apple was much simpler and that used to be a successful attack vector.

Since you rarely get feedback from updates, it's hard to say if Google was as vulnerable, but I've heard that the update scheme is still a thing. Publish a legit app then push malicious updates.

[–] Fingerthief@infosec.pub 2 points 1 year ago (1 children)

Interesting, thanks for the info!

I wasn't aware of the update process being used as an attack vector (if it's still a thing) gonna have to read up more on that.

[–] manimeg@r.nf 1 points 1 year ago (1 children)

Hi there! Looks like you linked to a Lemmy community using a URL instead of its name, which doesn't work well for people on different instances. Try fixing it like this: !vimusic@r.nf

[–] mockingben@sh.itjust.works 1 points 1 year ago

They do. There is only one option in my App Store.

[–] manimeg@r.nf 1 points 1 year ago (1 children)

Hi there! Looks like you linked to a Lemmy community using a URL instead of its name, which doesn't work well for people on different instances. Try fixing it like this: !vimusic@r.nf