Catching Android Tokens in the Wild

Below is my interview with Shaun Nichols of on the latest Android security flaw:

Unsecured Wi-Fi leaves Android users open to attack


Android logo

18 May 2011, Shaun Nichols  , V3

Experts are warning of the dangers of unsecured Wi-Fi connections after a group of German researchers uncovered a security flaw which could leave Android users’ contact information exposed.

Researchers from Ulm University reported that many Android handsets and tablets are currently vulnerable to attack via an unsecured Wi-Fi connection when used to access authentication tokens for Google’s Calendar, Contacts and Gallery services. The vulnerability lies in the handling of the authToken component. When the user is connected on an open Wi-Fi connection, an attacker could capture and reuse the token to access data on the Google services. “The implications of this vulnerability reach from disclosure to loss of personal information for the Calendar data,” the researchers wrote. “For Contact information, private information of others is also affected, potentially including phone numbers, home addresses and email addresses.” The flaw is found in handsets running Android versions prior to 2.3.4 and tablets running Android versions prior to 3.0. The authorisation is performed over a secure connection on newer versions which prevents harvesting of the tokens. The researchers suggest that, if possible, Android handset owners should update to the newest version for their device.

Cesare Garlati, senior director of consumerisation at Trend Micro, warned that the incident highlights factors unique to mobile devices and Android in particular. However, in many cases, the security protection on the Android operating system can mitigate the potential damage caused by flaws.

“The operating system is designed to insulate applications. Any data leak that can happen is much more limited compared to a more traditional environment,” Garlati told The mobile platform can also contribute to the risk since users often connect to unencrypted public Wi-Fi hotspots.

Garlati noted that many devices are subject to the sort of unsecure connections described by the Ulm University researchers, but that more open platforms such as Android can benefit from the increased scrutiny when multiple researchers and developers are given access to the system.

About Cesare Garlati
Co-Founder, Hex Five Security, Inc. - Chief Technologist prpl Foundation

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: