Android Apps That Exploit “Master Key” Bug Found on Google Play
Fortunately, the apps identified by Bitdefender are not malicious
However, in this case, the bug is not leveraged for malicious purposes.
“The applications contain two duplicate PNG files which are part of the game’s interface. This means that the applications are not running malicious code – they are merely exposing the Android bug to overwrite an image file in the package, most likely by mistake,” Bitdefender’s Bogdan Botezatu explained.
“In contrast, malicious exploitation of this flaw focuses on replacing application code,” he noted.
While the apps are not malicious, the discovery does show that applications leveraging the cryptographic signature vulnerability don’t raise any red flags when published on Google Play.
Google has already addressed the vulnerability and OEMs are said to be working on it. However, because of Android’s fragmentation, it will take some time until the patch reaches end-users.
That’s why Android device owners should consider the alternatives. For instance, CyanogenMod users are already protected against the exploit.
Duo Security has released an app called ReKey that’s designed to address the vulnerability on rooted devices. In addition, Bitdefender and other security solutions providers have updated their mobile products for Android to make sure they detect applications that abuse the master key flaw.
Halo: The Master Chief Collection 20 GB Day One Patch Eliminates Need for Second Disc, Developer Claims
... so hot right now