Skip Links

Black Hat demo: Google Bouncer can be beaten

Trustwave to show how it outwitted Google Play defense against Android malware; Stonesoft to air free 'Evader' detection tool

By , Network World
July 20, 2012 12:53 PM ET
Nicholas Percoco

Network World - Google in February implemented in its Google Play (formerly Android Market) a technology called Bouncer to check apps submitted by Android developers for any traces of malicious code. This week at the Black Hat Conference in Las Vegas, security firm Trustwave will demonstrate and discuss how it's possible to circumvent the Google Bouncer security check.

IN PICTURES: Quirkiest moments at 2012 Black Hat security conference

ROUNDUP: The worst security snafus of 2012 -- so far

ARCHIVES: 10 scariest hacks from Black Hat and Defcon 2011

Bullet Black Hat panel: Which do you trust less with your data, the U.S. government or Google?
Bullet Tatu Ylonen, father of SSH, says security is 'getting worse'
Bullet Researcher wows Black Hat with NFC-based smartphone hacking demo
Bullet Black Hat: Cyber-espionage operations vast yet highly focused, researcher claims

Trustwave proved to itself that its masking technique could get past Bouncer's detection by getting a malicious app it created into Google Play earlier this year, says Nicholas Percoco (shown here), senior vice president and head of Trustwave's SpiderLabs advanced security team. "We wanted to test the bounds of what it's capable of," he says, describing how Trustwave as a registered Android developer created an app called "SMS Blocker." When downloaded to a smartphone, the app would be able to steal contacts, SMS messages and photos, and basically know anything about the device. The app could also make the phone go to arbitrary Web pages or launch a denial-of-service attack. He says: "Google never flagged it."

Percoco notes that Trustwave deliberately chose an SMS blocker to be its test project against Google Bouncer because there are so many of them already on Google Play, and by pricing its SMS Blocker app high, there was little likelihood anyone would actually buy and download it (no one did). But by getting the malicious app past Bouncer for more than two weeks -- Bouncer, which does repeat checks, never spotted it -- Trustwave says it's making the point that sophisticated attacks are likely to evade such malware detection tools.

"As an attack, all a malware attacker has to do to get into Google Play is to bypass Bouncer," Percoco points out. Bouncer's automated detection method isn't yet sufficient to spot the kind of sophisticated masking techniques that Trustwave will demonstrate at the presentation on Wednesday at Black Hat, he says.

Percoco adds that Trustwave reached out to share its findings with Google, which he says is "a great organization to work with," especially Adrian Ludwig in the Google Android Security division. But Percoco says a more manual approach to testing apps on Android devices for malicious code may be needed to even start to detect what Trustwave came up with as a malware-masking technique.

Stonesoft shows off

Also focusing on evasive attacks at Black Hat this week will be Stonesoft, which is announcing a product called Evasion Prevention System. This appliance is designed to detect and block attacks that rely on what the company calls "advanced evasion techniques."

Our Commenting Policies
Latest News
rssRss Feed
View more Latest News