{"id":5708,"date":"2014-08-15T10:00:14","date_gmt":"2014-08-15T14:00:14","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=5708"},"modified":"2022-10-18T08:08:37","modified_gmt":"2022-10-18T12:08:37","slug":"fakeid-scanner","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/fakeid-scanner\/5708\/","title":{"rendered":"How to seal the &#8220;back door&#8221; in Android OS"},"content":{"rendered":"<p><em>Update: The app described in this post is discontinued. To protect your Android smartphone or tablet use .<\/em><\/p>\n<p>Android OS has settled down for good on the top of the two hit parades. Firstly, it is a mobile OS rating. Secondly, it\u2019s the rating of the mobile platforms which are\u00a0 being infected most often. According to Kaspersky Lab more than 99% of mobile malware are Android-oriented. Applications on Google play are being regularly checked to safeguard users, moreover Google has implemented a number of protective measures in the Android OS itself. For example, during the application installation there is verification which can guarantee the origin of a software and the confidence that files were not changed by strangers. Unfortunately, these measures are not perfect and malware has had a good opportunity to get into the smartphone by a back door for a long time.<\/p>\n<p><strong>The backdoor<\/strong><\/p>\n<p>The last year specialists found several flaws in the Android protection mechanisms. Because of these flaws, a malicious application can penetrate the smartphone by disguising itself as a popular and trusted service, or by \u201cpiggybacking\u201d\u00a0\u00a0 the legitimate application, i.e. adding itself into the installation package. The vulnerabilities called <a href=\"https:\/\/threatpost.com\/second-android-master-key-attack-surfaces\" target=\"_blank\" rel=\"noopener nofollow\">Master Key<\/a> and <a href=\"https:\/\/threatpost.com\/critical-android-fakeid-bug-allows-attackers-to-impersonate-trusted-apps\" target=\"_blank\" rel=\"noopener nofollow\">FakeID<\/a> are presented in most of the modern Android smartphones. They are a little bit less famous than renowned <a href=\"https:\/\/threatpost.com\/difficulty-of-detecting-openssl-heartbleed-attacks-adds-to-problem\" target=\"_blank\" rel=\"noopener nofollow\">Heartbleed<\/a>(Android smartphones are also subjected to it partly), but it is very important to remove them. The difficulty is that although Google released the necessary fixes long time ago, they should be implemented by either particular smartphone and\u00a0 tablet computer vendor or by a mobile operator that distributes them. And then the owner of this particular device should download and install this update. This often happens with a significant delay and often doesn\u2019t happen at all. So the amount of vulnerable devices numbers millions.<\/p>\n<p><strong>To seal the hole <\/strong><\/p>\n<p>To get rid of the vulnerability without any assistance is not easy, but you can minimize associated risks for your devices. Here are the steps to do that:<\/p>\n<ol>\n<li>Check if there are such vulnerabilities as FakeID, Master Key or Heartbleed on your smartphone or a tablet. You can use the free scanner from Kaspersky Lab which is available on Google Play. Besides the presence of the vulnerability, it also examines if there are applications installed which use this vulnerability.<br>\n<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/08\/06042838\/fakeid-detect-1.png\"><img decoding=\"async\" class=\"aligncenter wp-image-5711\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/08\/06042838\/fakeid-detect-1.png\" alt=\"fakeid-detect (1)\" width=\"400\" height=\"711\"><\/a><\/li>\n<li>If your device is vulnerable, check whether firmware (phone software) updates are available. Most Android vendors have a special \u201ccheck for update\u201d section in the settings,\u00a0 but in some cases you have to visit the official producer\u2019s web-site. If updates are available, install them according to the manual and check your device as in p.1 again.<br>\n<blockquote class=\"twitter-pullquote\"><p>FakeID vulnerability allows a malicious app to sneak into your Android smartphone \u2013\u00a0 learn how to fix it.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F8dJm&amp;text=FakeID+vulnerability+allows+a+malicious+app+to+sneak+into+your+Android+smartphone+%26%238211%3B%C2%A0+learn+how+to+fix+it.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote><\/li>\n<li>If the vulnerability hasn\u2019t been addressed yet, you could fix the breach by yourself, but it takes many complicated and somewhat unreliable procedures, which wouldn\u2019t be recommended to the general public. (If you are brave enough and literate in this area you could read more on the xda-developers website.)<\/li>\n<li>Unpatched vulnerability isn\u2019t a cause to throw the smartphone away, but you have to be vigilant to avoid loss of money and data:<\/li>\n<\/ol>\n<ul>\n<li>Use only large official applications stores (think Google Play)<\/li>\n<li>Download only the apps\u00a0 with high popularity and ratings<\/li>\n<li>Control the permissions of the application<\/li>\n<li>Use <a href=\"http:\/\/kas.pr\/kmsf\" target=\"_blank\" rel=\"noopener\">Reliable Android Security<\/a> software.<\/li>\n<\/ul>\n<p><em>Update: The app described in this post is discontinued. To protect your Android smartphone or tablet use .<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Unpatched flaws in Android make your device vulnerable to \u201cInvisible\u201d infection. You better find out now in order to protect yourself.<\/p>\n","protected":false},"author":40,"featured_media":5710,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,7],"tags":[105,785,588,788,786,97,45,268],"class_list":{"0":"post-5708","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-products","9":"tag-android","10":"tag-fakeid","11":"tag-heartbleed","12":"tag-kaspersky-fakeid-scanner","13":"tag-master-key","14":"tag-security-2","15":"tag-smartphones","16":"tag-vulnerabilities"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/fakeid-scanner\/5708\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/fakeid-scanner\/3905\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/fakeid-scanner\/3810\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/fakeid-scanner\/4299\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/fakeid-scanner\/4554\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/fakeid-scanner\/4068\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/fakeid-scanner\/4565\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/fakeid-scanner\/4919\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/fakeid-scanner\/3796\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/fakeid-scanner\/4919\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/fakeid-scanner\/5708\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/fakeid-scanner\/5708\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5708","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=5708"}],"version-history":[{"count":11,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5708\/revisions"}],"predecessor-version":[{"id":45874,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5708\/revisions\/45874"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/5710"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=5708"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=5708"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=5708"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}