{"id":11805,"date":"2018-08-27T20:54:24","date_gmt":"2018-08-27T16:54:24","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/man-in-the-disk\/11805\/"},"modified":"2018-08-27T20:54:41","modified_gmt":"2018-08-27T16:54:41","slug":"man-in-the-disk","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/man-in-the-disk\/11805\/","title":{"rendered":"Man-in-the-Disk: A new and dangerous way to hack Android"},"content":{"rendered":"<p>Android is a good operating system whose developers truly care about security, but with so many OS versions and applications, keeping an eye on all of them is a tall order. Therefore, new ways to circumvent the built-in security mechanisms surface fairly often. The latest way to hack Android is called \u201cMan-in-the-Disk,\u201d and that is what we are going to talk about.<\/p>\n<p><a href=\"https:\/\/me-en.kaspersky.com\/blog\/wp-content\/blogs.dir\/37\/files\/2018\/08\/man-in-the-disk-featured.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-11806\" src=\"https:\/\/me-en.kaspersky.com\/blog\/wp-content\/blogs.dir\/37\/files\/2018\/08\/man-in-the-disk-featured.jpg\" alt=\"How a seemingly harmless Android application can infect your smartphone using shared external storage.\" width=\"1460\" height=\"958\"><\/a><\/p>\n<h2>\u201cSandboxes,\u201d the foundation of Android security<\/h2>\n<p>A key Android principle is that all applications must be isolated from one another. This is achieved through the use of so-called <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/sandbox\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener\">sandboxes<\/a>. Each application, together with its private files, lives in a \u201csandbox\u201d that other applications cannot access.<\/p>\n<p>The idea is to keep a malicious application, even if it infiltrates your Android device, from stealing data that other, good applications store, such as the username and password of your online banking app, or your message history. It\u2019s no surprise that hackers are hard at work looking for new ways to circumvent the mechanism, pursuing something called a \u201c<a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/sandbox-escape\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener\">sandbox escape<\/a>.\u201d They succeed, too, from time to time.<\/p>\n<p>For example, Slava Makkaveev\u2019s speech at DEF CON 26 focused on how an application with no particularly dangerous or suspicious permissions can escape the sandbox. He dubbed the method \u201c<a href=\"https:\/\/blog.checkpoint.com\/2018\/08\/12\/man-in-the-disk-a-new-attack-surface-for-android-apps\/\" target=\"_blank\" rel=\"nofollow noopener\">Man-in-the-Disk<\/a>,\u201d after the well-known <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/man-in-the-middle-attack\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener\">Man-in-the-Middle<\/a> type of attack.<\/p>\n<h3>How the Man-in-the-Disk attack works<\/h3>\n<p>Apart from the sandbox areas that house application files, Android has a shared external storage, appropriately named \u201cExternal Storage.\u201d An application must ask the user for <a href=\"https:\/\/www.kaspersky.com\/blog\/android-permissions-guide\/14014\/\" target=\"_blank\" rel=\"noopener nofollow\">permission<\/a> to access the storage: \u201cAccess photos, media and files on your device\u201d (that is effectively two permissions \u2013 READ_EXTERNAL_STORAGE and WRITE_EXTERNAL_STORAGE). These privileges are not normally considered dangerous, and nearly every application asks for them, so there is nothing suspicious about the request.<\/p>\n<p>Applications use external storage for lots of useful things, such as to exchange files or transfer files between a smartphone and a computer. However, external storage is also often used for temporarily storing data downloaded from the Internet: First, the data is written to the shared part of the disk, and only then transferred to an isolated area that only that particular application can access.<\/p>\n<p>For example, an application may temporarily use the area to store supplementary modules that it installs to expand its functionality, additional content such as dictionaries, or updates. The problem is that any application with read\/write access to the external storage can gain access to the files and modify them, adding something malicious.<\/p>\n<p>In a real-life scenario, you may install a seemingly harmless application, such as a game, that may nevertheless infect your smartphone with something truly nasty.<\/p>\n<p>The creators of Android actually realize that use of the external storage may be dangerous, and the Android developer site even features <a href=\"https:\/\/developer.android.com\/training\/articles\/security-tips\" target=\"_blank\" rel=\"nofollow noopener\">a few helpful tips<\/a> for app programmers.<\/p>\n<p>The problem is that not all app developers, not even Google employees or certain smartphone manufacturers, follow the advice. Examples presented by Slava Makkaveev include exploitation of the vulnerability in Google Translate, Yandex.Translate, Google Voice Typing, and Google Text-to-Speech, as well as system applications by LG and the Xiaomi browser.<\/p>\n<p>By the way, <a href=\"https:\/\/thehackernews.com\/2018\/08\/fortnite-android-app-apk.html\" target=\"_blank\" rel=\"nofollow noopener\">Google researchers recently discovered<\/a> that the very same Man-in-the-Disk attack can be applied to the Android version of a very popular game, Fortnite. To download the game, users need to install a helper app first, and it is supposed to download the game files. Turns out, using the Man-in-the-Disk attack, someone can trick the helper into installing a malicious application. Fortnite developers \u2013 Epic Games \u2013 are aware of this vulnerability and have already issued a new version of the installer. So if you\u2019re into Fortnite, use version 2.1.0 to stay safe. If you have Fortnite already installed, uninstall and then reinstall it from scratch using the aforementioned version.<\/p>\n<h3>How to protect your Android from the Man-in-the-Disk attack<\/h3>\n<p>Makkaveev singled out just a few really popular apps to demonstrate how bad things are, but vulnerable apps are likely numerous.<\/p>\n<p>How can you protect yourself? We have a few tips that are easy to follow:<\/p>\n<ul>\n<li>Install applications only from official stores such as Google Play. Malware does creep in, but it is far rarer \u2014 and removed on a regular basis.<\/li>\n<li>Disable the installation of applications from third-party sources in your smartphone or tablet settings; those are the most dangerous sources. To do that, select <em>Settings -&gt; Security<\/em> and uncheck <em>Unknown sources<\/em>.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2018\/05\/18142502\/unknown-sources-EN.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-11134\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2018\/05\/18142502\/unknown-sources-EN.jpg\" alt=\"\" width=\"300\" height=\"208\"><\/a><\/p>\n<ul>\n<li>Choose applications by verified developers. Check the application rating and read the reviews. Avoid installing anything that <a href=\"https:\/\/www.kaspersky.com\/blog\/android-app-security\/18505\/\" target=\"_blank\" rel=\"noopener nofollow\">looks fishy<\/a>.<\/li>\n<li>Do not install anything you do not need. The fewer apps you have on your smartphone, the better.<\/li>\n<li>Remember to remove applications you no longer need.<\/li>\n<li>Use a <a href=\"https:\/\/me-en.kaspersky.com\/mobile-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____3d7d2c33c4c17a10\" target=\"_blank\" rel=\"noopener\">reliable mobile antivirus application<\/a> that will give you a timely notification if a malicious app is trying to penetrate your device.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic\">\n","protected":false},"excerpt":{"rendered":"<p>How a seemingly harmless Android application can infect your smartphone using shared external storage.<\/p>\n","protected":false},"author":421,"featured_media":11806,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,1486],"tags":[105,740,423,741,1874,22,957,1825,521,1620,967],"class_list":{"0":"post-11805","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-android","10":"tag-black-hat","11":"tag-blackhat","12":"tag-def-con","13":"tag-def-con-26","14":"tag-google","15":"tag-lg","16":"tag-permissions","17":"tag-threats","18":"tag-xiaomi","19":"tag-yandex"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/man-in-the-disk\/11805\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/man-in-the-disk\/14098\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/man-in-the-disk\/16089\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/man-in-the-disk\/14327\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/man-in-the-disk\/13347\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/man-in-the-disk\/16809\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/man-in-the-disk\/16204\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/man-in-the-disk\/21188\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/man-in-the-disk\/5241\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/man-in-the-disk\/23622\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/man-in-the-disk\/10862\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/man-in-the-disk\/9654\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/man-in-the-disk\/17562\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/man-in-the-disk\/21388\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/man-in-the-disk\/17240\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/man-in-the-disk\/20961\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/man-in-the-disk\/20971\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/def-con\/","name":"def con"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/11805","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/421"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=11805"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/11805\/revisions"}],"predecessor-version":[{"id":11808,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/11805\/revisions\/11808"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/11806"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=11805"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=11805"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=11805"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}