Skip to main content

Malicious hackers could exploit flaws in Android for Work to nab sensitive data

android 23 gingerbread deprecated for work
wutlufaipy/123RF
One of the pillars of Google’s enterprise-focused “work features in Android platform,” previously called Android for Work, is security. But a newly discovered exploit demonstrated at the RSA conference in San Francisco on February 16 showed how an attacker could view, steal, and even manipulate content on a corporate Android smartphone without tipping off IT administrators.

The flaw, discovered by Yair Amit, chief technology officer of cybersecurity firm Skycure, has to do with the way Android for Work handles “sandboxes,” or protects user profiles. The service operates on the idea of a “work” profile with business-level controls, enterprise applications, corporate email, and secure documents on a smartphone or tablet. This secure profile effectively acts as a separate user, though it shares icon badges and notifications with the personal profile.

Recommended Videos

This concept of sandboxing — creating a secure container where apps outside the work profile can’t access data inside it — is key to Android for Work’s conceit. But it isn’t bulletproof.

Please enable Javascript to view this content

One potential line of attack involves Android’s notifications framework. Incoming Android for Work messages are designated with a red briefcase icon in Android’s notifications window, giving the impression that they remain segregated from those in the personal profile.

But notifications on Android are a device-level permission, meaning apps in the personal profile can potentially manipulate the content of notifications from the work profile. Malicious software could view sensitive incoming work emails, calendar appointments, file attachments, and other messages, for example, and could transmit that information to a remote server.

The second line of attack exploits a flaw in Android’s Accessibility Service, the Android component that provides usability enhancements for impaired users. It necessarily has access to virtually all of Android’s content and controls, making apps that acquire permission to use it particularly dangerous — and difficult to detect. For instance, an app could use Android’s Draw Over Apps feature, which allows apps to lay text and graphics on top of other apps, to trick a user into activity Accessibility Service or Notifications without their knowledge.

That’s not to suggest the attacks can’t be mitigated. Android 6.0 Marshmallow requires users to manually allow apps to create system overlays by changing permissions in the settings menu. And the Notifications attack requires a user to grant extraordinary permissions to an installed app. Still, Amit notes the relative ease of circumventing Android for Work’s sandboxing method by exploiting the “illusion” of security.

“The interesting thing about both of these […] methods of defeating the Android for Work profile separation is that the device and the Android operating system remain operating exactly as designed and intended,” Amit said.

“It is the user who must be tricked into placing the software on the device and activating the appropriate services that allow the malware access to sensitive information. [The] illusion of a secure container […] tends to allow people to let their guard down in the belief that the environment itself is a sufficient security mechanism to protect data.”

Kyle Wiggers
Former Digital Trends Contributor
Kyle Wiggers is a writer, Web designer, and podcaster with an acute interest in all things tech. When not reviewing gadgets…
MKBHD just revealed his smartphone of the year
Smartphones released in 2024.

Popular tech YouTuber Marques Brownlee, aka MKBHD, has just announced his selection for best smartphone of 2024 and, no, it’s not an iPhone.

In a new video that dropped for his 19.7 million followers on Thursday, Brownlee began by giving a shout-out to some of his top selections in the smartphone space, saving his top choice until the very end.

Read more
I wore an Oura Ring for all of 2024. Here’s why I love it and why I’m concerned
The side of the Oura Ring 4.

I’ve worn one wearable more than any other this year, and it speaks to not only its convenience but also its brilliance. It’s the Oura Ring, and I started off 2024 with the third-generation version on my finger, but I will close it with the Oura Ring 4.

While I’m going to generally sing its praises, I’m also going to share why I’m a little concerned about it, too.
How much have I worn the Oura Ring?

Read more
Tips to keep your smartphone just as safe as a government official’s
Safety check on iPhone

It’s the holiday season, and that means an onslaught of bad actors trying to ensnare digital shoppers into their scams. Even Google had to publish a self-pat-on-the-back alert covering celebrity scams, fake invoice traps, and digital extortion. Of course, Big G took the opportunity to regale the virtues of Gmail’s anti-spam tricks.

The government, however, is dead serious about the threats, which extend well into the domain of intricate cyberattacks and telecom breaches targeting high-ranking officials and senior politicians. To that end, the Cybersecurity and Infrastructure Security Agency (CISA) has issued a set of guidelines to protect smartphones.

Read more