A security flaw in Android 4.0.4 and below can exploited by a rootkit with relative ease, a research team at North Carolina State University led by Professor Xuxian Jiang, of the Android Malware Genome Project, recently announced.
Like most Android malware, the Ice Cream Sandwich rootkit can be distributed as a malicious app, opening up a host of potential vulnerabilities on any device on which it is installed. However, it functions in a different way.
Instead of directly attacking the operating system kernel, blog author Matt Shipman wrote, the rootkit approach targets a flaw in the Android framework - creating a host of possibilities for a hacker.
"This would be a more sophisticated type of attack than we've seen before, specifically tailored to smartphone platforms," said Jiang. "The rootkit was not that difficult to develop, and no existing mobile security software is able to detect it."
A YouTube demonstration highlights the simplicity of the rootkit - the user was able to hijack a standard Nexus S with ease, reprogramming the browser icon to launch Angry Birds instead. Apps can be hidden on the device but remain installed and functional, which could enable a hacker to conceal malicious software from unsuspecting users.
Jiang's team is working on a fix for the problem, according to the blog post.
The blog post notes that Jiang is the founder of the Android Malware Genome Project, a large-scale academic research effort into Android malware. Before the founding of that project, Jiang also helped identify security holes in the ad libraries used by mobile advertisers on the Android platform, warning of their vulnerability.