Heartbleed may be dominating the headlines when it comes to security topics lately, and while that one does pose some specific risks for smartphone users, it’s far from alone among all the vulnerabilities out there. Today we hear about Google’s efforts to address one that’s new to us, an oversight in how Android manages permissions that could set the stage for malicious software to orchestrate a phishing attack.
The problem stems from a pair of unprotected permissions tied to the Android launcher’s configuration settings. Since they’re classified at the low-risk “normal” permission level, Android grants apps these abilities without directly notifying the user. Our trouble creeps up when researchers noticed that it’s nonetheless possible to perform malicious actions with these permissions: an app can change icons on your home screen to no longer point to their intended app targets, but redirect the user to a malicious website, instead.
Won’t you notice when you tap on your bank’s app and get sent to a web page instead? Hopefully, but we can still appreciate the risk this vulnerability opens up, especially for users who might not be fully used to how a particular app’s supposed to function.
Reportedly, Google’s patched this behavior and issued the code to its OEM partners. We’re not sure if it’s part of those 4.4.3 changes that should start arriving this week, but it’s coming eventually.