

Percoco adds that Trustwave reached out to share its findings with Google, which he says is "a great organization to work with," especially Adrian Ludwig in the Google Android Security division. Bouncer's automated detection method isn't yet sufficient to spot the kind of sophisticated masking techniques that Trustwave will demonstrate at the presentation on Wednesday at Black Hat, he says. "As an attack, all a malware attacker has to do to get into Google Play is to bypass Bouncer," Percoco points out. But by getting the malicious app past Bouncer for more than two weeks - Bouncer, which does repeat checks, never spotted it - Trustwave says it's making the point that sophisticated attacks are likely to evade such malware detection tools.

Percoco notes that Trustwave deliberately chose an SMS blocker to be its test project against Google Bouncer because there are so many of them already on Google Play, and by pricing its SMS Blocker app high, there was little likelihood anyone would actually buy and download it (no one did). The app could also make the phone go to arbitrary Web pages or launch a denial-of-service attack. "We wanted to test the bounds of what it's capable of," he says, describing how Trustwave as a registered Android developer created an app called "SMS Blocker." When downloaded to a smartphone, the app would be able to steal contacts, SMS messages and photos, and basically know anything about the device. Trustwave proved to itself that its masking technique could get past Bouncer's detection by getting a malicious app it created into Google Play earlier this year, says Nicholas Percoco (shown here), senior vice president and head of Trustwave's SpiderLabs advanced security team. Researcher wows Black Hat with NFC-based smartphone hacking demoīlack Hat: Cyber-espionage operations vast yet highly focused, researcher claims Tatu Ylonen, father of SSH, says security is 'getting worse' Black Hat panel: Which do you trust less with your data, the U.S.
