The discovery of a very serious gap can grab more than two billion phone data around the world!
In the news detonator, a group of security researchers discovered a new way to control and theft of more than 2 billion mobile data around the world, both Android system phones or iOs.
Publish all of Ronghai Yang, Wing Cheong, Tianyu Liu (researchers from the University of Hong Kong Chinese) conference Black Hat Europe on Friday, and a research paper included merits very serious loophole, targeting a wide range of mobile applications that rely on the inclusion of a definition by a third party (single sign-on (SSO, any applications that enables the user to their access by linking the identification calculated on a known sites Qvis Bock, Google or other without the inclusion of the user name and password, where this matter through the OAuth protocol.
The flaw in the way you use your application developers to this Protocol, be the correct way to use it as follows:
Here we focus on the proper application achieved two key things: First, the definition of user identity (ID), a second verification of the access code (Access Token), which determines whether a user account is linked to the application corresponds to the user profile, or not.
Here are the wrong way to use the protocol through which a hacker can impersonate the user's identity:
Unfortunately, many developers do not pay attention for the second point where after the first linked to the application of one of the user's hands providers (Facebook, Google ...), is verified by and access code, but next time do not be checked this code is sufficient hands only and here the defect, if the attacker was able to replace the hands during the verification process, can provoke the application for a symbol of its arrival.
Thus, the method easy to implement, and relies on the application or download infected Vulnerability applications and search for victims (from Google or through random guessing for hands).
In the same paper, the security team noted that the method was able to seize the user data associated with the application, many of the banks services and short positions and buy and Hotel services and some communication applications and other victim of this gap, the researchers confirmed that it will work on iOS system as well as if the application is infected although they did not try it on this system.