Security Resources and Information from TechTarget 09月29日
Android安全挑战与威胁
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

Android设备面临多种安全风险,包括零日漏洞、银行木马、NFC中继攻击和商业间谍软件。由于Android的开源特性,其生态系统存在硬件和软件碎片化问题,导致安全管理复杂。制造商的定制化修改可能引入漏洞并延迟安全更新。近期的主要威胁包括零日漏洞CVE-2024-43093、CVE-2024-50302和CVE-2024-36971,以及TsarBot银行木马和SuperCard X NFC恶意软件。IT团队需持续关注安全威胁,利用NIST漏洞数据库、Google安全公告等资源,并通过MDM和移动威胁防御工具加强防护。

🔍 Android的开源架构导致生态系统碎片化,制造商的定制化修改可能引入漏洞并延迟安全更新,增加了企业IT团队的安全管理难度。

📌 近期主要威胁包括零日漏洞CVE-2024-43093(权限提升漏洞)、CVE-2024-50302(Linux内核漏洞)和CVE-2024-36971(远程代码执行漏洞),以及TsarBot银行木马(通过覆盖攻击窃取金融账户信息)和SuperCard X NFC恶意软件(利用NFC中继攻击进行无接触支付欺诈)。

🛡️ IT团队需利用NIST漏洞数据库、Google安全公告、Android企业安全中心和Google Play Protect等资源持续跟踪最新威胁,并通过MDM和移动威胁防御工具实时检测恶意行为。

<p>From OS vulnerabilities to ransomware attacks, Android devices continue to face a variety of security risks. As soon as Google fixes one problem, another threat comes along.</p><div class="ad-wrapper ad-embedded"> <div id="halfpage" class="ad ad-hp"> <script>GPT.display('halfpage')</script> </div> <div id="mu-1" class="ad ad-mu"> <script>GPT.display('mu-1')</script> </div> </div> <p>Data security is of utmost importance in enterprise organizations. To <a href="https://www.techtarget.com/searchmobilecomputing/feature/7-mobile-device-security-best-practices-for-businesses"&gt;protect mobile devices</a> in these environments, IT must understand the security weaknesses of different mobile OSes. The Android ecosystem's unique architecture requires a different approach than another OS does. An effective security strategy considers the risks associated with the devices it's addressing.</p> <p>Mobile administrators should consistently update themselves on the most recent Android security threats. Armed with the latest knowledge, they can quickly push out security patches and ensure their users and data are secure.</p> <section class="section main-article-chapter" data-menu-title="Understanding Android's security challenges"> <h2 class="section-title"><i class="icon" data-icon="1"></i>Understanding Android's security challenges</h2> <p>The Android OS has some key architecture differences from Apple's iOS, and these differences <a href="https://www.techtarget.com/searchmobilecomputing/tip/Are-iPhones-more-secure-than-Android-devices"&gt;affect security</a>. While Apple's ecosystem is a walled garden, Android is open source. The OS can run on devices from many different vendors, each with its own possible features and practices.</p> <p>This framework creates both opportunities and challenges for enterprise security. Unlike closed ecosystems, Android's open source foundation lets device manufacturers customize the OS. The drawback is that it leads to significant fragmentation across the Android ecosystem.</p> <h3>Hardware and software fragmentation</h3> <p><a href="https://www.techtarget.com/searchmobilecomputing/tip/Is-Android-fragmentation-still-a-problem-for-IT-teams"&gt;Android fragmentation</a> creates several security challenges for organizations. The platform's open source nature has led to thousands of unique device configurations across hundreds of manufacturers worldwide. This diversity creates complex security management challenges for enterprise IT teams. Version fragmentation compounds these issues. Newer Android versions often take months or years to reach widespread adoption. Many devices continue running older software versions that might lack current security protections.</p> <h3>Manufacturer modifications</h3> <p>An open source ecosystem enables rapid innovation but also creates security complexities. Google maintains the Android Open Source Project (<a href="https://www.techtarget.com/searchmobilecomputing/definition/Android-Open-Source-Project-AOSP"&gt;AOSP&lt;/a&gt;) codebase, which developers use to build upon the OS and make customizations. However, manufacturers can add proprietary modifications that end up introducing vulnerabilities or delaying security updates.</p></section> <section class="section main-article-chapter" data-menu-title="Recent major Android security threats"> <h2 class="section-title"><i class="icon" data-icon="1"></i>Recent major Android security threats</h2> <p>In recent years, security researchers have found several Android attack vectors. Current threats to be aware of include zero-day vulnerabilities, banking Trojan horses, NFC relay attacks and commercial spyware.</p> <blockquote class="main-article-pullquote"> <div class="main-article-pullquote-inner"> <figure> Android continues to be a prime target for zero-day vulnerabilities. </figure> <i class="icon" data-icon="z"></i> </div> </blockquote> <h3>Zero-day vulnerabilities</h3> <p>Android continues to be a prime target for zero-day vulnerabilities. Exploiting these flaws has been a <a href="https://www.techtarget.com/searchsecurity/news/366575693/Spyware-vendors-behind-75-of-zero-days-targeting-Google"&gt;key tactic for spyware vendors</a>.</p> <p>Notable zero-day flaws from the past few years include the following:</p> <ul class="default-list"> <li><b>CVE-2024-43093.</b> A privilege escalation flaw enabling unauthorized access to sensitive Android directories.</li> <li><b>CVE-2024-50302.</b> A Linux kernel vulnerability that enabled Serbian authorities to unlock activist devices using Cellebrite forensic tools.</li> <li><b>CVE-2024-36971.</b> A Linux kernel vulnerability that enabled remote code execution attacks.</li> </ul> <h3>Banking Trojans</h3> <p>Trojan horses that try to steal financial accounts have been particularly active against Android. One of the most prevalent variants is the TsarBot banking Trojan, which emerged in March 2025. The malware <a target="_blank" href="https://mas.owasp.org/MASTG/knowledge/android/MASVS-PLATFORM/MASTG-KNOW-0022/" rel="noopener">uses</a> an overlay attack to target over 750 banking and cryptocurrency applications globally.</p> <p>Phishing websites spread the malware while posing as legitimate financial portals. TsarBot requires the user to enable accessibility services on their device, then deploys advanced techniques -- including screen recording, SMS interception to bypass authentication, keylogging and credential harvesting. The malware establishes WebSocket connections to command-and-control servers, enabling attackers to control the device remotely. Hackers can then steal data and execute fraudulent transactions without the user's knowledge.</p> <div class="youtube-iframe-container"> <iframe id="ytplayer-0" src="https://www.youtube.com/embed/Vjkq5TknEqk?si=XmN-n7I2oEThCNLl?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"></iframe> </div> <h3>NFC relay attacks</h3> <p>Android devices use near-field communication (NFC) for contactless payment. In April 2025, a new threat vector emerged with SuperCard X malware, which enables contactless payment fraud through <a href="https://www.darkreading.com/threat-intelligence/nfc-android-malware-instant-cash-outs"&gt;NFC relay attacks</a>.</p> <p>In this attack, the hacker uses social engineering tactics to get the victim to install an app on their device. The app contains the SuperCard X malware. Once the victim taps their credit or debit card against their device's NFC reader, the hacker receives the card details and can use them for unauthorized transactions at ATMs and point-of-sale terminals.</p> <h3>Commercial spyware</h3> <p>Commercial spyware technology has also been very active in recent years. In early 2024, Google's Threat Analysis Group released a detailed report outlining the growing risk. The report, titled "Buying Spying: Insights into Commercial Surveillance Vendors," notes that the commercial spyware industry largely focuses on targeting mobile devices.</p> <p>According to the report, the Threat Analysis Group tracks approximately 40 spyware vendors actively developing surveillance tools for Android devices. It also found that these vendors were responsible for half of known <a href="https://www.techtarget.com/searchSecurity/news/366569061/Google-Spyware-vendors-are-driving-zero-day-exploitation"&gt;zero-day exploits against Google products</a> and Android devices.</p> <p>Bad actors can pay these vendors for surveillance software and exploit chains to spy on multiple devices. Examples include Cy4Gate, Intellexa and NSO Group, the vendor behind Pegasus spyware.</p></section> <section class="section main-article-chapter" data-menu-title="What can IT do to keep track of the latest Android security threats?"> <h2 class="section-title"><i class="icon" data-icon="1"></i>What can IT do to keep track of the latest Android security threats?</h2> <p>Getting ahead of mobile attacks requires threat intelligence and proactive monitoring. Use the following resources to stay on top of possible vulnerabilities:</p> <ul class="default-list"> <li>NIST's National Vulnerability Database offers comprehensive Android vulnerability <a target="_blank" href="https://nvd.nist.gov/vuln/search#/nvd/home?resultType=records" rel="noopener">tracking</a>.</li> <li>Google's Android security bulletins provide <a target="_blank" href="https://source.android.com/docs/security/bulletin/asb-overview" rel="noopener">monthly updates</a> on patched vulnerabilities and security improvements.</li> <li>The Android enterprise security <a target="_blank" href="https://www.android.com/enterprise/security/" rel="noopener">hub</a> delivers security reports and whitepapers, along with enterprise-specific guidance and best practices.</li> <li>Google Play Protect provides <a target="_blank" href="https://developers.google.com/android/play-protect" rel="noopener">information</a> for developers, OEMs and users to help them understand how the service secures Android devices.</li> </ul> <p>Additionally, IT teams should include threat detection in their management practices. Conducting regular security audits and implementing tools such as MDM and mobile threat defense help address malicious attempts in real time.</p> <p><b>Editor's note:</b> <i>This article was originally written by Robert Sheldon in February 2020. Sean Michael Kerner wrote an updated version in August 2025.</i></p> <p><i>Sean Michael Kerner is an IT consultant, technology enthusiast and tinkerer. He has pulled Token Ring, configured NetWare and been known to compile his own Linux kernel. He consults with industry and media organizations on technology issues.</i></p> <p><i>Robert Sheldon is a freelance technology writer. He has written numerous books, articles and training materials on a wide range of topics, including big data, generative AI, 5D memory crystals, the dark web and the 11th dimension.</i></p></section>

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

Android安全 零日漏洞 银行木马 NFC中继攻击 商业间谍软件 IT安全
相关文章