Name |
Android Intent Intercept |
|
Likelyhood of attack |
Typical severity |
High |
Very Low |
|
Summary |
An adversary, through a previously installed malicious application, intercepts messages from a trusted Android-based application in an attempt to achieve a variety of different objectives including denial of service, information disclosure, and data injection. An implicit intent sent from a trusted application can be received by any application that has declared an appropriate intent filter. If the intent is not protected by a permission that the malicious application lacks, then the attacker can gain access to the data contained within the intent. Further, the intent can be either blocked from reaching the intended destination, or modified and potentially forwarded along. |
Prerequisites |
An adversary must be able install a purpose built malicious application onto the Android device and convince the user to execute it. The malicious application is used to intercept implicit intents. |
Execution Flow |
Step |
Phase |
Description |
Techniques |
1 |
Explore |
[Find an android application that uses implicit intents] Since this attack only works on android applications that use implicit intents, rather than explicit intents, an adversary must first identify an app that uses implicit intents. They must also determine what the contents of the intents being sent are such that a malicious application can get sent these intents. |
|
2 |
Experiment |
[Create a malicious app] The adversary must create a malicious android app meant to intercept implicit intents from a target application |
- Specify the type of intent wished to be intercepted in the malicious app's manifest file using an intent filter
|
3 |
Experiment |
[Get user to download malicious app] The adversary must get a user using the targeted app to download the malicious app by any means necessary |
|
4 |
Exploit |
[Intercept Implicit Intents] Once the malicious app is downloaded, the android device will forward any implicit intents from the target application to the malicious application, allowing the adversary to gaina access to the contents of the intent. The adversary can proceed with any attack using the contents of the intent. |
- Block the intent from reaching the desired location, causing a denial of service
- Gather sensitive information from the intercepted intent
- Modify the contents of the intent and forward along to another application
|
|
Solutions | To mitigate this type of an attack, explicit intents should be used whenever sensitive data is being sent. An explicit intent is delivered to a specific application as declared within the intent, whereas the Android operating system determines who receives an implicit intent which could potentially be a malicious application. If an implicit intent must be used, then it should be assumed that the intent will be received by an unknown application and any response should be treated accordingly. Implicit intents should never be used for inter-application communication. |
Related Weaknesses |
CWE ID
|
Description
|
CWE-925 |
Improper Verification of Intent by Broadcast Receiver |
|
Related CAPECS |
CAPEC ID
|
Description
|
CAPEC-117 |
An adversary monitors data streams to or from the target for information gathering purposes. This attack may be undertaken to solely gather sensitive information or to support a further attack against the target. This attack pattern can involve sniffing network traffic as well as other types of data streams (e.g. radio). The adversary can attempt to initiate the establishment of a data stream or passively observe the communications as they unfold. In all variants of this attack, the adversary is not the intended recipient of the data stream. In contrast to other means of gathering information (e.g., targeting data leaks), the adversary must actively position themself so as to observe explicit data channels (e.g. network traffic) and read the content. However, this attack differs from a Adversary-In-the-Middle (CAPEC-94) attack, as the adversary does not alter the content of the communications nor forward data to the intended recipient. |
|