SlideShare a Scribd company logo
Android Phone Identifiers and
Eavesdropping Audio
李士暄
2014/7/41
Reference
• A Study of Android Application Security.
– Pennsylvania State University
– William Enck, Damien Octeau, Patrick McDaniel,
and Swarat Chaudhuri.
• Soundcomber: A Stealthy and Context-Aware
Sound Trojan for Smartphones.
– Indiana University Bloomington
– Kehuan Zhang, Xiaoyong Zhou, Mehool Intwala,
Apu Kapadia, XiaoFeng Wang
2
Introduction – Phone Identifiers
3
Identifiers Desciption
SIM (Subscriber
Identity Module)
A SIM card is a smart card that identifies the subscriber,
the service provider, and the mobile phone number.
PIN (personal
identification number)
A numeric password for SIM card that can be used to
authenticate the user to the system. (Default : 0000 or
1234)
IMEI (International
Mobile Equipment
Identity)
An unique number that identifies each mobile device. It
is 15 digits numbers. When a phone is reported stolen or
is not type approved, the number is marked invalid.
(Enter : *#06#)
IMSI (International
Mobile Subscriber
Identity)
An IMSI is a unique number that identifies user. It is also
15 digits long. Key Identification(KI) is an unique
password for each IMSI.
ICCID (Integrated
Circuit Card Identifier)
An ICCID is a unique number that identifies SIM card. It is
20 digits long number.
Introduction
• Phone identifiers are frequently leaked through
plaintext requests.
– Most sinks are HTTP GET or POST parameters
• Phone Identifier are used as device fingerprint.
– Not only phone identifers, but also other properties
– OS version, device hardware , application name,
platform
• IMEI is tied to personally identifiable
information(PII)
– Include IMEI in account registration and login request.
E.g. Line、Whatsapp
4William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri. Pennsylvania State University.
A Study of Android Application Security
Threats
• WhatsApp Password : an inverse of your phones IMEI
number with an MD5 cryptographic hash
1. Attacker develop an faked app and let user fill in their
personal information in registration part.
2. Silently sends the victims IMEI number & phone
number to his server in the background.
3. A hacker creates database/file with IMEI numbers
with associated phone numbers.
4. A spammer buys this information from an app
developer.
5
Sequence diagram of attacker scenario for
WhatsApp application
6
Demo
• App : Siminfo
• <uses-permission
android:name="android.permission.READ_PHONE_STATE" />
• Android.telephony.TelephonyManager
• getDeviceId() // Get IMEI
• getSimSerialNumber() // Get ICCID
• getSubscriberId() //Get IMSI
• Socket Programming
7
Demo : Siminfo
8
1. Server 開啟,等待Client連線
2. Client輸入完資料按【submit】,透過socket方式
傳送給 IP為: 192.168.1.1 的Server
3. 同時將該手機的IMEI、ICCID、IMSI 傳給Server
Eavesdropping Audio
• A Trojan with access to the video camera or
microphone can
– tape a user’s phone conversations
– send the recording to other parties , which
enables remote surveillance
– We refer to as sensory malware
• Malware : Android/NickiSpy
– record user telephone conversations
– store them in the SD card memory
9
Android/NickiSpy
• Once the malware is installed, it requests the
following permissions from the user:
10
Latest Android Malware Records Conversations By McAfee Labs on Aug 09, 2011
http://blogs.mcafee.com/mcafee-labs/latest-android-malware-records-conversations
Android/NickiSpy
• After installing the application and rebooting,
the device will start the following services in
the background:
11
Latest Android Malware Records Conversations By McAfee Labs on Aug 09, 2011
http://blogs.mcafee.com/mcafee-labs/latest-android-malware-records-conversations
Android/NickiSpy
• AndroidManifest.xml
12
Latest Android Malware Records Conversations By McAfee Labs on Aug 09, 2011
http://blogs.mcafee.com/mcafee-labs/latest-android-malware-records-conversations
Android/NickiSpy
• The malware drops a configuration file onto
the phone.
– This file has all the information the app needs
including the command server and port number
through which it communicates.
13
Latest Android Malware Records Conversations By McAfee Labs on Aug 09, 2011
http://blogs.mcafee.com/mcafee-labs/latest-android-malware-records-conversations
Android/NickiSpy
• The malware recorded the conversation and
stored it on the compromised phone’s SD card.
14
Latest Android Malware Records Conversations By McAfee Labs on Aug 09, 2011
http://blogs.mcafee.com/mcafee-labs/latest-android-malware-records-conversations
Android/NickiSpy
• The malware also retrieves the IMEI number
of the compromised mobile device
– And sends that information to the mobile number
“15859268161″
15
Latest Android Malware Records Conversations By McAfee Labs on Aug 09, 2011
http://blogs.mcafee.com/mcafee-labs/latest-android-malware-records-conversations
Demo
• App: RecordAudio
• <uses-permission
android:name="android.permission.RECORD_AUDIO" />
• <uses-permission
android:name="android.permission.INTERNET" />
• Socket Programming
16
Demo: RecordAudio
17
1. Server開啟,等待Clinet連線
2. Client開始App後,自動連上Server(IP:192.168.1.1)
3. Server端下指令 : start(client端開始錄音)
4. Server端下指令 : stop (Client端停止錄音)
5. Client將錄音檔傳送給Server,並放在桌面上
Comments
• Android is highly dangerous!!!
• Users should never install unknown or
untrusted applications on their mobile devices.
– Do not checked Setting > Security > unknown
sources
• Pay attention to those unrelated permissions
that are requested when you install app.
18

More Related Content

PPTX
Security threats in Android OS + App Permissions
PPTX
Attacks on Mobiles\Cell Phones
PPTX
PDF
Les 10 risques liés aux applications mobiles
PPTX
Protection from hacking attacks
PDF
Mobile Security
PDF
CNIT 128 5: Mobile malware
PPTX
Android Hacking + Pentesting
Security threats in Android OS + App Permissions
Attacks on Mobiles\Cell Phones
Les 10 risques liés aux applications mobiles
Protection from hacking attacks
Mobile Security
CNIT 128 5: Mobile malware
Android Hacking + Pentesting

What's hot (20)

PPTX
Mobile security
PPTX
Computer securety
PPTX
Ethical hacking
PDF
1. Mobile Application (In)security
PPTX
Smartphone security
PDF
CNIT 128 Ch 3: iOS
PPT
Cell Phone Viruses & Security
PPTX
Ethical Hacking
PDF
New trends in Payments Security: NFC & Mobile
PDF
Class 11 ca chapter 17 computer ethics and cyber crime
PDF
Malware on Smartphones and Tablets - The Inconvenient Truth
PPTX
Introduction ethical hacking
PPT
Mobile phone Data Hacking
PPTX
Cyper security & Ethical hacking
PDF
Maheen.Mehnaz 071618056
PPT
Hacking
PPT
2010: Mobile Security - WHYMCA Developer Conference
PDF
CNIT 128 Ch 4: Android
PDF
10940 img sytr12_mobile_malware
Mobile security
Computer securety
Ethical hacking
1. Mobile Application (In)security
Smartphone security
CNIT 128 Ch 3: iOS
Cell Phone Viruses & Security
Ethical Hacking
New trends in Payments Security: NFC & Mobile
Class 11 ca chapter 17 computer ethics and cyber crime
Malware on Smartphones and Tablets - The Inconvenient Truth
Introduction ethical hacking
Mobile phone Data Hacking
Cyper security & Ethical hacking
Maheen.Mehnaz 071618056
Hacking
2010: Mobile Security - WHYMCA Developer Conference
CNIT 128 Ch 4: Android
10940 img sytr12_mobile_malware
Ad

Similar to Android phone identifiers and eavesdropping audio (20)

PPTX
I haz you and pwn your maal
PDF
V4I5201553
PDF
When developers api simplify user mode rootkits development – part ii
PDF
I haz you and pwn your maal whitepaper
PDF
Isn't it all just SMS-sending trojans?: Real Advances in Android Malware
PDF
Hacking your Android (slides)
PDF
Csw2016 chaykin having_funwithsecuremessengers_and_androidwear
PDF
Android malware overview, status and dilemmas
PPTX
Cp3201 mobile security final
PDF
Hacking your Droid (Aditya Gupta)
PDF
Android malware
PDF
Android malware
PDF
6.3. How to get out of an inprivacy jail
PDF
Reading Group Presentation: Why Eve and Mallory Love Android
PDF
When developers api simplify user mode rootkits development – part ii
PPT
Mobile code mining for discovery and exploits nullcongoa2013
PDF
Malicious android-applications-risks-exploitation 33578
PDF
YURY_CHEMERKIN_HackMiami_2014_Conference.pdf
PDF
Make Mobilization Work - Properly Implementing Mobile Security
I haz you and pwn your maal
V4I5201553
When developers api simplify user mode rootkits development – part ii
I haz you and pwn your maal whitepaper
Isn't it all just SMS-sending trojans?: Real Advances in Android Malware
Hacking your Android (slides)
Csw2016 chaykin having_funwithsecuremessengers_and_androidwear
Android malware overview, status and dilemmas
Cp3201 mobile security final
Hacking your Droid (Aditya Gupta)
Android malware
Android malware
6.3. How to get out of an inprivacy jail
Reading Group Presentation: Why Eve and Mallory Love Android
When developers api simplify user mode rootkits development – part ii
Mobile code mining for discovery and exploits nullcongoa2013
Malicious android-applications-risks-exploitation 33578
YURY_CHEMERKIN_HackMiami_2014_Conference.pdf
Make Mobilization Work - Properly Implementing Mobile Security
Ad

Recently uploaded (20)

PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PPTX
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
PPTX
Advanced SystemCare Ultimate Crack + Portable (2025)
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
CapCut Video Editor 6.8.1 Crack for PC Latest Download (Fully Activated) 2025
PPTX
Weekly report ppt - harsh dattuprasad patel.pptx
PPTX
assetexplorer- product-overview - presentation
PDF
iTop VPN Crack Latest Version Full Key 2025
PPTX
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
PPTX
Oracle Fusion HCM Cloud Demo for Beginners
PDF
Download FL Studio Crack Latest version 2025 ?
PDF
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
Autodesk AutoCAD Crack Free Download 2025
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Tally Prime Crack Download New Version 5.1 [2025] (License Key Free
PPTX
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
Nekopoi APK 2025 free lastest update
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
Advanced SystemCare Ultimate Crack + Portable (2025)
Internet Downloader Manager (IDM) Crack 6.42 Build 41
CapCut Video Editor 6.8.1 Crack for PC Latest Download (Fully Activated) 2025
Weekly report ppt - harsh dattuprasad patel.pptx
assetexplorer- product-overview - presentation
iTop VPN Crack Latest Version Full Key 2025
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
Oracle Fusion HCM Cloud Demo for Beginners
Download FL Studio Crack Latest version 2025 ?
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Autodesk AutoCAD Crack Free Download 2025
Operating system designcfffgfgggggggvggggggggg
Tally Prime Crack Download New Version 5.1 [2025] (License Key Free
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Nekopoi APK 2025 free lastest update

Android phone identifiers and eavesdropping audio

  • 1. Android Phone Identifiers and Eavesdropping Audio 李士暄 2014/7/41
  • 2. Reference • A Study of Android Application Security. – Pennsylvania State University – William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri. • Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. – Indiana University Bloomington – Kehuan Zhang, Xiaoyong Zhou, Mehool Intwala, Apu Kapadia, XiaoFeng Wang 2
  • 3. Introduction – Phone Identifiers 3 Identifiers Desciption SIM (Subscriber Identity Module) A SIM card is a smart card that identifies the subscriber, the service provider, and the mobile phone number. PIN (personal identification number) A numeric password for SIM card that can be used to authenticate the user to the system. (Default : 0000 or 1234) IMEI (International Mobile Equipment Identity) An unique number that identifies each mobile device. It is 15 digits numbers. When a phone is reported stolen or is not type approved, the number is marked invalid. (Enter : *#06#) IMSI (International Mobile Subscriber Identity) An IMSI is a unique number that identifies user. It is also 15 digits long. Key Identification(KI) is an unique password for each IMSI. ICCID (Integrated Circuit Card Identifier) An ICCID is a unique number that identifies SIM card. It is 20 digits long number.
  • 4. Introduction • Phone identifiers are frequently leaked through plaintext requests. – Most sinks are HTTP GET or POST parameters • Phone Identifier are used as device fingerprint. – Not only phone identifers, but also other properties – OS version, device hardware , application name, platform • IMEI is tied to personally identifiable information(PII) – Include IMEI in account registration and login request. E.g. Line、Whatsapp 4William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri. Pennsylvania State University. A Study of Android Application Security
  • 5. Threats • WhatsApp Password : an inverse of your phones IMEI number with an MD5 cryptographic hash 1. Attacker develop an faked app and let user fill in their personal information in registration part. 2. Silently sends the victims IMEI number & phone number to his server in the background. 3. A hacker creates database/file with IMEI numbers with associated phone numbers. 4. A spammer buys this information from an app developer. 5
  • 6. Sequence diagram of attacker scenario for WhatsApp application 6
  • 7. Demo • App : Siminfo • <uses-permission android:name="android.permission.READ_PHONE_STATE" /> • Android.telephony.TelephonyManager • getDeviceId() // Get IMEI • getSimSerialNumber() // Get ICCID • getSubscriberId() //Get IMSI • Socket Programming 7
  • 8. Demo : Siminfo 8 1. Server 開啟,等待Client連線 2. Client輸入完資料按【submit】,透過socket方式 傳送給 IP為: 192.168.1.1 的Server 3. 同時將該手機的IMEI、ICCID、IMSI 傳給Server
  • 9. Eavesdropping Audio • A Trojan with access to the video camera or microphone can – tape a user’s phone conversations – send the recording to other parties , which enables remote surveillance – We refer to as sensory malware • Malware : Android/NickiSpy – record user telephone conversations – store them in the SD card memory 9
  • 10. Android/NickiSpy • Once the malware is installed, it requests the following permissions from the user: 10 Latest Android Malware Records Conversations By McAfee Labs on Aug 09, 2011 http://blogs.mcafee.com/mcafee-labs/latest-android-malware-records-conversations
  • 11. Android/NickiSpy • After installing the application and rebooting, the device will start the following services in the background: 11 Latest Android Malware Records Conversations By McAfee Labs on Aug 09, 2011 http://blogs.mcafee.com/mcafee-labs/latest-android-malware-records-conversations
  • 12. Android/NickiSpy • AndroidManifest.xml 12 Latest Android Malware Records Conversations By McAfee Labs on Aug 09, 2011 http://blogs.mcafee.com/mcafee-labs/latest-android-malware-records-conversations
  • 13. Android/NickiSpy • The malware drops a configuration file onto the phone. – This file has all the information the app needs including the command server and port number through which it communicates. 13 Latest Android Malware Records Conversations By McAfee Labs on Aug 09, 2011 http://blogs.mcafee.com/mcafee-labs/latest-android-malware-records-conversations
  • 14. Android/NickiSpy • The malware recorded the conversation and stored it on the compromised phone’s SD card. 14 Latest Android Malware Records Conversations By McAfee Labs on Aug 09, 2011 http://blogs.mcafee.com/mcafee-labs/latest-android-malware-records-conversations
  • 15. Android/NickiSpy • The malware also retrieves the IMEI number of the compromised mobile device – And sends that information to the mobile number “15859268161″ 15 Latest Android Malware Records Conversations By McAfee Labs on Aug 09, 2011 http://blogs.mcafee.com/mcafee-labs/latest-android-malware-records-conversations
  • 16. Demo • App: RecordAudio • <uses-permission android:name="android.permission.RECORD_AUDIO" /> • <uses-permission android:name="android.permission.INTERNET" /> • Socket Programming 16
  • 17. Demo: RecordAudio 17 1. Server開啟,等待Clinet連線 2. Client開始App後,自動連上Server(IP:192.168.1.1) 3. Server端下指令 : start(client端開始錄音) 4. Server端下指令 : stop (Client端停止錄音) 5. Client將錄音檔傳送給Server,並放在桌面上
  • 18. Comments • Android is highly dangerous!!! • Users should never install unknown or untrusted applications on their mobile devices. – Do not checked Setting > Security > unknown sources • Pay attention to those unrelated permissions that are requested when you install app. 18