{"id":3288,"date":"2019-06-18T10:24:24","date_gmt":"2019-06-18T07:24:24","guid":{"rendered":"https:\/\/blog.eset.ee\/?p=3288"},"modified":"2019-12-09T12:33:53","modified_gmt":"2019-12-09T10:33:53","slug":"malware-sidesteps-google-permissions-policy-with-new-2fa-bypass-technique","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2019\/06\/18\/malware-sidesteps-google-permissions-policy-with-new-2fa-bypass-technique\/","title":{"rendered":"Malware sidesteps Google permissions policy with new 2FA bypass technique"},"content":{"rendered":"\n<p>When Google&nbsp;<a href=\"https:\/\/support.google.com\/googleplay\/android-developer\/answer\/9047303\" target=\"_blank\" rel=\"noreferrer noopener\">restricted the use<\/a>&nbsp;of SMS and Call Log permissions in Android apps in March 2019, one of the positive effects was that credential-stealing apps lost the option to abuse these permissions for bypassing SMS-based two-factor authentication (2FA) mechanisms.<\/p>\n\n\n\n<p>We have now discovered malicious apps capable of accessing one-time passwords (OTPs) in SMS 2FA messages without using SMS permissions, circumventing Google\u2019s recent restrictions. As a bonus, this technique also works to obtain OTPs from some email-based 2FA systems.<\/p>\n\n\n\n<p>The apps impersonate the Turkish cryptocurrency exchange BtcTurk and phish for login credentials to the service. Instead of intercepting SMS messages to bypass 2FA protection on users\u2019 accounts and transactions, these malicious apps take the OTP from notifications appearing on the compromised device\u2019s display. Besides reading the 2FA notifications, the apps can also dismiss them to prevent victims from noticing fraudulent transactions happening.<\/p>\n\n\n\n<p>The malware, all forms of which are detected by ESET products as Android\/FakeApp.KP, is the first known to sidestep the new SMS permission restrictions.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">The malicious apps<\/h1>\n\n\n\n<p>The first of the malicious apps we analyzed was uploaded to Google Play on June 7, 2019 as \u201cBTCTurk Pro Beta\u201d under the developer name \u201cBTCTurk Pro Beta\u201d. It was installed by more than 50&nbsp;users before being reported by ESET to Google\u2019s security teams.&nbsp;<a href=\"https:\/\/www.btcturk.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">BtcTurk<\/a>&nbsp;is a Turkish cryptocurrency exchange; its&nbsp;<a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.btcturk\" target=\"_blank\" rel=\"noreferrer noopener\">official mobile app<\/a>&nbsp;is linked on the exchange\u2019s website and only available to users in Turkey.<\/p>\n\n\n\n<p>The second app was uploaded on June 11, 2019 as \u201cBtcTurk Pro Beta\u201d under the developer name \u201cBtSoft\u201d. Although the two apps use a very similar guise, they appear to be the work of different attackers. We reported the app on June 12, 2019 when it had been installed by fewer than 50&nbsp;users.<\/p>\n\n\n\n<p>After this second app was removed, the same attackers uploaded another app with identical functionality, this time named \u201cBTCTURK PRO\u201d and using the same developer name, icon and screenshots. We reported the app on June 13, 2019.<\/p>\n\n\n\n<p>Figure 1 shows the first two malicious apps as they appeared on Google Play.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/06\/Figure1-WM.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/06\/Figure1-WM-1024x556.png\" alt=\"\" class=\"wp-image-126812\"\/><\/a><\/figure>\n\n\n\n<p><em>Figure 1. The fake BtcTurk apps on Google Play<\/em><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">The novel 2FA bypass technique<\/h1>\n\n\n\n<p>After installation, both apps described in the previous section follow a similar procedure. In this section of the blogpost, we will describe the novel 2FA bypass technique using the first app, \u201cBTCTurk Pro Beta\u201d, as an example.<\/p>\n\n\n\n<p>After the app is launched, it requests a permission named&nbsp;<em>Notification access<\/em>, as shown in Figure&nbsp;2. This permission allows the app to read the notifications displayed by other apps installed on the device, dismiss those notifications, or click buttons they contain.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/06\/Figure2-WM.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/06\/Figure2-WM-574x1024.png\" alt=\"\" class=\"wp-image-126813\"\/><\/a><\/figure>\n\n\n\n<p><em>Figure 2. The fake app requesting Notification access<\/em><\/p>\n\n\n\n<p>The&nbsp;<em>Notification access<\/em>&nbsp;permission was introduced in Android version 4.3 (Jelly Bean), meaning&nbsp;<a href=\"https:\/\/developer.android.com\/about\/dashboards\" target=\"_blank\" rel=\"noreferrer noopener\">almost all active Android devices<\/a>&nbsp;are susceptible to this new technique. Both fake BtcTurk apps require Android version 5.0 (KitKat) or higher to run; thus they could affect around 90% of Android devices.<\/p>\n\n\n\n<p>Once the user grants this permission, the app displays a fake login form requesting credentials for BtcTurk, as shown in Figure 3.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/06\/Figure3-WM.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/06\/Figure3-WM-572x1024.png\" alt=\"\" class=\"wp-image-126814\"\/><\/a><\/figure>\n\n\n\n<p><em>Figure 3. The fake login form displayed by the malicious app<\/em><\/p>\n\n\n\n<p>After credentials are entered, a fake error message in Turkish is displayed, as seen in Figure 4. The English translation of the message is:&nbsp;<em>\u201c<\/em><em>Opss! Due to the change made in the SMS Verification system, we are temporarily unable to service our mobile application. After the maintenance work, you will be notified via the application. Thank you for your understanding<\/em><em>.\u201d<\/em><\/p>\n\n\n\n<p>In the background, the entered credentials are sent to the attacker\u2019s server.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/06\/Figure4-WM.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/06\/Figure4-WM-573x1024.png\" alt=\"\" class=\"wp-image-126815\"\/><\/a><\/figure>\n\n\n\n<p><em>Figure 4. The fake error message displayed by the malicious app<\/em><\/p>\n\n\n\n<p>Thanks to the&nbsp;<em>Notification access<\/em>&nbsp;permission, the malicious app can read notifications coming from other apps, including SMS and email apps. The app has filters in place to target only notifications from apps whose names contain the keywords \u201c<em>gm, yandex, mail, k9, outlook, sms, messaging\u201d,&nbsp;<\/em>as seen in Figure 5.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/06\/Figure-5-WM.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/06\/Figure-5-WM.png\" alt=\"\" class=\"wp-image-126817\"\/><\/a><\/figure>\n\n\n\n<p><em>Figure 5. Targeted app names and types<\/em><\/p>\n\n\n\n<p>The displayed content of all notifications from the targeted apps is sent to the attacker\u2019s server. The content can be accessed by the attackers regardless of the&nbsp;<a href=\"https:\/\/support.google.com\/android\/answer\/9079661?hl=en\" target=\"_blank\" rel=\"noreferrer noopener\">settings<\/a>&nbsp;the victim uses for displaying notifications on the lock screen. The attackers behind this app can also dismiss incoming notifications and set the device\u2019s ringer mode to silent, which can prevent victims from noticing fraudulent transactions happening.<\/p>\n\n\n\n<p>As for effectiveness in bypassing 2FA, the technique does have its limitations \u2013 attackers can only access the text that fits the notification\u2019s text field, and thus, it is not guaranteed it will include the OTP. The targeted app names show us that both SMS and email 2FA are of interest to the attackers behind this malware. In SMS 2FA, the messages are generally short, and OTPs are likely to fit in the notification message. However, in email 2FA, message length and format are much more varied, potentially impacting the attacker\u2019s access to the OTP.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">A fast-evolving technique<\/h1>\n\n\n\n<p>Just last week, we analyzed a malicious app impersonating the Turkish cryptocurrency exchange&nbsp;<a href=\"https:\/\/koineks.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Koineks<\/a>&nbsp;(kudos to&nbsp;<em>@DjoNn35&nbsp;<\/em>for bringing that app to our attention). It is of interest that the fake Koineks app uses the same malicious technique to bypass SMS and email-based 2FA but lacks the ability to dismiss and silence notifications.<\/p>\n\n\n\n<p>According to our analysis, it was created by the same attacker as the \u201cBTCTurk Pro Beta\u201d app analyzed in this blogpost. This shows that attackers are currently working on tuning this technique to achieve the \u201cnext best\u201d results to stealing SMS messages.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/06\/Figure5-WM.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/06\/Figure5-WM-1024x715.png\" alt=\"\" class=\"wp-image-126816\"\/><\/a><\/figure>\n\n\n\n<p><em>Figure 6. Information about the fake Koineks app on Google Play<\/em><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">How to stay safe<\/h1>\n\n\n\n<p>If you suspect that you have installed and used one of these malicious apps, we advise you to uninstall it immediately. Check your accounts for suspicious activity and change your passwords.<\/p>\n\n\n\n<p>Last month,&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2019\/05\/23\/fake-cryptocurrency-apps-google-play-bitcoin\/\" target=\"_blank\" rel=\"noreferrer noopener\">we warned<\/a>&nbsp;about the growing price of bitcoin giving rise to a new wave of cryptocurrency malware on Google Play. This latest discovery shows that crooks are actively searching for methods of circumventing security measures to increase their chances of profiting from the development.<\/p>\n\n\n\n<p>To stay safe from this new technique, and financial Android malware in general:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Only trust cryptocurrency-related and other finance apps if they are linked from the official website of the service<\/li><li>Only enter your sensitive information into online forms if you are certain of their security and legitimacy<\/li><li>Keep your device updated<\/li><li>Use a reputable mobile security solution to block and remove threats; ESET systems detect and block these malicious apps as Android\/FakeApp.KP<\/li><li>Whenever possible, use software-based or hardware token one-time password (OTP) generators instead of SMS or email<\/li><li>Only use apps you consider trustworthy, and even then: only allow&nbsp;<em>Notification access<\/em>&nbsp;to those that have a legitimate reason for requesting it<\/li><\/ul>\n\n\n\n<h1 class=\"wp-block-heading\">Indicators of Compromise (IoCs)<\/h1>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"\"><thead><tr><th><strong>Package name<\/strong><\/th><th><strong>Hash<\/strong><\/th><th><strong>ESET detection name<\/strong><\/th><\/tr><\/thead><tbody><tr><td>btcturk.pro.beta<\/td><td>8C93CF8859E3ED350B7C8722E4A8F9A3<\/td><td>Android\/FakeApp.KP<\/td><\/tr><tr><td>com.app.btsoft.app<\/td><td>843368F274898B9EF9CD3E952EEB16C4<\/td><td>Android\/FakeApp.KP<\/td><\/tr><tr><td>com.app.elipticsoft.app<\/td><td>336CE9CDF788228A71A3757558FAA012<\/td><td>Android\/FakeApp.KP<\/td><\/tr><tr><td>com.koinks.mobilpro<\/td><td>4C0B9A665A5A1F5DCCB67CC7EC18DA54<\/td><td>Android\/FakeApp.KP<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h1 class=\"wp-block-heading\">MITRE ATT&amp;CK<\/h1>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"\"><thead><tr><th><strong>Tactic<\/strong><\/th><th><strong>ID<\/strong><\/th><th><strong>Name<\/strong><\/th><th><strong>Description<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Initial Access<\/td><td><a href=\"https:\/\/attack.mitre.org\/techniques\/T1475\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1475<\/a><\/td><td>Deliver Malicious App via Authorized App Store<\/td><td>The malware impersonates legitimate services on Google Play.<\/td><\/tr><tr><td>Credential Access<\/td><td><a href=\"https:\/\/attack.mitre.org\/techniques\/T1411\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1411<\/a><\/td><td>User Interface Spoofing<\/td><td>The malware displays phishing activity and requests users to log in.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Source: <a href=\"https:\/\/www.welivesecurity.com\/2019\/06\/17\/malware-google-permissions-2fa-bypass\/\">Welivesecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When Google&nbsp;restricted the use&nbsp;of SMS and Call Log permissions in Android apps in March 2019, one of the positive effects was that credential-stealing apps lost the option to abuse these permissions for bypassing SMS-based two-factor authentication (2FA) mechanisms. We have now discovered malicious apps capable of accessing one-time passwords (OTPs) in SMS 2FA messages without<\/p>\n","protected":false},"author":5,"featured_media":3291,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[160],"tags":[349,350,351],"class_list":["post-3288","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware","tag-2fa","tag-malware","tag-mitre"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Malware sidesteps Google permissions policy with new 2FA bypass technique - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2019\/06\/18\/malware-sidesteps-google-permissions-policy-with-new-2fa-bypass-technique\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malware sidesteps Google permissions policy with new 2FA bypass technique\" \/>\n<meta property=\"og:description\" content=\"When Google&nbsp;restricted the use&nbsp;of SMS and Call Log permissions in Android apps in March 2019, one of the positive effects was that credential-stealing apps lost the option to abuse these permissions for bypassing SMS-based two-factor authentication (2FA) mechanisms. We have now discovered malicious apps capable of accessing one-time passwords (OTPs) in SMS 2FA messages without\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2019\/06\/18\/malware-sidesteps-google-permissions-policy-with-new-2fa-bypass-technique\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-18T07:24:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-09T10:33:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/06\/mobile.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/06\\\/18\\\/malware-sidesteps-google-permissions-policy-with-new-2fa-bypass-technique\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/06\\\/18\\\/malware-sidesteps-google-permissions-policy-with-new-2fa-bypass-technique\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"Malware sidesteps Google permissions policy with new 2FA bypass technique\",\"datePublished\":\"2019-06-18T07:24:24+00:00\",\"dateModified\":\"2019-12-09T10:33:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/06\\\/18\\\/malware-sidesteps-google-permissions-policy-with-new-2fa-bypass-technique\\\/\"},\"wordCount\":1262,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/06\\\/18\\\/malware-sidesteps-google-permissions-policy-with-new-2fa-bypass-technique\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/mobile.jpg\",\"keywords\":[\"2fa\",\"malware\",\"mitre\"],\"articleSection\":[\"malware\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2019\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/06\\\/18\\\/malware-sidesteps-google-permissions-policy-with-new-2fa-bypass-technique\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/06\\\/18\\\/malware-sidesteps-google-permissions-policy-with-new-2fa-bypass-technique\\\/\",\"name\":\"Malware sidesteps Google permissions policy with new 2FA bypass technique - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/06\\\/18\\\/malware-sidesteps-google-permissions-policy-with-new-2fa-bypass-technique\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/06\\\/18\\\/malware-sidesteps-google-permissions-policy-with-new-2fa-bypass-technique\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/mobile.jpg\",\"datePublished\":\"2019-06-18T07:24:24+00:00\",\"dateModified\":\"2019-12-09T10:33:53+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/06\\\/18\\\/malware-sidesteps-google-permissions-policy-with-new-2fa-bypass-technique\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/06\\\/18\\\/malware-sidesteps-google-permissions-policy-with-new-2fa-bypass-technique\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/06\\\/18\\\/malware-sidesteps-google-permissions-policy-with-new-2fa-bypass-technique\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/mobile.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/mobile.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/06\\\/18\\\/malware-sidesteps-google-permissions-policy-with-new-2fa-bypass-technique\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware sidesteps Google permissions policy with new 2FA bypass technique\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/06\\\/18\\\/malware-sidesteps-google-permissions-policy-with-new-2fa-bypass-technique\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Malware sidesteps Google permissions policy with new 2FA bypass technique - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2019\/06\/18\/malware-sidesteps-google-permissions-policy-with-new-2fa-bypass-technique\/","og_locale":"en_US","og_type":"article","og_title":"Malware sidesteps Google permissions policy with new 2FA bypass technique","og_description":"When Google&nbsp;restricted the use&nbsp;of SMS and Call Log permissions in Android apps in March 2019, one of the positive effects was that credential-stealing apps lost the option to abuse these permissions for bypassing SMS-based two-factor authentication (2FA) mechanisms. We have now discovered malicious apps capable of accessing one-time passwords (OTPs) in SMS 2FA messages without","og_url":"https:\/\/blog.eset.ee\/et\/en\/2019\/06\/18\/malware-sidesteps-google-permissions-policy-with-new-2fa-bypass-technique\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2019-06-18T07:24:24+00:00","article_modified_time":"2019-12-09T10:33:53+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/06\/mobile.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/06\/18\/malware-sidesteps-google-permissions-policy-with-new-2fa-bypass-technique\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/06\/18\/malware-sidesteps-google-permissions-policy-with-new-2fa-bypass-technique\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"Malware sidesteps Google permissions policy with new 2FA bypass technique","datePublished":"2019-06-18T07:24:24+00:00","dateModified":"2019-12-09T10:33:53+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/06\/18\/malware-sidesteps-google-permissions-policy-with-new-2fa-bypass-technique\/"},"wordCount":1262,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/06\/18\/malware-sidesteps-google-permissions-policy-with-new-2fa-bypass-technique\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/06\/mobile.jpg","keywords":["2fa","malware","mitre"],"articleSection":["malware"],"inLanguage":"en-US","copyrightYear":"2019","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/06\/18\/malware-sidesteps-google-permissions-policy-with-new-2fa-bypass-technique\/","url":"https:\/\/blog.eset.ee\/et\/en\/2019\/06\/18\/malware-sidesteps-google-permissions-policy-with-new-2fa-bypass-technique\/","name":"Malware sidesteps Google permissions policy with new 2FA bypass technique - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/06\/18\/malware-sidesteps-google-permissions-policy-with-new-2fa-bypass-technique\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/06\/18\/malware-sidesteps-google-permissions-policy-with-new-2fa-bypass-technique\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/06\/mobile.jpg","datePublished":"2019-06-18T07:24:24+00:00","dateModified":"2019-12-09T10:33:53+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/06\/18\/malware-sidesteps-google-permissions-policy-with-new-2fa-bypass-technique\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2019\/06\/18\/malware-sidesteps-google-permissions-policy-with-new-2fa-bypass-technique\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/06\/18\/malware-sidesteps-google-permissions-policy-with-new-2fa-bypass-technique\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/06\/mobile.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/06\/mobile.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/06\/18\/malware-sidesteps-google-permissions-policy-with-new-2fa-bypass-technique\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"Malware sidesteps Google permissions policy with new 2FA bypass technique"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/06\/18\/malware-sidesteps-google-permissions-policy-with-new-2fa-bypass-technique\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/3288","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=3288"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/3288\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/3291"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=3288"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=3288"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=3288"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}