Skip to content

Android Hit Big Again by another Major Security Flaw called “Fake ID” ⚠️⚠️⚠️ WARNING a Malicious Malware exposes ALL Android smartphone’s Private Data, Passwords, Everything ⚠️⚠️⚠️⚠️⚠️

July 29, 2014

⚠️ A Very Serious Android operating system software problem has been discovered. This vulnerability allows malicious Apps to grab extensive Control over all Android devices without asking for any Permissions at installation.

⚠️ Code named “Fake ID” is a Very Serious Malware Infection that affects virtually Every Android phone sold since 2010.

⚠️ Fake ID, the new Android vulnerability was discovered by renowned Bluebox Security, a San Francisco based enterprise that specializes in identifying Malware (security failures and breaches) that may compromise a users smartphone and the network enterprise community.

⚠️ Bluebox Security calls this newly identified flaw “Code named Fake ID” because it allows Apps with the imbedded malware to pass undetected “fake credentials” through the “open architecture” of Android Operating System, which fails to properly verify the malicious App’s cryptographic digital-signature. Instead, Android’s Operating System grants these rogue Apps all of the access and permissions of whatever the legitimate App requires, that the Fake-ID malware mimics.

⚠️ Android is Hit Again BIG by another Major Security Flaw called “Fake ID” This is a WARNING about a Malicious Malware that exposes ALL Android smartphone’s Private Data, Bank Accounts, Cash, User’s Identification, Calendars, Contacts, Passwords, Everything…

⚠️ This Android operating system Flaw is particularly serious because Google has granted a variety of trusted apps in Android broad permissions. By pretending to be one of these trusted apps, malware can can fool users into thinking that they are installing an App that doesn’t need any special permissions.

⚠️ This Malware then tricks the operating system into giving the malicious App essentially full control of the Android device, with access to the user’s financial data, contacts, passwords, identity, calendar and virtually ALL other private information, including data stored in the Android Google cloud, or other Cloud storage.

⚠️ Google’s (GOOG) Android operating system has a serious security flaw that allows hackers to “impersonate” trusted applications that potentially hijacks your Android smartphone or tablet, according to BlueBox Security discovery.

⚠️ Android Operating System Vulnerability. The issue is the way in which Android OS does Not check, that certain applications are what they say they are, according to Bluebox Security, the company that identified the vulnerability. Hence the catchy name, “Fake ID.”

⚠️ Verifying identity and authorization are two of the most fundamental issues for any online activity. Is someone logging into a bank account the actual owner of that bank account? Is an application what it claims to be? San Francisco-based Bluebox helps companies secure their data on mobile devices. Bluebox’s staff works to research and understand the architecture of mobile operating systems that Bluebox builds onto, says Jeff Forristal, chief technology officer.

⚠️ Each Android Application has its own digital signature, an ID card in essence. Adobe Systems (ADBE), for example, has a specific signature on Android, where all App programs from Adobe have an ID that’s based on that digital-signature. Bluebox Security discovered that when an application flashes an Adobe ID, for example, Android does not check back with Adobe that it’s an authentic digital signature.

⚠️ The Big Problem. This digital-signature verification flaw, means that a “malicious actor” (Malware vulnerability) can create malware based Apps on Adobe’s signature and then infect your system with a malicious Virus. This is not an Adobe problem.

⚠️ The Malware hacker can create a malicious application that impersonates any App, including Google Wallet, or your Bank’s App and then access payment, financial data, including all your available Cash. The same malicious vulnerability applies to Android administrative software present on Android devices, allowing the Bad Guys full control of the entire Android smartphone system.

⚠️ Bluebox Security officials said it disclosed this significant flaw to Google Corporate Headquarters in May, 2014, three months ago. The company’s chief technology officer Jeff Forristal will detail how it was found and how it works in a presentation to be held at the BlackHat USA 2014, a security conference being held in Las Vegas in August 2-7, 2014.

⚠️ Android’s lack of current security is largely due to "Android Operating System Fragmentation" as more than 50% of Android users are using significantly Older OS Versions. Why…

⚠️ Android users are fearful of having their smartphones or their Apps become inoperable, even though these users are Significantly more Vulernable to Viruses, Worms, Trojans, Spyware, and Malicious Malware. Newer versions of Android have become more secure, but the user-base is not updating to the new version.

⚠️ There are over 11,800 different Android hardware devices in operation with unique versions of the Android operating system, today. Android simply cannot keep up with their Operating System vulnerabilities, nor can the Android designers convince their users to upgrade, which would protect many of them.

⚠️ This circumstance causes major issues with App Developers too, as they cannot use the most current OS version, for fear that Older OS versions will not function properly. The Android users are aware of these facts too, and know they are likely trapped with their older version of their Apps.

⚠️ Security Vulernable to Viruses, Worms, Trojans, Spyware, and Malware is Very Serious Business. These days we have more Confidential Identity information, Bank Accounts, Passwords, Emails, Test Messages, than in any other single device.

⚠️ Keeping our personal information safe and secure is extremely important, perhaps even more important than on our PC computers. Reports such as this among other safety concers are likely the reasons that Apple is spending millions of dollars and thousands of hardware-software engineering hours to protect its iPhone customers.

⚠️ Bluebox Security was founded by two industry visionaries, Caleb Sima (CEO) and Adam Ely (COO), with deep security roots and a track record of innovation and execution. Bluebox is headquartered in San Francisco and backed by $27.5 million from Andreessen Horowitz, Tenaya Capital, and Andreas Bechtolsheim.



iPhones Significantly Safer to Virus Attacks according to FBI Reports ~ iOS Prevents Vulnerabilities to Spyware, Malware, Rootkits, Trojans, Worms, and Virus Attacks as Documented by FBI and Homeland Security Reports 😎😎😎😎😎😎

🌐 iPhones Safer to Viruses with only 0.7% (70 of 1,000,000 units) being Infected. The few being infected are because the Owners did not Upgrade their iOS to the Current iOS version.

🌐 Smart Phones are Sophisticated Miniature powerful Computers. Computers need Anti-Virus add-on Software to prevent infections. Not so with Apple, as Virus Protection Algorithms are built directly into their Operating System, iOS7.

🌐 Androids are Very Vulnerable to Attack as 79% (7,900,000 Infections per 10 million units) subject to Spyware, Viruses, Trojans, Worms, Malicious Malware Attacks. Androids are over 100 times more Vulnerable to Malicious Virus Attacks

🌐 Findings according to U.S. Department of Homeland Security and FBI Reports. An abstract of this Report was declassified and displayed below.

🌐 Android smartphones (7,900,000 Infections per 10 million units) significantly more likely (than the iPhone) to be Infected by Spyware, Trojans, Worms, Malware, and Virus Attacks, as Androids have an Astonishing 79% of all SmartPhone Malware attacks.

🌐 Android Phones are More Vulnerable to Virus Attacks, According to U.S. Department of Homeland Security and FBI surveys. According to the DHS and FBI Reports, uncovered by Public Intelligence, the majority of malware targeting mobile operating systems in 2012 was intended directly at Android. Why? Because Android’s OS is more Vulnerable and has significantly less Security Capability.

🌐 iPhones are Significantly Safer (over 100 times more safe than an other Smart Phone) to Spyware, Malware, Trojans, Worms, and Virus Attacks According to FBI and Homeland Security Reports ~ Androids are over 110 times more Vulnerable to Attacks ~ FBI Reports say 79% of Androids are being Infected with Spyware, Viruses, Trojans, Worms, Malware Attacks ~ iPhones less than 1% infection rate ~ Where would You rather be ~ Safe with an iPhone or Vulnerable with an Android.

🌐 Android’s lack of security is due to "Android Operating System Fragmentation" as more than 50% of Android users are using significantly Older OS Versions. Why…

🌐 Android users are fearful of having their smartphones or their Apps become inoperable, even though these users are Significantly more Vulernable to Viruses, Worms, Trojans, Spyware, and Malicious Malware. Newer versions of Android have become more secure, but the user-base is not updating to the new version.

🌐 There are over 11,800 different Android hardware devices in operation with unique versions of the Android operating system, today. Android simply cannot keep up with their Operating System vulnerabilities, nor can the Android designers convince their users to upgrade, which would protect many of them. This circumstance major issues with App Developers too, as they cannot use the most current OS version, for fear that Older OS versions will not function properly. The Android users are aware of these facts too, and know they are likely trapped with their older version of their Apps.

🌐 Security Vulernable to Viruses, Worms, Trojans, Spyware, and Malware is Very Serious Business. These days we have more Confidential Identity information, Bank Accounts, Passwords, Emails, Test Messages, than in any other single device. Keeping our personal information safe and secure is extremely important, perhaps even more important than on our PC computers. Reports such as this among other safety concers are likely the reasons that Apple is spending millions of dollars and thousands of hardware-software engineering hours to protect its iPhone customers.

🌐 According to a survey conducted by the U.S. Department of Homeland Security and the FBI and uncovered by Public Intelligence, the majority of malware targeting mobile operating systems in 2012 was intended for Android. Indeed, Android was targeted by an astonishing 79% of all smartphone malware. The following is an excerpt from the Unclassified report from a survey conducted by the U.S. Department of Homeland Security and the FBI.

🌐 Android mobile operating system (OS) continues to be a primary target for malware attacks due to its market share and open source architecture.

🌐 Industry reporting indicates 44% of Android users are still using versions 2.3.3 through 2.3.7-known as Gingerbread, which were released in 2011, and have a significant number of security vulnerabilities that are not Fixed without later version updating. The growing use of mobile devices by federal, state, and local authorities makes it more important than ever to keep mobile Operating Systems patched and up-to-date. The following are some known security threats to mobile OS and mitigation steps.

🌐 Android was targeted by an astonishing 79% of all smartphone malware that year far more than any other OS. The agencies found that Apple’s iOS was targeted by only 70 per 1,000,000 units of malware attacks, Windows Phone, BlackBerry and Symbian OS by range between 0.3% to 19% vulnerable.

🌐 In a memo citing the research circulated nationwide to law enforcement, security and emergency personnel, the DHS and FBI note that a significant number of Android users continue to run older versions of the OS that leave them open to a number of security vulnerabilities — something companies with rival operating systems love to point out.

🌐 Recall that over 95% of Apple iOS users, about 550 million of them, have updated to the iOS6, and over 80% of iPhone users have already updated to iOS7 in the last 120 days, where iOS7 contains all the latest Anti-Virus Algorithms, protecting Security Vulernable to Viruses, Worms, Trojans, Spyware, and Malicious Malware. This is largely why Apple’s iOS has experienced less than 1% of such vulnerabilities.

🌐 Behind the Scenes, users are getting the joke that Android smartphones are simply not safe, perhaps the reason that Apple’s iPhone products are receiving Android Defections at the Rate of 26% overall.

🌐 50% of Android users recently upgrading to the iPhone 5C in the last 90 days. Therefore when one decides who should get your Net Smart Phone purchase, Apple apparently is the place to be.


Pleased you’re reading, as our readers 📚 thousands world-wide, gives motivation 📢 new topics published every day. Spread the Word 📬 to your friends, family, and associates; simply forward 📮 the link below, post it on your Facebook and Twitter Pages for their review,, anyone may subscribe, its secure, confidential, as every time 📅 I publish a story 📝 the WordPress system {not I} sends 📬 a reminder to you with a link to my new Article: https://fau4u2.wordpress.com/

Perspective: These articles are created to inform a diverse audience, whether it be photography, digital cameras, lenses, Image editing, Apps, Smartphones, iPads, iPhones, Laptops and related products, Health & Wellness, or any news-worthy topic. The purpose is to inform, from sources that are believed to be reliable, and stimulate Dialogue.

To learn more about what else we do, take a moment and visit these links, browse around. We are pleased with over 24 million visits as of Dec/2013, in recent years: http://www.416-1100.com.

If digital Imaging is of interest, I teach a course named "Principles of Digital Imaging and Post Image Processing" as an Adjunct Prof at FAU: http://www.416-1100.com/FAU-Classes/Principles-of-Digital

When I do what I do… I usually do it here.

As a "Health Nut" for Health & Wellness; http://www.Jim.Wilson.Isagenix.com

As many of my friends, family and students know, I am an avid iPad adopter since its release mid-year 2010. With Apple’s release of the Retina-Display iPad Mini, I will be changing to it soon with 128GB of Storage and Logitech’s UltraThin Keyboard Cover; however, the WiFi only model. My thought is there are so many WiFi zones available these days, investing in the $130 LTE Cellular chipset upgrade is mitigated by my iPhone 5S with its "HOT SPOT" capability. Therefore, if I have migrated into non-WiFi area, or I desire a more Secure Internet Connection, its very easy to Activate my iPhone’s Hot Spot, which serves as a mini-router, accepting up to 5 WiFi enabled devices, for internet connectivity.

Leave a Comment

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: