Friday, August 16, 2013

Android World Update # Google confirms cryptographic vulnerability in Android that resulted in $5,700 Bitcoin heist

Android News, Rumours, and Updates
The latest in android news, rumours, and updates, including device news and apps! 
Learn Adobe Illustrator CS6 Master Techniques from an Adobe Guru!

With over 25 years of experience teaching, Robert Farrell has been a trusted instructor for individuals and companies who want to improve their Adobe skills.
From our sponsors
Google confirms cryptographic vulnerability in Android that resulted in $5,700 Bitcoin heist
Aug 15th 2013, 20:16, by Robert Nazarian

Bitcoin_Theft

Last week, about $5,720 of bitcoins were stolen out of a digital wallet and the reason is a weakness in Android’s Java Cryptography Architecture. Google security engineer Alex Klyubin confirmed this in a blog post earlier in the week. He also warned that other apps could be compromised unless developers change the way they access pseudo random number generators (PRNG).

“We have now determined that applications which use the Java Cryptography Architecture (JCA) for key generation, signing, or random number generation may not receive cryptographically strong values on Android devices due to improper initialization of the underlying PRNG,” he wrote. “Applications that directly invoke the system-provided OpenSSL PRNG without explicit initialization on Android are also affected.”

Recently, Symantec warned that as much as 360,000 Android apps rely on the SecureRandom, one of the programming services for generating random numbers provided by the JCA. The Android apps that were exploited in this most recent theft may have signed multiple transactions using an identical number that the apps thought were random. “Since transactions are public on the Bitcoin network, attackers scanned the transaction block chain looking for these particular transactions to retrieve the private key and transfer funds from the Bitcoin wallet without the owner's consent.”

Google recommends that developers update all apps that use JCA to “explicitly initialize the PRNG with entropy from /dev/urandom or /dev/random.” They should also regenerate any cryptographic keys or other random values that were originally generated using JCA.

source: arstechnica


Come comment on this article: Google confirms cryptographic vulnerability in Android that resulted in $5,700 Bitcoin heist

You are receiving this email because you subscribed to this feed at blogtrottr.com.

If you no longer wish to receive these emails, you can unsubscribe from this feed, or manage all your subscriptions

No comments:

Post a Comment