Utilizing Cloud
Utilizing Cloud
Utilizing Cloud
5498
5497
driven-by-download. They also identified malicious Schmidt et al [22] produced a detailed description
payload functionalities that include financial charges, of techniques that can be used to develop Android
privilege escalation, remote control and personal malware. These techniques take advantage of Linux
information stealing. Within the personal information applications and native operating functionality. They
collection functionality, they discussed capturing also point out the requirements needed to program a
phone numbers, SMS messages, and user account malicious application such as a hosting application
information to upload to remote servers. They did not and a trigger mechanism after installation. The
specifically discuss the capturing of images from a introduction of malware that utilizes cloud storage
mobile phone or a camera running an Android OS or further complicates investigations in an environment
storing that data in a cloud storage service. where researchers have already argued that these
To investigate malware detection, Zhou and Jiang situations are intrinsically difficult [23-25].
[20] installed Norton’s Mobile Security, Lookout These articles validate the interest in detecting
Security and Antivirus, and Trend Micro’s Mobile capability leaks, surreptitious behavior and malware
Security Personal Edition along with over 1,260 activity in mobile devices. However, there is minimal
malware samples on a Nexus One. It is interesting research or vulnerability discussion investigating the
that they determined that 1,083 of the samples were viability of implementing malware on a camera
legitimate applications that had been re-packaged to running an Android operating system that capitalizes
contain malware. Their experiment consisted of two on cloud storage service capabilities. In addition,
scanning rounds. For the first round they wait for there is no indication as to how this malware impacts
thirty seconds and then move to the next application. a mobile device investigation.
If the applications are detected to be infected by
malware the antivirus will produce an alert box 3. Methodology and experimental design
saying that there was something found. With the
completion of the first round, a second round is
This research aims to investigate the plausibility
conducted increasing the time to sixty seconds and
of developing malware for an Android Operating
only using the applications in which the malware was
System (OS) installed on a camera and utilizes the
not detected. The results show that each company
cloud for storage capture. The approach used in this
follows a different design and implementation
research utilizes a first complete pass at an iterative
process for their security software and, as a result,
implementation of a design science methodology that
produce different detection ratios. The results
follows the general activities as defined by Peffers et
indicate that some malware software is not detectable
al [26]. The high-level problem statement focuses on
by antiviruses. As the authors point out, it is plausible
the utilization of the cloud to store hijacked data.
that the malware that is not detectable is new and that
Refinement of this problem statement led to a
software companies have not yet identified a malware
more detailed design solution that focuses on the
signature in order to add it to the antivirus detection
development of malware that is designed to divert
system. They also indicate that malware is rapidly
images to a secondary cloud location without
evolving and that solutions are lagging.
notifying the user of the data transfer. The camera
Davi et al [21] discusses conceptual issues with
used in this experiment was a Samsung Galaxy
the Android OS security model. They point out that
GC100 Digital Camera running a 4.1 Jelly Bean
the Android OS security model is based on
distribution of the Android OS. The research also
application-oriented mandatory control and
uses an industry accepted toolkit to examine the
sandboxing which allow the user and developer,
camera for residual data that may alert an examiner
alike, to limit the execution rights given to an
that there is a potential issue with the software on the
application upon installation. They conducted an
device. Any tool could have been chosen for the
experiment with a specific software configuration
examination of the residual data. As a matter of
that demonstrates the possibility of implementing an
convenience, XRY (Version: 6.10.1) was used in this
escalation privileged attack. In addition, their
experiment.
configuration points out that the permissions given to
The refinement of the objectives included
an application can be increased by a malicious
investigating the OS installed on the device to
application or runtime exploitation of a legitimate
understand the basic functionality that is natively
app. The results they obtained indicate that the
available and to begin to identify potential issues that
security model can be compromised by a privileged
would hinder application development. This was
escalation attack and that sophisticated runtime
achieved by acquiring a Samsung Digital camera;
attacks present issues for this particular sandbox
inspecting the device and the documentation that
model.
5499
5498
accompanied the camera. Identifying the version of network to obtain access to the Internet. A separate
the device’s Android OS focused review efforts on computer was used to create and configure the
relevant online Android development documentation. hacker’s Dropbox cloud storage service.
The investigation into the documentation indicated The Dropbox Developer’s website was accessed
that the easiest way to hijack the image, which is to create the hacker’s application in the App Console.
being generated by the camera, is to capture and The application’s Key and Secret were then added to
dissect the intent that is created when a picture is the malware in order to start the authentication
taken. process once it starts-up on the device. The malware
The refinement stage involved validating XRY was loaded onto the camera using Eclipse JUNO. The
compatibility. In doing so, the device was reset to project (CamSurv) runs on the device as an Android
factory settings to wipe any preliminary data that application. After the automatic start-up, the hacker’s
might have been residing on the device. The set-up authentication information and Dropbox password
settings were completed, i.e., date, time and location. were inserted once the authentication page was
The developer option was selected in order to displayed.
activate the USB debugging option. The camera was The evaluation activity implemented a device and
connected to the device using the ‘Camera’ data manipulations along with examining the camera
connection in the USB connection options. This using an industry accepted forensic toolkit. Initially,
option allows for the transfer of photos using camera the malware was implemented and pictures were
software, as well as, the transfer of any files onto the taken to verify that the software was functioning
PC. Three photos were taken within the forensic properly. The device then underwent a number of
Laboratory at the University of (Removed for manipulations to test the impact of these activities on
Review). XRY was previously installed on a lab PC. the malware. For this experiment, the following states
XRY was then used to extract data from the camera. were defined and associated activities were
The preliminary examination revealed that the implemented:
camera was functioning correctly and that XRY was Active power state – In this state, the device is
able to extract data from the camera. not powered down and the application cache is
The design and development consisted of two not cleared. Multiple pictures were rapidly taken
phases. The first phase focused on the owner of the with the camera in an active power state.
camera. The camera is reset to factory settings in Standby state - The device is put into standby
order to minimize residual data that was left on the mode for two minutes. It is then taken out of
device from previous activities. The cloud storage standby mode and a picture is taken.
location was created and configured for the owner of Powered off state - The device is powered off
the account. The camera was then configured to and then powered back up again. Then pictures
connect to the University’s wireless network to gain are taken with the device.
access to the Internet. After the connection was tested Battery removal state- The battery is removed
by navigating to a Google search page, the camera and re-inserted into the device. The device is
was configured to connect to the owner’s account and powered-up and a photo is taken.
account synchronization was enabled. A number of The pictures also underwent manipulations to test
sample pictures were taken in order to test the native the impact of these activities on the malware
functionality of the camera. The pictures were functionality. In doing so, pictures were renamed and
verified by accessing the owner’s Dropbox account pictures were deleted. The photos on the device were
from a separate computer. The photos were then verified with the photos on the owners cloud and
downloaded from the Dropbox account onto a the hijacked cloud by generating and comparing hash
computer and copied from the camera using a USB values. In the event that normal hash values were
connection to the same computer. They were different, a fuzzy hashing could be used to determine
imported into FTK, hash values were generated for the percentage of the match between them.
all of the files and the results were compared. Once these manipulations had been completed, a
The second phase concentrated on the hijacking forensic analysis of the camera was conducted. The
of the camera. The solution for capturing the images camera was connected to the XRY toolkit using a lab
was developed in this phase. The camera is, again, computer. A logical extraction of the data on the
reset to factory settings in order to minimize residual camera was conducted using XRY. After the
data that was left on the device from previous extraction is completed the results are examined in
activities. The owner’s Dropbox account information detail in order to determine if the XRY can detect the
was added back to the device. The camera was malware application and the hacker’s Dropbox
reconfigured to connect to the University’s wireless account. A physical extraction of the camera was
5500
5499
conducted using XRY. After the physical extraction internet in order to upload the data to the alternative
was completed, the results were compared with the cloud. Figure 2, Manifest permissions, presents the
results from the logical extraction. permissions declared in the malware program.
It should be noted that this research is a proof of The INTERNET permission was used to gain
concept intended to investigate the development of access to the Internet in order to upload the picture to
hijacking software for a camera running Android Dropbox. The CAMERA permissions and the
version 4.1. Hence, other versions of the Android hardware camera feature were established so that the
Operating System (OS) along with other OS’s were broadcast receiver could catch the picture intent when
considered out of scope for this experiment. This it was broadcasted by the system. A quick inspection
experiment focuses on the capturing of images and of the Android manifest permission revealed that there
the data transfer of those images; not the loading of is not an obvious entry for reading internal storage
the software onto the device. [27]. Hence, the READ_EXTERNAL_STORAGE
Hence, for the purposes of this research, it is was used to detect the photo in the internal storage
assumed that the attacker will have physical access to and convert the Uniform Resource Identifier (URI) to
the camera for a few minutes to install the malicious the corresponding system path detailing the photos
software. The overall flow is presented in Figure 1, saved location.
Attack flow. For matters of convenience, Wi-Fi
connections were used for testing. The Dropbox is
the default cloud service for the device. For
simplicity, this service was utilized for the original
owner and a separate Dropbox account was set-up for
the hacker. It is presumed that seeing an additional
Dropbox account on a device will not raise
suspicions as quickly as discovering other accounts.
All other device interactions and various other cloud
storage application solutions are considered out of
scope for this experiment.
5501
5500
information from the received intent. Initially, the Figure 6 presents the code that was implemented to
broadcast receiver was not able to catch the intent. upload the image to the hacker’s Dropbox.
This was solved by adding a line of code that The Dropbox authentication process is executed
referenced the android priority. Android’s order of when the malware is installed on the device. A new
execution for synchronous messages to broadcast intent is created in the MainActivity class and the
receivers is determined by propriety values [28]. Authentication class is called by starting a new
Those with the higher values are executed first. In this activity. The Main activity path is shown in Figure 7,
case, android:priority=”999” was added in the Main activity class.
declaration of the intent filter.
5502
5501
the camera, three photos were taken to test the amount of data that it received in a very short period
owner’s configuration. Once this was completed, the of time.
malware was loaded onto the camera and ten photos
were taken to test the malware’s functionality.
The photos located on the camera are displayed
YYYYMMDD_HHMMSS.jpg and those located on
Dropbox are displayed YYYY-MM-DD
HH.MM.SS.jpg. A visual inspection of the phone’s
images, the images stored in the owner’s cloud and
the images stored in the hacker’s cloud indicated that
they were the same images. The only discernable
difference between the images on the device and the
images in the cloud is the way their names are
displayed. Although there is a difference in the names
of the photos, a hash value comparison of the images
using FTK version 5.0 confirmed that they were the
same files. The images taken by the camera and
transferred to both the owner’s account and the
hacker’s account are displayed in Figure 9, Owner’s
Dropbox, and Figure 10, Hacker’s Dropbox.
Figure 9. Owner’s Dropbox
5503
5502
Limited information regarding how the fast related URL, as well as where it was stored. The tool
power-on works or how to programmatically disable it identified that all of the applications were installed on
is available in the Android development environment. the Device. An external SD card was not used in this
With insufficient information in reference to its experiment.
functionality, it was manually disabled for the There was no indication from the tool that there
purposes of this experiment. The manual disabling was a potential issue with the software residing on the
was done during the set-up of the camera for each device. The logical extraction did find the application
phase. but there was nothing to indicate that it was
potentially malicious. The physical extraction
detected the application as well as the owner’s
account. It did not, however, report the hackers
account. It did report the permissions that were given
to the application when it was installed as displayed in
Figure 12, Physical - installed apps permissions.
It is also interesting that the physical extraction
detected the owner’s account information but did not
display any information associated with the hacker’s
Dropbox account. The information detected for the
owner’s account is displayed in Figure 13, Physical –
owner’s Dropbox account.
Figure 11. Dropbox camsurv authentication
The image manipulations did not affect any of the
Dropbox accounts. When the picture was renamed on
the device neither cloud account was affected by this
change. The same occurred with the deletion of the
picture on the camera. The manipulations that were
conducted on the pictures only affected the images on
the device because the photos had already been
transferred to both Dropbox accounts. There was no
auto-update software functionality implemented in the
default Dropbox camera software. Hence, any Figure 12. Physical - installed apps
manipulation that occurred later had no effect on permissions
either account. From an investigation perspective, it is An examination of the Web related findings did
interesting to note that there can be differences not readily reveal references to the malware camera
between the names of the artifacts on the device and application. Eleven cookies were identified that
the data stored in the owner’s cloud storage account. related to the Dropbox application and one to Google.
More importantly, the results indicate that data hastily However, there were no cookies that specifically
deleted from the device and/or, possibly, overwritten referred to the malware application. A detailed
could still be resident in the cloud storage account due analysis did reveal that the modified time on the
to the native functionality of the software. cookies was very close to the modified times of the
The last stage examined the camera from a digital photos in the hackers account.
forensic perspective. Both physical and logical data
extractions were conducted on the camera using XRY.
XRY, in total, recovered 194 Device/Installed
applications. The Device applications category
includes the system application such as the System
UI, the Android System itself, the certification
installer, the input devices, the key chain and much
more.
The applications that were actually installed on the
device included the web browser, Google Play Books,
Dropbox and the malicious application. It is worth Figure 13. Physical – owner’s Dropbox
mentioning here that the forensic tool retrieved the accounts
Package name for each application along with the
5504
5503
5. Conclusions Residual data is created by the malware on the
camera simply by installing the software on the
The impact of malware on individuals, device. However, the preliminary examination of the
corporations, governments and digital investigations device by an industry accepted mobile device forensic
is an increasingly challenging and multifaceted topic. toolkit indicates that there is minimal detection of the
Environmental complexity coupled with technical software or the connections established by the
opportunities to compromise applicants potentially malicious software. The initial results do indicate that
puts individuals and employees at risk while permission information and software installs could,
simultaneously inhibiting forensics investigations. potentially, be used as an indicator to the investigator
The results from this research demonstrates that it that there is something suspicious in reference to the
is possible to develop an Android application that software installed on the device. At the moment, the
hijacks an image produced by a 4G enabled Samsung tool provides minimal additional information to
camera. It also demonstrates that it is possible to support further conjecture.
utilize cloud storage services as a storage location for
this activity. More importantly, it raises the question 6. Future work
of the appropriateness of current forensic tool
functionality. Future research will examine the implementation
The forensic tool used in this experiment of the malware on multiple devices to attempt to
performed both a logical and a physical extraction of identify indicators that can be used by practitioners to
the camera. Neither extraction technique highlighted alert them to a potential issue with the software
to the examiner that the applicants on the device could installed on the device. Future work will build off of
be potentially malicious. Even if the analyst suspected the development of this application and focus on the
that there was something malicious on the device, use of the cloud to propagate the malware to other
they would be forced to investigate the device mobile devices. This involves the investigation of
manually or use additional tools to search for specific effectively embedding the malware into a file that is
code or applications. If it was discovered at all, this uploaded to the owner’s cloud storage service. When
would also require a manual interpretation of the code the file is downloaded by the owner for use on a
or application which increases the overall cost and the smartphone, tablet or other devices utilizing an
time commitment involved in the investigation. Android Operating system so that it will automatically
Without automated forensics tool detection, manual install and connect to a hacker’s storage service. This
discovery is tied to the ability of the analyst, which is will include investigating effective triggers for
highly variable. installation. This includes investigating the viability of
The research demonstrates that it is possible to cross-platform malware development.
develop an application that resides in the background Future work in this area forces the idea that
and transmits copies of images to a cloud storage research should focus on investigating ways to
service without visually notifying the user of the implement effective and intelligent digital forensics
device. The components of the Android operating analysis. Intelligent digital forensics needs to
system that need to be utilized to capture image data investigate the integration of improved policies,
and transfer data to an alternative cloud service standards and procedures regarding investigation
include the intents associated with the camera button, processes from the individual, the business, and the
cloud service set-up, cloud service authentication and cloud service provider perspectives. It also needs to
the image itself. More specifically, the permission investigate the amalgamation of artificial intelligence
needs to be defined in the manifest, a broadcast algorithms.
receiver needs to be instantiated, authentication to the
hacker’s Dropbox account is necessary and up-load
methods must be established.
7. References
The security restrictions that need to be identified
and circumvented to ensure appropriate access to [1] eMarketer. Worldwide Smartphone Usage to Grow 25%
in 2014. 2014; www.emarketer.com/Article/Worldwide-
necessary functionality are detailed in the manifest.
Smartphone-Usage-Grow-25-2014/1010920.
The application needs access to the camera so that it
can be notified when a picture has been taken. The [2] Gartner. Gartner Says Smartphone Sales Surpassed One
application needs access to the Internet to connect to Billion Units in 2014. 2015; www.gartner.com/newsroom.
the hacker's cloud and it needs the ability to write to
external storage.
5505
5504
[3] International Data Corporation. Press Release: Android [16] Grace, M., et al., RiskRanker: scalable and accurate
and iOS Squeeze the Competition, Swelling to 96.3% of the zero-day android malware detection, in Proceedings of the
Smartphone Operating System Market for Both 4Q14 and 10th international conference on Mobile systems,
CY14, According to IDC 2015; www.idc.com/. applications, and services. 2012, ACM: Low Wood Bay,
Lake District, UK. p. 281-294.
[4] Bit9, Pausing Google Play: More Than 100,000
Android Apps May Pose Security Risks. 2012. p. 14. [17] Grace, M., et al. Systematic Detection of Capability
Leaks in Stock {Android} Smartphones. in Proceedings of
[5] Juniper Networks Inc. Juniper Networks Mobile Threat the 19th Network and Distributed System Security
Center Third Annual Mobile Threats Report: March 2012 Symposium (NDSS). 2012. San Diego, CA, USA.
through March 2013. 2013; www.juniper.net.
[18] Huang, J., et al., AsDroid: detecting stealthy behaviors
[6] McAfee. Study Reveals Majority of Adults Share in Android applications by user interface and program
Intimate Details Via Unsecured Digital Devices. 2014; behavior contradiction, in Proceedings of the 36th
http://www.mcafee.com/us/about/news/2014/q1/20140204- International Conference on Software Engineering. 2014,
01.aspx. ACM: Hyderabad, India. p. 1036-1046.
[7] Karlsson, K.-J. and W.B. Glisson, Android Anti- [19] Dong-Jie, W., et al. DroidMat: Android Malware
forensics: Modifying CyanogenMod, in Hawaii Detection through Manifest and API Calls Tracing. in
International Conference on System Sciences (HICSS-47). Information Security (Asia JCIS), 2012 Seventh Asia Joint
2014, IEEE: Waikoloa, Hawaii Conference on. 2012.
[8] McMillan, J., W.B. Glisson, and M. Bromby, [20] Zhou, Y. and X. Jiang. Dissecting Android Malware:
Investigating the Increase in Mobile Phone Evidence in Characterization and Evolution. in Security and Privacy
Criminal Activities, in Hawaii International Conference on (SP), 2012 IEEE Symposium on. 2012.
System Sciences (HICSS-46). 2013, IEEE: Wailea, Hawaii.
[21] Davi, L., et al., Privilege Escalation Attacks on
[9] Berman, K., W.B. Glisson, and L.M. Glisson, Android, in Information Security, M. Burmester, et al.,
Investigating the Impact of Global Positioning System Editors. 2011, Springer Berlin Heidelberg. p. 346-360.
(GPS) Evidence in Court Cases, in Hawaii International
Conference on System Sciences (HICSS-48). 2015, IEEE [22] Schmidt, A.D., et al., Smartphone malware evolution
Kauai, Hawaii revisited: Android next target?, in Malicious and Unwanted
Software (MALWARE), 2009 4th International Conference
[10] Borrov, O. Lacoon Discovers Xsser mRAT, the First on. 2009. p. 1-7.
Advanced Chinese iOS Trojan. 2014;
www.lacoon.com/lacoon-discovers-xsser-mrat-first- [23] Biggs, S. and S. Vidalis. Cloud Computing: The
advanced-ios-trojan/. impact on digital forensic investigations. in Internet
Technology and Secured Transactions, 2009. ICITST 2009.
[11] National Institute of Standards and Technology. International Conference for. 2009.
National Cyber Awareness System: Vulnerability Summary
for CVE-2014-1939. http://web.nvd.nist.gov/. [24] Grispos, G., T. Storer, and W.B. Glisson, Calm Before
the Storm: The Challenges of Cloud Computing in Digital
[12] Femerling, S.R., Smartphone Apps Are Not That Forensics. 2012, IGI Global. p. 28-48.
Smart: Insecure Development Practices. 2012, Vulnex.
[25] Taylor, M., et al., Digital evidence in cloud computing
[13] Wu, D. and R.K.C. Chang, Analyzing Android systems. Computer Law & Security Review, 2010. 26(3): p.
Browser Apps for file:// Vulnerabilities, in Information 304-308.
Security Conference. 2014, SpringerLink: Hong Kong.
[26] Peffers, K., et al., A Design Science Research
[14] Zhang, X. and W. Du, Attacks on Android Clipboard, Methodology for Information Systems Research. J. Manage.
in Detection of Intrusions and Malware, and Vulnerability Inf. Syst., 2007. 24(3): p. 45-77.
Assessment, S. Dietrich, Editor. 2014, Springer
International Publishing. p. 72-91. [27] Android Developer. Manifest.permission.
http://developer.android.com/reference/android/Manifest.pe
[15] Pereira, A., M. Correia, and P. Brandão, USB rmission.html.
Connection Vulnerabilities on Android Smartphones:
Default and Vendors’ Customizations, in Communications [28] Android Developer. <intent-filter>.
and Multimedia Security, B. De Decker and A. Zúquete, http://developer.android.com/guide/topics/manifest/intent-
Editors. 2014, Springer Berlin Heidelberg. p. 19-32. filter-element.html.
5506
5505