Android is the most widely used mobile platform on the planet. More than 1.4 billion people use an Android smartphone or tablet every single day, and the fact that it’s open source and free for manufacturers to use is a big part of that popularity. But openness is a double-edged sword: It has led to a situation where many Android phones are not regularly updated with the latest security patches.
The specter of malware has loomed large over Android for the last few years, with researchers uncovering very high profile vulnerabilities, like Stagefright. The negative news comes so thick and fast that it can be hard to put into perspective. Just last week we reported on FalseGuide malware, which may have impacted up to 1.8 million Android users.
Going on the headlines alone, you’d be forgiven for having misgivings about Android security, but where’s the line between hyperbole and genuine risk? Is the platform really insecure?
“No, it’s not insecure. I do think we have a bit of a perception problem, but it’s very different from actual user risk,” Adrian Ludwig, director of Android Security, told Digital Trends in a recent interview. “The cryptographic work that we’ve been doing, the sandboxing that we’ve been doing, and a lot of the work to make exploitation more difficult is all coming together nicely.”
There’s little doubt that the most recent versions of Android are more secure than their predecessors, but the problem is that many Android users never feel the benefit. Looking back on 2016 in a blog post, the Android security team admitted that roughly half of the devices in use at the end of 2016 had not received an update for at least 12 months.
“Eighty-four percent of phones are not upgraded, which means most mobile devices are still at risk.”
“Up-to-date versions of Google Android can be considered secure,” Maik Morgenstern, CEO of antivirus rating organization AV-Test, told Digital Trends. “But especially in many older Android versions, more and more vulnerabilities are surfacing and many vendors don’t supply updates for their devices. Currently, over 800 vulnerabilities are known.”
If we look at the official distribution figures for Android as of April, we find that only 4.9 percent of Android devices run the latest versions, Nougat 7.0 or 7.1. That’s a disappointingly small slice of the total. Looking further back, Android 6.0 Marshmallow is running on 31.2 percent of devices, Android 5.0 or 5.1, Lollipop, is on 31 percent of devices, and a fifth of Android devices are still running Android 4.4 KitKat. Most of these devices running older versions of Android are unlikely to ever be updated.
“Eighty-four percent of phones are not upgraded, which means most mobile devices are still at risk,” Joshua J. Drake, vice president of Platform Research and Exploitation at Zimperium, told Digital Trends.
Zimperium is a mobile security company; Drake uncovered the Stagefright vulnerability back in 2015. It had the potential to give hackers control of an Android device through malicious code in an audio or video file — and up to 95 percent of devices were vulnerable to it, according to reports at the time. Drake told us that some devices are still vulnerable today.
Although the potential damage was frightening, it’s unclear what the impact on Android users was.
“Here we are a year and a half in, almost going on two years since we first found out about it, and we still don’t know that anybody’s actually affected,” Ludwig said.
But Drake disagrees.
“We know that there were targeted attacks using vulnerabilities in libstagefright and mediaserver,” he said. “We know it’s hard to prove a negative in general, and we respect Google’s efforts to better secure their platform, but without a sensor on the device, there is no way for anyone to know the risk or threat status of any device — especially a mobile one.”
The problem is that it’s not easy to tell if you have been successfully attacked. In the aftermath of the Stagefright discovery, the security firm founded the Zimperium Handset Alliance to boost communication between researchers, mobile network operators, mobile application developers, and device vendors.
“Researchers need to be encouraged to look into monthly security updates, and try to exploit those vulnerabilities, in order to promote better patching and an overall safer mobile world,” Drake said.
Google has taken some important steps to reduce security risks, putting out monthly patches and breaking down elements of Android to make it easier to push out updates. But older versions of Android have been left behind.
The Android fragmentation problem is not easily solved. Persuading carriers and manufacturers to update their Android devices has proven to be very difficult for Google. It has played directly into the opposition’s hands. Apple’s Tim Cook famously referenced a ZDNet article entitled “Android fragmentation turning devices into a toxic hellstew of vulnerabilities” on a slide at WWDC in 2014. But is iOS really that much better? And if so, why?
“There has been the impression that iOS security is superior to Android security, but that’s not necessarily the case,” Drake said.
Because Android is open-source, it’s easier for security researchers to find flaws and suggest fixes. The closed nature of iOS makes it harder for researchers to see what’s going on, he said. Morgenstern agrees with this assessment, but points to an important difference that makes malware a greater risk for Android.
“Until every update reaches all devices, we are still at risk.”
“For Android users, it is easy to install apps from any source,” explains Morgenstern. “This fact makes it easy to get malicious apps onto the device. The way other platforms handle this is much stricter, by only allowing installations from their closed markets.”
Android is a big target. With such a large user base and open-source code, it’s attractive prey for cybercriminals. AV-Test registers up to 30,000 new Android malware samples every day. That’s a frightening number, but concerned Android users can take action to dramatically reduce the risks by sticking to Google Play for apps, updating devices as soon as patches are made available, and using third-party Android security apps.
Both Drake and Morgenstern also caution against connecting to unknown networks and Wi-Fi hotspots, at least without using decent Android VPN apps.
“Our data shows that most attacks are network in nature, and they don’t discriminate between iOS, Android, or other,” Drake explains. “Once an attacker has silently intercepted and redirected your network traffic, any device is dangerously vulnerable to invasive surveillance, personalized spear fishing, platform exploit delivery, or any number of other follow-on attacks.”
Android security is improving. We can point to faster updates, device encryption, permission requests, app sandboxing to isolate apps from each other, restricted access to resources, and automatic malware scanning in the Play Store. But there’s obviously still work to be done.
“Last year we paid almost a million dollars to researchers,” Google’s Ludwig said, when asked about the importance of third-party research. But despite this research program, Drake feels more is needed.
“To improve Android security overall, it’s imperative for Google to work closer with security vendors,” he said. “Apple and other vendors have increased their cooperation, but Google has decreased it. Google’s philosophy is that they can do everything on their own, but that only damages their users and unfortunately benefits malware authors.”
Ultimately, the question of Android security may come down to the device you use. If you have a two or three-year-old phone that runs an older version of Android and hasn’t been updated in months, you have cause for concern. Owners of Google’s Pixel, by contrast, receive the latest security updates in a timely fashion, at least for the next couple of years.
It’s hard to say how long it will be before most Android devices are running Nougat, or a later version of Android, but even then the slow pace of updates from some manufacturers and carriers will remain an issue.
“Until every update reaches all devices, we are still at risk,” Morgenstern said.
You can find more useful advice on how to stay safe on your Android phone in our Android security guide.
- AMD is working on fixes for the reported Ryzenfall, MasterKey vulnerabilities
- Intel decides not to patch Spectre vulnerability for older processors
- Is your browser mining bitcoin? ‘Malvertisements’ are hijacking Google Ads
- Hackers can bypass the Windows 10 S lockdown due to security flaw
- Hackers could attack 1 million websites in a content management system flaw