[Q] Can Malware install silently if I have SU installed? - Android Q&A, Help & Troubleshooting

One thing that I keep reading about android malware, is that it needs to gain root access to do its dirty work.
My android phone is already rooted and I have SuperUser (SU) installed. And whenever an app runs that needs root access (such as titanium backup), SU asks me if I want to grant root to that app.
So, my question is this - can I rest assured that I won't get infected because if for some reason malware makes it into my phone (through one of the many exploits like the MMS/Stagefright thing), I will see it try to run because SU will ask me for permission, and I can simple deny it?

Yes, Lookout security recently discovered a malware that does the exact thing you mentioned.
http://www.xda-developers.com/looko...ed-adware-that-secretly-acquires-root-access/

Related

Non-Root Apps Asking for Permission?

In the past I read a thread from someone claiming that he had
Appbrain App Market installed on his phone which is a Non-Root app the last time I checked, Well anyways he said that he was Receiving Popups from the app to Grant it Superuser Permissions.
I really Didn't think much about it until now when I Received a Popup of my own, After I Installed whatever Stupid Basketball 3D game from the Market myself...
I checked and it Wasn't a Root app, and it Didn't even show up in the Superuser app Log, even though I Didn't Grant it Permission. I just UnInstalled it as soon as I saw the Popup!
So my Question is...
What the Hells up with that? Is that some type of Virus app or some ****?
Thanx in Advance!
PMGRANDS said:
In the past I read a thread from someone claiming that he had
Appbrain App Market installed on his phone which is a Non-Root app the last time I checked, Well anyways he said that he was Receiving Popups from the app to Grant it Superuser Permissions.
I really Didn't think much about it until now when I Received a Popup of my own, After I Installed whatever Stupid Basketball 3D game from the Market myself...
I checked and it Wasn't a Root app, and it Didn't even show up in the Superuser app Log, even though I Didn't Grant it Permission. I just UnInstalled it as soon as I saw the Popup!
So my Question is...
What the Hells up with that? Is that some type of Virus app or some ****?
Thanx in Advance!
Click to expand...
Click to collapse
i'm not familiar with random apps from the market asking for superuser permission but i am familiar with the superuser app and how the permission structure/process works.
essentially, the superuser.apk file replaces your /system/bin/su binary with its own binary. the superuser custom binary, whenever any user or application executes a command using the su binary (executing a command as root) the superuser su binary redirects to the superuser application then prompting the user to accept or deny the request.
i know i have seen it is possible to spoof these requests, but it was done by a very knowledgable friend and i don't think the spoofing of superuser requests is common place or well known (might have been patched recently too).
without knowing the application's source code that requested superuser access, i personally would not trust the application unless the application stated it would need root access and performed functions which required root access. example, if the application were a game, i don't see any reason it would need superuser access.
once an application has been granted superuser access on an s-off evo 3d, it essentially has write/read access to the majority of the android partitions including the kernel, system, data, cache, etc.
from what you've described, i think you're correct in not granting an unknown application superuser access. as a developer with applications in the market, i would appreciate an email from a user who experienced such a situation and a screenshot attached would be even more helpful. might be worthwhile reaching out to the developer to confirm or ask them to explain.
thanks for posting this information. always good to know. hope some of the information i provided helps!
joeykrim said:
i'm not familiar with random apps from the market asking for superuser permission but i am familiar with the superuser app and how the permission structure/process works.
essentially, the superuser.apk file replaces your /system/bin/su binary with its own binary. the superuser custom binary, whenever any user or application executes a command using the su binary (executing a command as root) the superuser su binary redirects to the superuser application then prompting the user to accept or deny the request.
i know i have seen it is possible to spoof these requests, but it was done by a very knowledgable friend and i don't think the spoofing of superuser requests is common place or well known (might have been patched recently too).
without knowing the application's source code that requested superuser access, i personally would not trust the application unless the application stated it would need root access and performed functions which required root access. example, if the application were a game, i don't see any reason it would need superuser access.
once an application has been granted superuser access on an s-off evo 3d, it essentially has write/read access to the majority of the android partitions including the kernel, system, data, cache, etc.
from what you've described, i think you're correct in not granting an unknown application superuser access. as a developer with applications in the market, i would appreciate an email from a user who experienced such a situation and a screenshot attached would be even more helpful. might be worthwhile reaching out to the developer to confirm or ask them to explain.
thanks for posting this information. always good to know. hope some of the information i provided helps!
Click to expand...
Click to collapse
Yeah man I Never really Experienced a App Requesting Superuser Permission, that Wasn't even a Root App... Just Didn't seem right to me either... A Game Shouldn't need Root Access!!
Thanx for your Reply!
I recently had the same op-ups from Tasker. But since I had been using Tasker even before rooting, I denied the request.
Are there any more precautions we need to take with regards to this.
odyssseus said:
I recently had the same op-ups from Tasker. But since I had been using Tasker even before rooting, I denied the request.
Are there any more precautions we need to take with regards to this.
Click to expand...
Click to collapse
Great question. If anybody else has experience/knowledge feel free to chime in.
Regarding precautions, there are a few basic steps which I think we're all fairly familiar with as being general computer precautions. These are a few which come to mind:
1) Don't load software you don't trust.
2) Always thorougly check the permissions being granted to an application. Example, once you grant an application permission to load at startup, it now has the potential to always be running in the background. Potential bad situation: the application *could* be gathering user/system data and if it has network access, sending this data back.
3) Superuser provides a great basic level of security to protect root access. Without superuser, any application can execute the su binary now running with root priviledges and there will be no required notification to the end user. This could all happen in the background w/o a log, audit trail or notification to the user. Root priviledges, as I mentioned above on an S-OFF EVO 3D will give write access to /system, /data, boot (kernel), recovery, etc. This is potentially very dangerous and important to protect the su binary.
Important to realize, once an application has been granted superuser access, it has the potential to destroy the device or grab extensive system/personal information and send it out. This makes it essential to trust the application.
As with any type of security, there are always ways to bypass. Essentially, these three steps should help avoid the majority of issues.
On a brighter note, there really aren't many Android viruses or malicious applications in circulation. For the most part, people who post on XDA and android application developers/posters in the market have are trustworthy. The comments on Market applications are usually fairly helpful. Might be worth skimming thru a page or 2, maybe 3 or 4 of market comments on a suspicious application or emailing the developer.
I know as a developer I'm more than happy to explain any function or question regarding my applications, especially if it raises a security/privacy concern to a user.
Hope that helps round out some simple precautions!

[Q] How to Change the Active Root Application

So, my ROM comes preloaded with a root app that I've never heard of, and I want to use Superuser (and the Elite I paid for).
The bundled app came with a 'cleanup/uninstall' script, that I ran, that promised to remove itself and it's root-granting abilities.
Now, even though I've got Superuser (Elite) installed, apps are saying I don't have root.
How do I configure Android (or SU) to use SU as my root-granting application?
Thanks.
Fix permission by recovery! It should work

Vanilla su replacement

Hi everyone!
I'm working on a pretty convoluted project and it needs to have a working su all the time. The device is a Posh Titan HD (SoC is MTK6592) and I used RootGenius which installs the KingUser su app.
What I need is to have su work all the time, in any situation, without any hassle. Currently, KingUser su asks for permission for new apps. I also suspect that it "forgets" the given permissions after some time. Worst of all, even if the app has already been given su access ( by pressing "Always" when the dialog comes up ), when I launch shell commands that involve su, they NEED to have the app be in the foreground process (probably because it wants to show a toast but I'm not completely sure). Also, I don't like KingUser making a popup asking the user if they want to update the app.
So as I mentioned, the app I'm working on is pretty complex and not straightforward. It's a Kiosk-type app that tries to limit user interaction. We own the phones so we can even install a custom ROM on them if needed. What I would need is to have the su working anytime, without any hassle, without any user interaction. Just the possibility to execute anything and everything as root.
Do you have any idea what would be the best way to do this? Even a little help would be greatly appreciated.

How to Unroot Android Device (Samsung Galaxy Avant)

This question has probably been asked a million times before, but my circumstances are a little different. On my first attempt, I used the "unroot" option on Superuser, and it claimed my device had been cleared of root access after booting back up. However, after realizing my root apps still worked, I downloaded a root checker and confirmed my suspicion that my phone hadn't changed. Afterwards, I followed a Youtube tutorial and deleted various SU files in my system's directory, but partial root access remains. No unroot app works because Superuser can't grant full root access, and SU itself crashes upon booting when I re-download it. I've attempted re-rooting my phone so I had full root access, but that won't work either. Any suggestions?

SuperUser not asking for root access in Nox App Player

I was opening up a few apps that require root access after Nox updated to 5.0.0.1 just to find that they freeze up. So I close out these apps and try to restart them and that is when I am presented with a "Root access is required to run x" and SuperUser is not asking for root access.
Root is indeed enabled in Nox, and since SuperUser is built into Nox, there is no way to clear its data or anything. I am at a roadblock
does anybody know what the problem could be or how to fix it?
Try bluestacks or leapdroid, because there are the best android emulators for root.
nox already rooted
go to sittings and check on root and save sitting + delete super user app

Categories

Resources