Google has just announced a big-money bug-chasing competition for Android – and this one is a contest with an interesting twist.
Simply put, you do this:
- Choose one of Google’s official “over the air” Android 7 firmware releases for the Nexus 5X and 6P phones.
- Figure out a remotely exploitable sequence of bugs by which you can steal files from another app.
- Prove your exploit to Google within a one-hour “hacking window”.
- Pocket $200,000.
Once the main prize has gone, there’s another $100,000 for second place, and $50,000 to be split amongst other winners.
Stage (3) is the exciting part, and you really do need a remote exploit that relies on minimal action from the user.
When you’re ready to do battle, Google will fire up one 5X and one 6P phone on the T-mobile network in the US, and give you an email address and a phone number for each.
The only user interaction you’re allowed is to send an email or an SMS to each device; Google will read the emails or view the text messages, and that’s that.
You can put “click here for free stuff” links in your email, or ask the users to “try this fantastic app” in your SMS, but that’s not going to win you any money.
Nothing will be clicked or downloaded; no one will helpfully follow your “advice” to change critical system settings; and any dialogs or login windows that pop up will simply be ignored.
In other words, the sort of social engineering that works in the real world isn’t allowed here.
You will need a purely technical zero-day attack of the sort that well-heeled crooks, industrial spies and state-sponsored actors would love to find, where there are no obvious giveaways by which a well-informed user could avoid getting infected.
In fact, the rules explicitly say:
Entries that take an excessive amount of time to run, substantially interfere with use of the device, give clear indications of attack or are otherwise impractical may not be accepted, at our discretion.
At this point, you’re probably thinking, “How does this differ from competitions like Pwn2Own and Pwnium? Where’s the interesting twist?”
The problem with Pwn2Own-type competitions, which attract the world’s top bug-hunters because of the serious prize money on offer, is that they follow an all-or-nothing disclosure process.
These days, reliable and working remote code exploits just aren’t as easy as they used to be in the Windows XP era, where a single vulnerability in one app was often enough to let you take over a computer completely.
Thanks to defence in depth, using a combination of preventative techniques such as Data Execution Prevention (DEP), Address Space Layout Randomisation (ASLR) and sandboxing, most modern attacks actually require a series of vulnerabilities.
These security holes need to be exploited in turn to get past each protective layer and to emerge into a position of programmatic power on the device.
DEP means that when you send data to an app, such as an email client or an SMS messenger utility, the operating system treats it strictly as data. If you try to trick the app into running your data as if it were a program, you won’t get anywhere, because the operating system won’t let data be used as code.
ASLR means that handy operating system components, such as code to make network connections or launch new programs, are loaded into memory at unpredictable locations, so you can’t guess where they will be. This makes them much harder to abuse.
Sandboxes strip away the privilege of an app so that even if it misbehaves or crashes, it can’t accidentally (or deliberately!) access data or system resources belonging other apps.
As well-known hacker George Hotz famously quipped when he successfully exploited Adobe Reader XI at the 2013 Pwn2Own competition:
The first thing I did was break into the sandbox, the next thing I did was break out.
In other words, to win the big bucks in a Pwn2Own-style event, you may need to find and perfect several individually-important exploits along the way, which might take months, and then keep them all to yourself until the day of the competition.
Once you’ve won the prize, you disclose them responsibly to the relevant software vendor so they can be fixed, hopefully before any crooks figure them out.
But if you don’t win the prize, perhaps because your very last exploit in the chain fails, or if you end up pulling out of the competition because you can’t get the full attack to work reliably, you might decide to hang on to your intermediate bugs.
If the eventual winner found a different way in, your security holes might still be available for the next big-money contest, thus giving you a handy head start next time.
Google has decided on a different, less secretive, approach.
As soon as you find a bug that gets you one step closer to the prize, you have to disclose it responsibly to Google.
However, once you’ve claimed that bug, no one else can use it in their competition entry, so you retain the competitive advantage of finding it first, which is a strong incentive to disclose early, disclose often.
And Google can fix the bugs for everyone else along the way, instead of having to wait for you to do a grand reveal at the end when you claim the prize.
What to do?
Get hacking, in the positive, not the pejorative, sense of the word.
4 comments on “Google offers $200,000 for Android-busting exploit”
What’s the point of finding vulnerabilities in Android when the mobile networks take months or sometimes years to actually release the Android security updates to protect against them. I have an LG G5 on EE and it is still on the 2016-04-01 Android security patch level!
^^^^This times 1000. The only securable Android device is Google’s Nexus line. The rest are crippled by a lack of patches. My Samsung Galaxy S5, patched w/ every available patch Samsung/Verizon Wireless issues, has 110 high severity, 54 medium severity, and 3 low severity vulnerabilities unpatched, according to NowSecure (an excellent vulnerability scanning app for uncovering this sad state of affairs). Sophos and the rest of the security industry need to laser beam focus on this crisis and put heat on Samsung and the other manufacturers and wireless carriers to get them to do their part.
The cookie-cutter tablets are even worse than the phones. None of the three or four companies I’ve worked with have any intention of ever doing any maintenance fixes. Their motto seems to be “Sell it, forget it, and move on to the next one.”
The best choice in phones is to buy directly from the manufacturer, e.g., Moto, Samsung, LG, or to buy an unlocked phone from a seller who is not a carrier and provides phones with the manufacturer’s firmware. Then you can get updates as soon as the manufacturer makes them available.
If you pick a fairly popular model, you’re even covered if the manufacturer stops providing updates since you can use the fairly-easy-to-install CyanogenMod firmware. I used an original Samsung Galaxy S (the first one, before S2, S3, etc.) for six or seven years that way and only stopped because my son shamed me into getting a new phone.
Late reply (apologies) for posterity…
Issues like this are resolved by voting with our wallets. Sadly, nothing will change until enough wallets are carried by those aware of this dearth of security–and until the main market-driving mantra isn’t “you’re always going to have a phone, so you may as well get the free/discounted upgrade every two years. New New New!”