ZME Science
No Result
View All Result
ZME Science
No Result
View All Result
ZME Science

Home → Tech

Billions of Android Devices May Be Open to ‘Dirty Stream’ Attack

There’s nothing that users can do other than ensure they update apps as soon as possible.

Alexandra GereabyAlexandra Gerea
June 20, 2024 - Updated on June 22, 2024
in Science, Tech
A A
Edited and reviewed by Tibi Puiu
Share on FacebookShare on TwitterSubmit to Reddit
Credit: Wikimedia Commons.

Microsoft recently reported the discovery of a serious security vulnerability in popular Android applications. Dubbed the “dirty stream” attack, it involves at least four apps with more than 500 million users. The vulnerability can result in attacks such as remote code execution and token theft, depending on the app’s implementation. Here’s what you need to know.

What is a “dirty stream” attack?

A “dirty stream” attack exploits the content providers in Android apps to enable them to share files. Each app using the Android operating system has dedicated data and memory space. Android provides a “content provider” to facilitate the secure data transfer between apps.

Content providers can use intents—operational triggers—to start data queries throughout this process. They are the interface for managing an app’s data and exposing it to other installed applications on a device. 

An app that needs to share its files—or a file provider—specifies the paths other apps can use to get to the data. File providers include an “address” (identifying features) that other apps can use to find them on a system.

When the client application does not correctly handle the filename of the server application, hackers can implement a malicious app on another app on the device. The app creates an intent carrying a manipulated filename or path, tricking the client app into finding, exploiting, or replacing other data on the device. These may expose the app user to severe consequences, such as stealing tokens that enable access to the user’s accounts or sensitive data.

Validation Is Key

Microsoft believes that four billion app installations from the Google Play Store are vulnerable to the attack. It shared its findings with developers and publishers to alert them to the dangers and help them prevent it in new releases. 

Xiaomi Inc.’s File Manager product and WPS Office are among the affected vendors who have already fixed the issue. There is no advice about any vulnerability with the Amazon Prime Video app, which has over 500 million downloads on Google Play Store. However, that might not be true for all apps with the same vulnerabilities.

RelatedPosts

AI Is Rewriting the Rules of Retirement Savings
The power of ‘healing’ crystals: what they can and can’t do
The Future of Acne Scar Treatment: How Exosomes and Fractional CO2 Lasers are Changing the Game
Taking care of your teeth is also good for your heart health

The content provider-based model enables secure and well-defined file sharing with other applications. However, the problem is that many Android apps do not validate the content when it receives a file from another app. It simply takes it in good faith that the filename provided by the serving application is on the up and up.

That allows hackers to introduce a rogue app that sends files with malicious filenames directly to the file share target without the user’s knowledge. Typical targets include browsers, messaging apps, email clients, networking apps, and file editors. When a file share target receives a malicious filename, it uses it to initialize the file. That triggers a process that could compromise the app’s security.

The potential impact will vary depending on an app’s implementation. Sometimes, an attacker could use a malicious app to communicate with their server or get it to share the user’s authentication data. They could also overwrite code in an app’s native library to execute arbitrary code. Since the rogue app controls the name and content of a file, failing to validate the input can lead to the overwriting of critical files.

The Microsoft report came shortly after Google reported barring over two million apps from the Play Store in 2023. That is almost 60 percent more than in 2022. The threat landscape is intensifying, emphasizing why users must install security updates as soon as they are available. Microsoft worked with Google to create guidelines to bolster developers’ Dirty Stream defenses and mitigate their apps’ susceptibility.

What can end users do?

There’s nothing that users can do other than ensure they update apps as soon as those updates become available. They should also be cautious when downloading and installing new apps. End users should only download from trustworthy sources. Suppose they must install an app from an unfamiliar developer. In that case, they should use tools like Microsoft Defender to verify that the app they want to use doesn’t contain malicious code.

Tags: Androiddirty streamhacknorss

ShareTweetShare
Alexandra Gerea

Alexandra Gerea

Alexandra is a naturalist who is firmly in love with our planet and the environment. When she's not writing about climate or animal rights, you can usually find her doing field research or reading the latest nutritional studies.

Related Posts

Technology

AI is quietly changing how we design our work

byAlexandra Gerea
2 weeks ago
Technology

Inside the Great Firewall: China’s Relentless Battle to Control the Internet

byMihai Andrei
2 weeks ago
Economics

One in Three Americans Can’t Last a Month Without Income and the Numbers Are Worse for Women

byAlexandra Gerea
4 weeks ago
Future

How Brushless DC Motors Are Driving Growth in the Electric Vehicle Market

byAlexandra Gerea
1 month ago

Recent news

A Chemical Found in Acne Medication Might Help Humans Regrow Limbs Like Salamanders

June 11, 2025

Everyone Thought ChatGPT Used 10 Times More Energy Than Google. Turns Out That’s Not True

June 11, 2025

World’s Smallest Violin Is No Joke — It’s a Tiny Window Into the Future of Nanotechnology

June 11, 2025
  • About
  • Advertise
  • Editorial Policy
  • Privacy Policy and Terms of Use
  • How we review products
  • Contact

© 2007-2025 ZME Science - Not exactly rocket science. All Rights Reserved.

No Result
View All Result
  • Science News
  • Environment
  • Health
  • Space
  • Future
  • Features
    • Natural Sciences
    • Physics
      • Matter and Energy
      • Quantum Mechanics
      • Thermodynamics
    • Chemistry
      • Periodic Table
      • Applied Chemistry
      • Materials
      • Physical Chemistry
    • Biology
      • Anatomy
      • Biochemistry
      • Ecology
      • Genetics
      • Microbiology
      • Plants and Fungi
    • Geology and Paleontology
      • Planet Earth
      • Earth Dynamics
      • Rocks and Minerals
      • Volcanoes
      • Dinosaurs
      • Fossils
    • Animals
      • Mammals
      • Birds
      • Fish
      • Amphibians
      • Reptiles
      • Invertebrates
      • Pets
      • Conservation
      • Animal facts
    • Climate and Weather
      • Climate change
      • Weather and atmosphere
    • Health
      • Drugs
      • Diseases and Conditions
      • Human Body
      • Mind and Brain
      • Food and Nutrition
      • Wellness
    • History and Humanities
      • Anthropology
      • Archaeology
      • History
      • Economics
      • People
      • Sociology
    • Space & Astronomy
      • The Solar System
      • Sun
      • The Moon
      • Planets
      • Asteroids, meteors & comets
      • Astronomy
      • Astrophysics
      • Cosmology
      • Exoplanets & Alien Life
      • Spaceflight and Exploration
    • Technology
      • Computer Science & IT
      • Engineering
      • Inventions
      • Sustainability
      • Renewable Energy
      • Green Living
    • Culture
    • Resources
  • Videos
  • Reviews
  • About Us
    • About
    • The Team
    • Advertise
    • Contribute
    • Editorial policy
    • Privacy Policy
    • Contact

© 2007-2025 ZME Science - Not exactly rocket science. All Rights Reserved.