TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Amazon Is Downloading Apps From Google Play and Inspecting Them

310 pointsby rajbalaabout 11 years ago

33 comments

BrandonMabout 11 years ago
This seems to be the natural outcome of Amazon&#x27;s excellent customer service policy, where they have on numerous occasions[0] refunded costs for hacked instances. When they commit to that policy, they have a huge incentive to limit customer security breaches.<p>I love examples like that where a company&#x27;s policies result in incentives that are so well-aligned with those of their users. Does anyone have other good examples to share?<p>[0] <a href="https://securosis.com/blog/my-500-cloud-security-screwup" rel="nofollow">https:&#x2F;&#x2F;securosis.com&#x2F;blog&#x2F;my-500-cloud-security-screwup</a> and <a href="http://vertis.io/2013/12/17/an-update-on-my-aws-bill.html" rel="nofollow">http:&#x2F;&#x2F;vertis.io&#x2F;2013&#x2F;12&#x2F;17&#x2F;an-update-on-my-aws-bill.html</a> are two examples.
评论 #7494298 未加载
评论 #7492032 未加载
评论 #7491636 未加载
Aqueousabout 11 years ago
I don&#x27;t think they are inspecting the app ; they don&#x27;t need to. They can see that there are a higher-than-average number of API accesses from a given platform, using the AWS Secret Key as the login credential.
评论 #7491463 未加载
评论 #7491951 未加载
评论 #7491983 未加载
评论 #7491529 未加载
评论 #7492076 未加载
ch0wnabout 11 years ago
Facebook does the same thing. I got a notice about an application I published years ago in March:<p>&gt; Security Notice - Your App Secret<p>&gt; We see that your app, XYZ, is embedding the Facebook integration’s App Secret inside the Android Play Store app bundle for your app. This is a serious vulnerability that violates our published recommendations for proper login security. Someone with access to the app secret for your app can act on behalf of the app - this includes changing configurations for the app, accessing some types of information associated with people who have granted permissions to the app, and posting on behalf of those people.<p>&gt; To mitigate this sizable risk, we have reset the app secret for your app. If your app is mobile-only, this should not cause any issues. If it has a server-side component, there is a greater likelihood that it has caused some issues for your app that you will need to address. Going forward, please do not include the app secret in your app bundle, or disclose it publicly. You can read more about app secrets and how to secure your Facebook app here.
评论 #7492057 未加载
justinphabout 11 years ago
That&#x27;s actually kind of awesome. Good on Amazon for taking security seriously.
评论 #7491433 未加载
nknighthbabout 11 years ago
I understand perfectly how people end up mistakenly pushing credentials into public source repos when releasing server-side stuff. But I don&#x27;t get how a seemingly sane person develops an application intended for distribution to the public which contains AWS credentials.<p>At what point in your development process do you say &quot;I want this application, which will be distributed to unknown persons, to contain the means to control my AWS account.&quot;?
评论 #7491826 未加载
评论 #7492345 未加载
评论 #7492873 未加载
评论 #7491839 未加载
natchabout 11 years ago
Anyone who reads the article can see that the author is drawing conclusions from conjecture.<p>&quot;We were made aware&quot; does not equal &quot;we are downloading apps and inspecting them.&quot;<p>If they were doing that, that would be great! But let&#x27;s not leap to conclusions.
评论 #7492055 未加载
downandoutabout 11 years ago
I see nothing wrong here. They are probably doing this now because it in fact a major problem, even with large, professionally developed apps. About 8 months ago I did a brief analysis of the then-current Vine apk and relatively quickly extracted their S3 credentials (they were not stored in plain text, but close enough). Very bad idea.
评论 #7492047 未加载
评论 #7491987 未加载
评论 #7492175 未加载
smillikenabout 11 years ago
MixRank analyzes mobiles apps (android and ios) and we often see apps with embedded api secrets, private keys, and passwords. It&#x27;s really surprising.<p>If you&#x27;d like to send an email like this to your users, send me an email (in profile) and I can query our database and check to see if any of them are including their api keys.
评论 #7491680 未加载
immadabout 11 years ago
Couldn&#x27;t they just look at the user agent and know that the hit to their API is coming from an Android device rather than a server?
评论 #7491429 未加载
评论 #7491488 未加载
评论 #7491460 未加载
incogmindabout 11 years ago
They did a good thing, title feels slightly misguiding. Could they have figured it out based on API access locations being random?
评论 #7492069 未加载
orblivionabout 11 years ago
I wonder how they would identify a string that appears to be an API secret, and queries their database for it. For every plausible string in every app? I guess they decompile it and find string literals of the correct length?
评论 #7491455 未加载
评论 #7491385 未加载
评论 #7491420 未加载
goombasticabout 11 years ago
This is probably a good thing and also automated.
评论 #7491435 未加载
happywolfabout 11 years ago
I will think they inspect apps based on the number of hits generated to AWS.<p>The advantages of doing this are 1) showing Amazon thinks for the customers (well, also for itself) 2) proves it has pro-actively notified the customer and done its due diligence.<p>This step could serve as a solid proof in any dispute on later security issues or&#x2F;and related costs.<p>Smart, I will say.
olalondeabout 11 years ago
I&#x27;m curious why some apps need API to access to AWS. What&#x27;s the use case? Surely not to spin up an EC2 instance when the user clicks a button? Save files to S3? I&#x27;m not being sarcastic, genuinely curious. And what&#x27;s the proposed solution suggested by AWS?
评论 #7491753 未加载
评论 #7493406 未加载
评论 #7492059 未加载
catshirtabout 11 years ago
great for them. i worked for an unnamed company who was shipping AWS credentials in clients for years. worse, they were not clients that required a packaged binary (no need to decompile). it&#x27;s long since patched but i can&#x27;t believe no one ever sniffed that out.
woloskiabout 11 years ago
We wrote a blog post that shows how you can authenticate your users and get temporary security credentials from AWS based on the user tokens to avoid putting your keys on the client (both JavaScript apps in the browser or native apps). This technique is using Auth0 so you don&#x27;t have to deploy a TVM and it works with all the APIs (S3, EC2, SQS, SES, etc.). Behind the scenes what we do is generating a SAML Token based on the user JSON Web Token and exchange that for AWS Temp Credentials using AssumeRoleWithSAML AWS API.<p><a href="http://blog.auth0.com/2014/03/25/consume-aws-apis-from-the-browser-securely/" rel="nofollow">http:&#x2F;&#x2F;blog.auth0.com&#x2F;2014&#x2F;03&#x2F;25&#x2F;consume-aws-apis-from-the-b...</a>
magic_hazeabout 11 years ago
Does Google Play have a public API for downloading APKs? Does it work for paid apps as well? (I&#x27;m not able to construct good keywords for search here: Google thinks I&#x27;m looking for an APK for the store app instead)
评论 #7491678 未加载
mobiplayerabout 11 years ago
Well, this is very cool and an approach that some security companies are taking at the moment. &quot;Security outside your network&quot; they call it.<p>I&#x27;m myself working (side&#x2F;pet project so far) in something similar. I don&#x27;t have any working software at the moment but some &quot;INTEL&quot; and it is incredible how easy anyone would be able to compromise&#x2F;hurt people and companies just using available information published by themselves.<p>If anyone more technical (I&#x27;m looking at you, devs!) wants to team up to create a service like this please get in touch.
traveltonabout 11 years ago
I hope other developers see this and take action if they aren&#x27;t properly securing cloud API keys. Data access by an unauthorized party is not something you want to deal with.
jhggabout 11 years ago
I wonder if any malicious parties have been doing this as well.
评论 #7491372 未加载
评论 #7491502 未加载
jbertabout 11 years ago
I&#x27;m being dumb. I can see that it is preferable to embed credentials for a restricted IAM acct, not your root&#x2F;master AWS account.<p>But how does using a TVM improve the situation? Surely you still need to embed creds which allow the app to use the TVM? In that case, an attacker can extract <i>those</i> creds, and ask the TVM for a time-limited token any time they like.<p>How does using a TVM improve security over embedding the creds of a restricted account?
评论 #7495766 未加载
评论 #7492268 未加载
rrtwoabout 11 years ago
What are common use cases for AWS in mobile apps? (where the app needs direct connection to AWS)
评论 #7492074 未加载
salvadormrfabout 11 years ago
They also scan for Keys on github. They are proactive in terms of security!
kayooneabout 11 years ago
a free security audit of your app, pretty cool ;)
ediblenergyabout 11 years ago
Or somebody else found it and notified Amazon.
3327about 11 years ago
Was your source obfuscated?
评论 #7491605 未加载
bborudabout 11 years ago
Kudos to Amazon.
hoboerectusabout 11 years ago
So am I.
Fasebookabout 11 years ago
Ultimately, Web Identity Federation or Federated Identity is the only way to secure apps in walled gardens, which means aligning yourself with a virtual land Barron. I, for one, welcome our new fiefdom overlords. Everything else is just pushing new credentials through temp credentials and obfuscating it with protocol complexity.
snapclassabout 11 years ago
Go on you Amazon.
dalek2point3about 11 years ago
is decompiling an app legal? does it not break someone&#x27;s terms of service?
评论 #7494022 未加载
评论 #7493591 未加载
iancarrollabout 11 years ago
One of the things that justifies the higher prices.<p>+1
alttababout 11 years ago
Conjecture, and I guess you&#x27;re welcome? My guess is if you embedded your Google cloud credentials in your app and it was compromised Google would be happy to bill you, terminate your account, or otherwise provide zero latitude as a customer. At least they dropped their prices, right?