Incident: Android Factory Reset Flaw Exposes Personal Data on eBay Phones

Published Date: 2014-07-08

Postmortem Analysis
Timeline 1. The software failure incident happened in May 2015. [36453]
System The software failure incident described in the news articles involved a failure in the data wiping functionality of Android phones, specifically related to the factory reset option. The system(s) that failed in this incident are: 1. Android's factory reset option [36453, 28330] 2. In-built software for performing factory reset or delete-all operations on Android phones [36453] These systems failed to effectively wipe personal data from the phones, leading to the recovery of sensitive information by third parties even after the users believed they had performed a clean wipe.
Responsible Organization 1. Android phones' factory reset and 'delete all' operations - The software failure incident was caused by the inability of Android phones' factory reset and 'delete all' operations to completely wipe personal data from the devices, leading to the recovery of sensitive information by Avast [36453, 28330].
Impacted Organization 1. Previous owners of Android smartphones who sold their devices [36453, 28330] 2. Buyers of used Android smartphones from eBay [36453, 28330] 3. Google, as the Android operating system was mentioned in the context of the software failure incident [36453]
Software Causes 1. Lack of thorough data cleansing mechanisms in Android phones, even after performing factory reset or delete-all operations [36453, 28330] 2. Ineffective factory reset option in Android phones, leaving deleted data in a recoverable state [28330]
Non-software Causes 1. Lack of awareness among users about the implications of personal data stored on smartphones [28330] 2. Inadequate understanding of the effectiveness of the factory reset option in deleting personal data from smartphones [28330] 3. Users' misconception about performing a clean wipe and factory reinstall on their phones [28330] 4. Insufficient consideration given to the amount of personal data stored on smartphones before selling or donating them [28330] 5. Limited awareness about the potential risks of selling smartphones with personal data still recoverable [28330]
Impacts 1. Personal data, including compromising photos, emails, text messages, contact names, and Google searches, were easily accessible from used Android phones even after performing factory resets or delete-all operations, leading to privacy breaches and potential identity theft [36453, 28330]. 2. The incident highlighted a significant flaw in Android phones' factory reset option, indicating that the data deletion process was not thorough enough to prevent sensitive information from being recovered by third parties [36453, 28330]. 3. The recovery of more than 40,000 photos, 250 compromising selfies, and personal information like loan applications and contact details from just 20 used smartphones demonstrated the extent of data vulnerability and the potential risks associated with selling or disposing of old devices [36453, 28330]. 4. The incident raised concerns about the lack of awareness among users regarding the security implications of personal data stored on smartphones, emphasizing the need for better data protection measures and user education [28330]. 5. Avast's findings underscored the importance of implementing stronger data wiping techniques, such as encryption, multiple factory resets, and loading dummy data, to ensure that personal information is securely erased before selling or donating devices [36453].
Preventions 1. Encrypting the device before performing a factory reset could have prevented the software failure incident [36453]. 2. Loading the phone with dummy data before performing a factory reset could have added protection against data recovery [36453]. 3. Using a more secure deletion tool, such as the one provided by Avast's Android security app, could have ensured better wiping of personal data [28330].
Fixes 1. Encrypt the device before performing a factory reset to ensure data is not easily recoverable [36453]. 2. Load the phone with dummy data after the factory reset to add an extra layer of protection [36453]. 3. Repeat the factory reset process multiple times to further secure the device [36453]. 4. Use a reliable deletion tool, such as the one provided by Avast, to ensure personal data is properly wiped from the device [28330].
References 1. Avast Software [36453, 28330] 2. eBay [36453, 28330] 3. Google [36453]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident related to data being easily recoverable from Android phones even after a factory reset has happened again at Avast. Avast discovered that Android's factory reset option leaves deleted data in a recoverable state, highlighting a flaw in the Android operating system [Article 36453]. Avast conducted a study where they purchased 20 Android smartphones from eBay and were able to recover a significant amount of personal data, including photos, emails, text messages, contacts, and even a completed loan application, despite the phones being reset by the previous owners. (b) The software failure incident of data being easily recoverable from Android phones after a factory reset has also happened at other organizations or with their products and services. The study conducted by Avast revealed a huge flaw in Android phones, indicating that this issue is not limited to a specific organization but is a broader concern for users selling their smartphones [Article 36453]. The findings suggest that mobile owners should be more thorough when selling their phones to prevent their data from being accessed, indicating a potential industry-wide problem with data security on Android devices.
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase can be seen in the articles. Avast discovered a flaw in Android phones where even after performing a factory reset or 'delete all' operation, personal data could still be easily retrieved using publicly available programs like FTK Imager [36453]. This indicates a design flaw in the Android operating system that allowed for the recovery of deleted data, highlighting a vulnerability introduced during the system development phase. (b) The software failure incident related to the operation phase is evident in the articles as well. Users were under the impression that performing a factory reset on their Android phones would completely wipe their personal data. However, it was found that the factory reset option only cleaned the phones "only at the application layer," leaving deleted data in a recoverable state [28330]. This shows that the failure was also influenced by the operation or misuse of the system by users who were not fully aware of the implications of the factory reset option.
Boundary (Internal/External) within_system (a) within_system: The software failure incident in the articles is related to the Android operating system's factory reset option not completely wiping personal data from smartphones, leading to the recovery of sensitive information by Avast using publicly available programs like FTK Imager [36453, 28330]. Avast discovered that even after performing a factory reset or delete-all operation on Android phones, vast amounts of personal data could still be retrieved, including photos, emails, text messages, contact names, and even completed loan applications. This failure originates from within the system, as it is a flaw in the Android operating system's data wiping mechanism.
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident occurring due to non-human actions: - The software failure incident in the articles was primarily due to a flaw in Android phones' factory reset option, which left deleted data in a recoverable state, allowing Avast to easily retrieve personal data from used smartphones bought on eBay [36453, 28330]. - Avast discovered that even after performing a factory reset or 'delete all' operation on the devices with in-built software, vast amounts of personal data could still be recovered using publicly available programs like FTK Imager [36453]. - The study highlighted a flaw in Android phones that allowed the recovery of more than 40,000 photos, compromising selfies, emails, text messages, contact names, and even completed loan applications from just 20 used smartphones [36453]. - Avast used off-the-shelf digital forensics tools like FTK Imager to recover SMS and Facebook chats from the Android phones, indicating a flaw in the data wiping process [28330]. (b) The software failure incident occurring due to human actions: - The failure was also attributed to human actions, as users were not fully aware of the implications of the personal data stored on their smartphones when performing a factory reset or 'clean wipe' before selling or donating the devices [28330]. - Avast's mobile division president mentioned that users believed they were performing a clean wipe and factory reinstall, but the factory reinstall only cleaned the phones at the application layer, indicating a lack of understanding or awareness among users regarding data security [28330]. - The incident highlighted the challenge of making people more aware of device security, especially when smartphones contain a significant amount of personal data that users may not fully consider when selling or disposing of their devices [28330].
Dimension (Hardware/Software) software (a) The software failure incident occurring due to hardware: - The articles do not mention any software failure incident occurring due to contributing factors originating in hardware. Therefore, there is no information available regarding a software failure incident caused by hardware issues [36453, 28330]. (b) The software failure incident occurring due to software: - The software failure incident reported in the articles is related to a flaw in Android phones' factory reset option. Avast discovered that despite performing a factory reset or 'delete all' operation on Android devices, personal data could still be easily retrieved using publicly available programs like FTK Imager. This flaw in the software allowed for the recovery of large amounts of personal data from used smartphones sold online, even after consumers believed they had deleted their data [36453, 28330].
Objective (Malicious/Non-malicious) non-malicious (a) The software failure incident reported in the articles is non-malicious. The incident involved a flaw in Android phones that allowed personal data to be easily recovered even after a factory reset or 'delete all' operation. Avast discovered that the factory reset option in Android phones did not effectively delete data, leading to compromising situations where sensitive information like photos, emails, text messages, and even identities were recovered from used smartphones purchased on eBay [36453, 28330]. The incident was not caused by malicious intent but rather by a security vulnerability in the Android operating system that allowed data to be accessed by unauthorized parties.
Intent (Poor/Accidental Decisions) poor_decisions (a) The intent of the software failure incident was poor_decisions as it was a failure due to contributing factors introduced by poor decisions. The incident involved the discovery by Avast Software of a huge flaw in Android phones where they were able to easily recover large amounts of personal data from smartphones sold online, despite consumers deleting their data. The flaw was related to the ineffectiveness of Android's factory reset option in completely wiping personal data from the devices before resale [36453, 28330].
Capability (Incompetence/Accidental) development_incompetence (a) The software failure incident in the articles can be attributed to development incompetence. The incident occurred due to a flaw in Android phones where personal data could be easily recovered even after performing a factory reset or delete-all operation. Avast, a Prague-based internet security firm, discovered this flaw and was able to retrieve a significant amount of personal data from used smartphones bought on eBay, including photos, emails, text messages, contact names, and even a completed loan application [36453, 28330]. The flaw in the Android phones was a result of the devices not completely wiping personal data as intended by the users. Despite users thinking they were performing a clean wipe and factory reinstall, the factory reset option only cleaned the phones at the application layer, leaving behind recoverable data. This highlights a lack of professional competence in ensuring that personal data is securely erased from devices before resale or disposal [28330].
Duration permanent The software failure incident described in the articles is more of a permanent nature. The incident involves a flaw in Android phones' factory reset option, which led to the failure to completely delete personal data from the devices even after performing a factory reset. This flaw allowed Avast to recover a significant amount of personal data from used smartphones purchased on eBay, including photos, emails, text messages, contact names, and even a completed loan application. The failure to completely wipe the data from the phones was a persistent issue highlighted by the research conducted by Avast [36453, 28330].
Behaviour omission, value, other (a) crash: The software failure incident described in the articles does not involve a crash where the system loses state and does not perform any of its intended functions. The incident is more related to data recovery from supposedly wiped Android phones, indicating a failure in data sanitization rather than a system crash [36453, 28330]. (b) omission: The software failure incident can be categorized under omission, where the system omits to perform its intended functions at an instance(s). In this case, the Android phones failed to completely wipe personal data even after users performed a factory reset or 'delete all' operation, leading to the omission of properly deleting sensitive information [36453, 28330]. (c) timing: The incident does not involve a timing failure where the system performs its intended functions too late or too early. The issue here is more about the completeness of data deletion rather than the timing of any specific function [36453, 28330]. (d) value: The software failure incident can be classified under the value category, where the system performs its intended functions incorrectly. In this case, the Android phones failed to properly erase personal data, leading to the incorrect assumption by users that their data was securely deleted [36453, 28330]. (e) byzantine: The incident does not exhibit a byzantine behavior where the system behaves erroneously with inconsistent responses and interactions. The issue here is more straightforward, involving the failure to completely wipe personal data from the phones [36453, 28330]. (f) other: The other behavior observed in this software failure incident is the revelation of a flaw in the data wiping process of Android phones. Despite users performing factory resets or 'delete all' operations, the phones still retained significant amounts of personal data, highlighting a critical oversight in the data sanitization process [36453, 28330].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property, theoretical_consequence (d) property: People's material goods, money, or data was impacted due to the software failure The software failure incident discussed in the articles led to a significant impact on people's property in terms of their personal data. Avast discovered a flaw in Android phones where even after performing a factory reset or 'delete all' operation, personal data could be easily retrieved from smartphones sold online [36453]. The study by Avast revealed that from just 20 used smartphones, they were able to recover more than 40,000 photos, 750 emails and text messages, 250 contact names and email addresses, and even identities of previous owners and a completed loan application [36453]. This incident highlights the risk of selling or disposing of devices without properly safeguarding personal data, which could potentially lead to identity theft, blackmail, or stalking [36453].
Domain information, finance, other (a) The software failure incident reported in the articles is related to the industry of information. The incident involved the recovery of personal data from used smartphones, including photos, emails, text messages, and other sensitive information, highlighting the risks associated with selling or disposing of devices without properly wiping the data [36453, 28330]. (h) The incident also has implications for the finance industry, as personal information such as completed loan applications and identities of previous owners were recovered from the used smartphones, raising concerns about identity theft and potential misuse of financial data [36453, 28330]. (m) Additionally, the software failure incident is relevant to the broader category of "other" industries, as it pertains to the security and privacy implications of data stored on smartphones. The incident underscores the importance of properly wiping personal data before selling or disposing of devices to prevent unauthorized access and potential misuse of sensitive information [36453, 28330].

Sources

Back to List