Incident: Android Phones Vulnerable to DRAMMER Attack: Data Compromise Risk

Published Date: 2016-10-23

Postmortem Analysis
Timeline 1. The software failure incident of the DRAMMER attack on Android phones happened in 2016. [48804]
System 1. Android phones [48804]
Responsible Organization 1. Researchers in the VUSec Lab at Vrije Universiteit Amsterdam [48804] 2. Google (to address the vulnerability with a patch) [48804]
Impacted Organization 1. Android phones users were impacted by the software failure incident described in the article [48804].
Software Causes 1. The software vulnerability exploited in the incident was related to manipulating the physical properties of hardware, specifically targeting a phone's dynamic random access memory (DRAM) using an attack called Rowhammer [48804].
Non-software Causes 1. Manipulating the physical properties of hardware, specifically targeting a phone's dynamic random access memory using an attack called Rowhammer [48804].
Impacts 1. The software failure incident known as the DRAMMER attack on Android phones had the potential to place all data on an Android phone at risk, as it allowed attackers to take control of the device [48804].
Preventions 1. Regular security updates and patches: Continuous monitoring and updating of software to address vulnerabilities like the Rowhammer attack could have prevented this incident [48804]. 2. Enhanced memory chip resilience: Developing memory chips that are more resilient to attacks like Rowhammer could have mitigated the risk of data exposure on Android phones [48804]. 3. Improved app permissions and access control: Implementing stricter controls on app permissions and access to dynamic random access memory (DRAM) could have made it more difficult for malicious apps to exploit vulnerabilities [48804].
Fixes 1. Google has a patch coming in its next security bulletin that will make the attack much harder to execute [48804].
References 1. Researchers at Vrije Universiteit Amsterdam's VUSec Lab [48804] 2. Google [48804] 3. Researcher Cristiano Giuffrida [48804]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident related to the DRAMMER attack on Android phones has happened again within the same organization, specifically with the researchers in Amsterdam. The group had previously worked on Rowhammer attacks and had shown they could target data stored in the cloud. This incident marks the first time anyone had used the Rowhammer attack on a mobile device, specifically targeting Android phones [48804]. (b) The software failure incident related to the DRAMMER attack on Android phones has the potential to impact multiple organizations or platforms beyond just mobile phones. The researchers involved in the attack mentioned that the design of the attack is very general and could potentially apply not just on mobile platforms but also in the cloud and even in the browser on desktop computers. This indicates that the impact of this attack could be much broader than just mobile phones, potentially affecting various commodity platforms [48804].
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase is evident in the article. The vulnerability identified by researchers in Amsterdam targets a phone's dynamic random access memory using an attack called Rowhammer. This attack manipulates the physical properties of hardware, posing a digital threat that cannot be patched with software alone. The attack involves executing a program that repeatedly accesses the same "row" of transistors on a memory chip, causing a bit to "flip" and altering data, creating a foothold for gaining control over the device [48804]. (b) The software failure incident related to the operation phase is also highlighted in the article. The DRAMMER attack starts with a victim downloading a seemingly innocuous app laced with malware to execute the hack. Once the victim downloads the malicious app, DRAMMER can take over a phone within minutes or even seconds and runs without any indication. The victim can interact with the sham app, switch to other apps, and even put the phone in "sleep" mode, and the attack continues running [48804].
Boundary (Internal/External) within_system The software failure incident described in the article is primarily within_system. The vulnerability exploited by the DRAMMER attack targets a phone's dynamic random access memory (DRAM) using an attack called Rowhammer, which involves manipulating the physical properties of hardware to gain control of Android phones [48804]. The attack takes advantage of a flaw within the system's memory allocation mechanism (ION memory allocator) to access and manipulate the DRAM, ultimately leading to gaining root access and full control of the handset [48804]. The attack does not rely on external factors but rather on exploiting vulnerabilities inherent within the Android operating system and the memory management system.
Nature (Human/Non-human) non-human_actions (a) The software failure incident in the article is related to non-human actions. The vulnerability exploited by the researchers in Amsterdam, known as the DRAMMER attack, targets a phone's dynamic random access memory using an attack called Rowhammer. This attack manipulates the physical properties of hardware, specifically the memory chip, to cause bit flips and gain control of Android phones. The attack is not introduced by human actions but rather takes advantage of a vulnerability in the hardware that can't be patched with software alone [48804].
Dimension (Hardware/Software) hardware, software (a) The software failure incident in the articles is related to hardware vulnerabilities. Researchers in Amsterdam demonstrated a hack targeting Android phones by manipulating the physical properties of hardware, specifically the phone's dynamic random access memory (DRAM) using an attack called Rowhammer. This hardware vulnerability allows attackers to take control of Android phones by causing bit flips in the memory chips [Article 48804]. (b) The software failure incident is also related to software vulnerabilities. The attack, known as DRAMMER, exploits a vulnerability in the Android operating system that allows attackers to gain root access to the handset, manipulate data, and take control of the device. The software features DRAMMER exploits are fundamental to the operating system, making it difficult to remove or alter without impacting the user experience. Google is working on a patch to address this software vulnerability, but fixing it in existing phones is challenging [Article 48804].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident described in the article is malicious in nature. Researchers in Amsterdam demonstrated a hack called DRAMMER attack that targets Android phones' dynamic random access memory using an attack called Rowhammer. The attack involves manipulating the physical properties of hardware to gain control of Android phones, potentially putting all data on the device at risk. The attack is executed by downloading a seemingly innocuous app laced with malware to execute the hack, allowing the attackers to achieve root access and full control of the handset [48804]. (b) The software failure incident is non-malicious in the sense that it is not caused by unintentional factors. The attack was carefully planned and executed by the researchers to demonstrate the vulnerability of Android phones to such attacks. The researchers intentionally developed the attack and used specific techniques to exploit the vulnerability in the hardware, showcasing the potential risks associated with such vulnerabilities [48804].
Intent (Poor/Accidental Decisions) (a) The intent of the software failure incident was not due to poor decisions but rather a sophisticated attack that exploited a vulnerability in Android phones' dynamic random access memory (DRAM) using the Rowhammer attack technique. The researchers in Amsterdam demonstrated how this type of hack could allow them to take control of Android phones by manipulating the physical properties of hardware, specifically targeting the DRAM to flip bits and gain control over the device [48804]. This incident was not a result of poor decisions but rather a well-thought-out and executed attack by the researchers to showcase a potential security threat.
Capability (Incompetence/Accidental) accidental (a) The software failure incident related to development incompetence is not explicitly mentioned in the provided article. Therefore, it is unknown if the incident was due to contributing factors introduced due to lack of professional competence by humans or the development organization. (b) The software failure incident related to an accidental factor is evident in the article. The vulnerability identified by researchers in Amsterdam, known as the DRAMMER attack, targeted a phone's dynamic random access memory using an attack called Rowhammer. This attack was demonstrated on Android phones for the first time, showing how manipulating the physical properties of hardware can pose a digital threat that cannot be patched with software alone [48804].
Duration permanent (a) The software failure incident described in the article is more of a permanent nature. The vulnerability identified by the researchers in Amsterdam, known as the DRAMMER attack, targets a phone's dynamic random access memory (DRAM) using an attack called Rowhammer. This attack potentially places all data on an Android phone at risk and is not easily patchable with software alone. The article mentions that even though Google is working on a patch to make the attack harder to execute, it is challenging to fix in existing phones, as some of the software features DRAMMER exploits are fundamental to the operating system and difficult to remove without impacting the user experience [48804].
Behaviour other (a) crash: The software failure incident described in the article is not related to a crash where the system loses state and does not perform any of its intended functions. The incident involves a security vulnerability in Android phones that allows attackers to take control of the device by manipulating the physical properties of hardware [48804]. (b) omission: The software failure incident is not related to a failure due to the system omitting to perform its intended functions at an instance(s). Instead, it involves a security vulnerability that allows attackers to exploit the dynamic random access memory (DRAM) of Android phones to gain control of the device [48804]. (c) timing: The software failure incident is not related to a failure due to the system performing its intended functions correctly but too late or too early. It is focused on a security vulnerability that can be exploited to take control of Android phones by manipulating the physical properties of hardware [48804]. (d) value: The software failure incident is not related to a failure due to the system performing its intended functions incorrectly. It is centered around a security vulnerability that allows attackers to manipulate the DRAM of Android phones to gain control of the device [48804]. (e) byzantine: The software failure incident is not related to a failure due to the system behaving erroneously with inconsistent responses and interactions. It is about a security vulnerability in Android phones that can be exploited to take control of the device by manipulating the physical properties of hardware [48804]. (f) other: The behavior of the software failure incident can be categorized as a security vulnerability that allows attackers to exploit the physical properties of hardware, specifically the DRAM, to gain control of Android phones. This vulnerability poses a significant threat to the security and privacy of users' data on the affected devices [48804].

IoT System Layer

Layer Option Rationale
Perception embedded_software The software failure incident described in the article is related to the embedded software layer of the cyber physical system. The vulnerability exploited by the DRAMMER attack targets a phone's dynamic random access memory (DRAM) using an attack called Rowhammer, which manipulates the physical properties of hardware to pose a digital threat that cannot be patched with software alone [48804]. The attack involves executing a program that repeatedly accesses the same "row" of transistors on a memory chip, causing a bit to "flip" and altering data, ultimately leading to gaining control over the device [48804]. The attack specifically targets the DRAM in Android phones, showcasing a vulnerability in the embedded software that allows for unauthorized access and control over the device [48804].
Communication unknown Unknown
Application TRUE The software failure incident described in the article [48804] is related to the application layer of the cyber physical system. The incident involved a vulnerability in Android phones that allowed attackers to take control of the devices by manipulating the physical properties of hardware through a specific attack called Rowhammer. This attack targeted the phone's dynamic random access memory (DRAM) and involved executing a program that repeatedly accessed the same "row" of transistors on a memory chip, causing bits to flip and altering data, ultimately leading to gaining control over the device. The attack exploited the ION memory allocator in Android, allowing the attackers to achieve root access and manipulate data to take over the phone. The attack was executed through a seemingly innocuous app laced with malware, highlighting the application layer vulnerability in the cyber physical system [48804].

Other Details

Category Option Rationale
Consequence theoretical_consequence, other (a) unknown (b) unknown (c) unknown (d) unknown (e) unknown (f) unknown (g) no_consequence: The article does not mention any real observed consequences of the software failure incident. It discusses the potential threat posed by the vulnerability in Android phones due to the DRAMMER attack, but there is no specific mention of actual harm or damage caused by the attack [48804]. (h) theoretical_consequence: The article discusses the potential consequences of the DRAMMER attack on Android phones, highlighting the risk it poses to data security and user privacy. It mentions that the attack could potentially allow an attacker to take control of the handset, access data, and even take pictures without the user's knowledge. The impact of the attack is described as broad, potentially affecting a wide range of Android devices [48804]. (i) other: The article mentions that the researchers developed a second app that users can use to check if their Android phone's memory chip is susceptible to bit flips caused by the DRAMMER attack. This proactive approach to identifying vulnerable devices indicates a potential consequence of users becoming aware of the security risks associated with their devices [48804].
Domain information (a) The software failure incident discussed in the article is related to the information industry. The vulnerability identified by researchers in Amsterdam targets Android phones, potentially placing all data on these devices at risk [48804]. The attack involves manipulating the physical properties of hardware to take control of Android phones, highlighting the need to rethink how software protection is approached in the information industry.

Sources

Back to List