{"id":8756,"date":"2015-04-10T13:00:45","date_gmt":"2015-04-10T20:00:45","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=8756"},"modified":"2015-04-10T12:58:35","modified_gmt":"2015-04-10T19:58:35","slug":"android-installer-hijacking-scanner-accept-no-substitutes","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2015\/04\/android-installer-hijacking-scanner-accept-no-substitutes\/","title":{"rendered":"Android Installer Hijacking Scanner: Accept No Substitutes!"},"content":{"rendered":"<p>On March 24, we <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/03\/android-installer-hijacking-vulnerability-could-expose-android-users-to-malware\/\" target=\"_blank\">released<\/a> the details of a vulnerability impacting millions of Android devices that allows an attacker to modify applications during the installation process. At that time we also released a <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.paloaltonetworks.ctd.ihscanner\" rel=\"nofollow,noopener\"  target=\"_blank\">scanner application<\/a> that allowed users to determine whether their phone or tablet contained the vulnerability.<!--more--><\/p>\n<p>As with many newsworthy events, a few enterprising attackers have capitalized on this vulnerability and have released imposter scanner applications that <a href=\"http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/android-installer-hijacking-bug-used-as-lure-for-malware\/\" rel=\"nofollow,noopener\"  target=\"_blank\">infect the devices of unsuspecting users with malware<\/a>. The activity does not appear to be widespread, but we remind our readers that the only legitimate places to retrieve the scanner are:<\/p>\n<ul>\n<li><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.paloaltonetworks.ctd.ihscanner\" rel=\"nofollow,noopener\"  target=\"_blank\">Google Play<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/PaloAltoNetworks-BD\/InstallerHijackingVulnerabilityScanner\" rel=\"nofollow,noopener\"  target=\"_blank\">Our Official GitHub<\/a><\/li>\n<\/ul>\n<p>Other sources purporting to provide the same scanner application may not be trustworthy.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On March 24, we released the details of a vulnerability impacting millions of Android devices that allows an attacker to modify applications during the installation process. At that time we also released &hellip;<\/p>\n","protected":false},"author":65,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[131,76,108],"tags":[172,1121,325],"coauthors":[704],"class_list":["post-8756","post","type-post","status-publish","format-standard","hentry","category-malware-2","category-mobility","category-threat-prevention-2","tag-android","tag-android-installer-hijacking","tag-vulnerability"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8756","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=8756"}],"version-history":[{"count":1,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8756\/revisions"}],"predecessor-version":[{"id":8757,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8756\/revisions\/8757"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=8756"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=8756"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=8756"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=8756"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}