The company creates the project and receives the sender ID. The company creates the application, bakes the sender in its identifier, and places the application in the store.
The attacker calls the application engineers and retrieves both the sender ID and the server interface used to obtain the GCM registration identifiers.
The attacker creates his application, bakes the sender ID and the registration server interface, places the application in the store. The attack application basically personifies the actual company application with respect to GCM: it registers to receive messages from the sender ID of the company, and then sends its GCM registration ID to the company's servers, as the "real" application does.
Now the company wants to translate some information into all instances of its application. Perhaps this is a reminder than an update is available. Is there a way to distinguish an “attack application” (which is registered as real) from “real” versions of the Company application?
android security google-cloud-messaging android-c2dm
jph Jul 05 2018-12-12T00: 00Z
source share