Android backup sends unencrypted Wi-Fi passwords to Google
Posted on 18 July 2013.
The recent revelations on how Internet giants such as Google, Yahoo, Apple and others are compelled by the US government to give its agencies access to user data have understandably made researchers delve more in depth into the technologies created and used by those companies.

Micah Lee, staff technologist for EFF and CTO of the Freedom of the Press Foundation, has discovered that Android's "Back up my data" feature is as potentially dangerous as it is convenient, as it sends a lot of private information (including passwords) in plaintext to Google.

"Since backup and restore is such a useful feature, and since it's turned on by default, it's likely that the vast majority of Android users are syncing this data with their Google accounts. Because Android is so popular, it's likely that Google has plaintext Wi-Fi passwords for the majority of password-protected wifi networks in the world," he pointed out in Androidís bug tracker.

Add to this the fact that Google' own Street View cars have been known to collect Wi-Fi data, it's easy to see that all this information can be combined and can be used to track a user's movement over time.

"If an NSA analyst, or likely someone from CIA or even FBI, asks Google for information about you, your houseís and officeís wifi passwords are likely included in that data. Without a warrant," he expounded further in a blog post, and added that any attacker that has that information can do a lot of harm.

"With your home wifi password, an attacker can sniff wifi traffic outside your house (without connecting to your network) and then decrypt it all, passively eavesdropping on your private network. If the attacker wants to do more active attacks, they can connect to your wifi network and mount a man-in-the-middle attack to eavesdrop on and modify any unencrypted Internet traffic. If you download a file, they can serve you a malicious version instead," he says.

"An attacker can scan for computers, phones, and tablets that are connected to your network, scan for open ports, and exploit vulnerable services. If you have a computer connected to your network that you havenít done software updates on for a couple weeks, or that youíve never configured a firewall on, or that youíve installed random servers on and have never touched them since, thereís a good chance the attacker could take over those computers."

He doesn't explicitly say that the NSA or any other agency would do any of these things, but he is clearly uncomfortable with the possibility of them having access to this information.

And as Google is currently unable to legally refuse any such request from them, Lee considers making it impossible for Google to do so to be the best option and urges the company to make it possible for users to encrypt synced passwords with their Google credentials or to encrypt all synced data with their own sync passphrase.


Harnessing artificial intelligence to build an army of virtual analysts

PatternEx, a startup that gathered a team of AI researcher from MIT CSAIL as well as security and distributed systems experts, is poised to shake up things in the user and entity behavior analytics market.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Mon, Feb 8th