1.1 / March 26, 2015
(3.9/5) (484)

Description

The Android Installer Hijacking vulnerability can be used byattackers to potentially distribute malware, compromise devices,and steal user data. This free applications from Palo Alto Networksdetects if your device is vulnerable to this serious exploit,allowing you to take steps to protect your sensitive data.

Before you start testing on your device, please read the[How-to-use] below. Go through the video bellow will also begreatly helpful. Thanks for your patience.

Briefly, this vulnerability has been patched on Android version4.4 and up. Devices with Android version 4.3 may contain thisvulnerability, depending on vendors. Devices with Android version<=4.2 all have this vulnerability.

Learn more about the vulnerability here: http://researchcenter.paloaltonetworks.com/2015/03/android-installer-hijacking-vulnerability-could-expose-android-users-to-malware/

Demo video:
https://www.youtube.com/watch?v=81slOhjrZXY
https://www.youtube.com/watch?v=AgPEoYdHE34

How-to-use:

* [IMPORTANT] To install the dummy app, it requires you toenable the "Unknown Sources" setting (Thank David LaVeque for thereminder). If you did not change the setting before trying thescanner app, your phone may be falsely reported as vulnerable. Inthis case, please click 'reset' button, and retry the app.

* Please follow the step 1 -> 2 ->3 to finish the scan.Step 1 starts an app installation procedure. Please follow theprocedure and install that dummy app. Step 2 helps to check theexistence of vulnerability. Step 3 'reset' will remove that dummyapp you just installed.

* You may be asked to install an apk file. This is a dummy appwith no content. Since this is a OS vulnerability, we have to gothrough the installation procedure in order to determine if thedevice is vulnerable or not. This dummy app will be uninstalledwhen you press the 'reset' button.

* If the device does not contain this vulnerability, the dummyapp will not be installed. So, when you press the 'reset' button,the app uninstallation window will not pop up.

* On some devices, after first install, some devices may reporterror with "Parser Failure". Please restart the app and tryagain.

Copryright: Copyright ©2015, Palo Alto Networks, Inc. All rightsreserved. Palo Alto Networks, the Palo Alto Networks Logo, aretrademarks of Palo Alto Networks, Inc. All specifications aresubject to change without notice. Palo Alto Networks assumes noresponsibility for any inaccuracies in this document or for anyobligation to update information in this document. Palo AltoNetworks reserves the right to change, modify, transfer, orotherwise revise this publication without notice.

App Information Installer Hijacking Scanner

  • App Name
    Installer Hijacking Scanner
  • Package Name
    com.paloaltonetworks.ctd.ihscanner
  • Updated
    March 26, 2015
  • File Size
    1.1M
  • Requires Android
    Android 2.3 and up
  • Version
    1.1
  • Developer
    Palo Alto Networks, Security Research
  • Installs
    10,000 - 50,000
  • Price
    Free
  • Category
    Tools
  • Developer
  • Google Play Link

Installer Hijacking Scanner Version History

Select Installer Hijacking Scanner Version :
  • 1.1 (3) - Latest Version
  • 1.1 (3) - Latest Version
  • Installer Hijacking Scanner 1.1 APK File

    Publish Date: 2017 /4/30
    Requires Android: Android 2.3+ (Gingerbread, API: 9)
    File Size: 1.1 MB
    Tested on: Android 4.1 (Jelly Bean, API: 16)
    File Sha1: 59f7753a92b8c23d932ff4064daf59001a84dd19
    APK Signature: f355ee9cc6033e25e0c8213d465e67c7c97a49c8
  • Installer Hijacking Scanner 1.1 APK File

    Publish Date: 2015 /9/19
    Requires Android: Android 2.3+ (Gingerbread, API: 9)
    File Size: 1.1 MB
    Tested on: Android 4.1 (Jelly Bean, API: 16)
    File Sha1: 59f7753a92b8c23d932ff4064daf59001a84dd19
    APK Signature: f355ee9cc6033e25e0c8213d465e67c7c97a49c8

Palo Alto Networks, Security Research Show More...

Installer Hijacking Scanner 1.1 APK
The Android Installer Hijacking vulnerability can be used byattackers to potentially distribute malware, compromise devices,and steal user data. This free applications from Palo Alto Networksdetects if your device is vulnerable to this serious exploit,allowing you to take steps to protect your sensitive data.Before you start testing on your device, please read the[How-to-use] below. Go through the video bellow will also begreatly helpful. Thanks for your patience.Briefly, this vulnerability has been patched on Android version4.4 and up. Devices with Android version 4.3 may contain thisvulnerability, depending on vendors. Devices with Android version<=4.2 all have this vulnerability.Learn more about the vulnerability here: http://researchcenter.paloaltonetworks.com/2015/03/android-installer-hijacking-vulnerability-could-expose-android-users-to-malware/Demo video:https://www.youtube.com/watch?v=81slOhjrZXYhttps://www.youtube.com/watch?v=AgPEoYdHE34How-to-use:* [IMPORTANT] To install the dummy app, it requires you toenable the "Unknown Sources" setting (Thank David LaVeque for thereminder). If you did not change the setting before trying thescanner app, your phone may be falsely reported as vulnerable. Inthis case, please click 'reset' button, and retry the app.* Please follow the step 1 -> 2 ->3 to finish the scan.Step 1 starts an app installation procedure. Please follow theprocedure and install that dummy app. Step 2 helps to check theexistence of vulnerability. Step 3 'reset' will remove that dummyapp you just installed.* You may be asked to install an apk file. This is a dummy appwith no content. Since this is a OS vulnerability, we have to gothrough the installation procedure in order to determine if thedevice is vulnerable or not. This dummy app will be uninstalledwhen you press the 'reset' button.* If the device does not contain this vulnerability, the dummyapp will not be installed. So, when you press the 'reset' button,the app uninstallation window will not pop up.* On some devices, after first install, some devices may reporterror with "Parser Failure". Please restart the app and tryagain.Copryright: Copyright ©2015, Palo Alto Networks, Inc. All rightsreserved. Palo Alto Networks, the Palo Alto Networks Logo, aretrademarks of Palo Alto Networks, Inc. All specifications aresubject to change without notice. Palo Alto Networks assumes noresponsibility for any inaccuracies in this document or for anyobligation to update information in this document. Palo AltoNetworks reserves the right to change, modify, transfer, orotherwise revise this publication without notice.