Tesco Hudl and other Android devices face data reset flaw

Hudl Data saved to a Tesco Hudl is vulnerable to recovery thanks to a bug in its core processor

Related Stories

Hiding data by using a factory reset option does little to delete potentially sensitive information, suggest researchers.

Three separate investigations of Android's data deleting systems found it was possible to recover information.

In some cases, a reset just removed the list of where data was stored and deleted nothing else.

In particular, Tesco's Hudl tablet was found to have a flaw that let attackers get at data saved to onboard memory.

All the investigations used second-hand devices sold via auction sites such as eBay.

The BBC worked with security expert Ken Munro from security firm Pen Test Partners to get 10 Hudl tablets from the auction site and see how easy it was to recover information from them.

The Hudl was vulnerable, said Mr Munro, because of a known bug in the Rockchip processor at its heart.

All modern gadgets can be flipped into a "flash mode" so the onboard firmware can be updated and data written to the device.

Queen photo bombs hockey players Personal data such as selfies taken via mobiles were easily recoverable, found researchers

"There's a flaw in the firmware, which allows you to read from it as well as write," he explained.

Using a freely available software tool, Mr Munro was able to easily read data from Hudl tablets to which the factory reset facility had been applied.

Start Quote

What people think is that when they hit erase or factory reset it's deleting the underlying source data but it's not”

End Quote Jude McColgan Avast

Getting access was the work of minutes but reading and analysing all the data typically took a couple of hours, he said.

Via this route Mr Munro was able to extract Pin codes to unlock devices as well as wi-fi keys, cookies and other browsing data that could be used to sign in to a website and masquerade oneself as the tablet's original owner.

In response, a Tesco spokesperson said: "Customers should always ensure all personal information is removed prior to giving away or selling any mobile device. To guarantee this, customers should use a data wipe program."

The spokesperson added that any tablets returned to Tesco would have all personal data wiped. They also recommended that people get further information about how to remove personal data from smartphones via the government's Get Safe Online website.

Google said anyone selling a used gadget should follow several steps to protect information.

"If you sell or dispose of your device, we recommend you enable encryption on your device and apply a factory reset beforehand," said a spokesman.

Data encryption systems have been available on Android for years, he added.

The next release of Android is expected to enable encryption by default. Currently it is up to owners to enable it for themselves.

Naked photos

While Hudl tablets were particularly vulnerable, other work has shown how straightforward it is to retrieve data from many Android devices.

The largest study was carried out by security company Avast, which recovered an "astonishing" amount of personal data from 20 second-hand Android phones.

The company recovered tens of thousands of images, including naked selfies as well as emails and text messages plus contact names and addresses.

"What people think is that when they hit erase or factory reset it's deleting the underlying source data but it's not," said Jude McColgan, head of mobile at Avast.

Independently, Marc Rogers, principal researcher at mobile security firm Lookout, has been cataloguing what happens to data saved on the main memory of Android phones and tablets when they are reset.

"There's an Android function to wipe data and most manufacturers are using that," he said.

"But all that does is remove the index of where data is and does not delete data at all."

A secure wipe would both remove that index and overwrite onboard memory with zeroes so it could not be recovered, he added.

"As a security professional it blows my mind that people do not do this to get rid of the data."

Apple iPhone Undocumented features in Apple's iOS could let attackers get at personal data

While it was not "completely straightforward" to recover data on those reset gadgets it was possible for a motivated attacker and the tools to do it were widely available, said Mr Rogers.

Motivation could come from the amount of cash stolen smartphones command, he explained.

Figures shared with Lookout by police forces suggest a street price for a smartphone with data on it can exceed $1,000 (£600).

The potential profit partly arises from the cache of personal, recoverable information people leave on these devices, Mr Rogers said.

In London, about 200 phones are stolen every day according to statistics from the Metropolitan police.

Apple exploit

Recent work by computer forensics expert Jonathan Zdziarski suggests that data held on Apple's iPhones is also vulnerable to recovery.

Mr Zdziarski found that some undisclosed features in the iOS operating system bypass the data encryption system running on the device. This meant, he said, that if an iPhone was caught at the right time it becomes possible to extract information.

With effort, said Mr Zdziarski, using these undocumented features would let an attacker get at "privileged personal information that the device even protects from its own users from accessing".

Mr Zdziarski's work has subsequently been independently confirmed by the security firm Stroz Friedberg.

In reaction, Apple has made changes to its mobile operating system that will be fully implemented in iOS 8. These should disable some aspects of the services he identified in order to limit their ability to export information.

Mr Zdziarski welcomed the "progress" Apple had made but said it needed to go further to fix the "significant security threat" faced.

More on This Story

Related Stories

The BBC is not responsible for the content of external Internet sites

More Technology stories

RSS

Features & Analysis

BBC Future

(3D rendering)

Inside spaceships of the future

Why they should be nothing like the Enterprise Read more...

Programmes

  • Islamic StateClick Watch

    Can the location of Islamic State militants be found with open source data?

BBC © 2014 The BBC is not responsible for the content of external sites. Read more.

This page is best viewed in an up-to-date web browser with style sheets (CSS) enabled. While you will be able to view the content of this page in your current browser, you will not be able to get the full visual experience. Please consider upgrading your browser software or enabling style sheets (CSS) if you are able to do so.