6월 26, 2019

What are the security risks of rooting your smartphone?

Joel Snyder

Companies allowing employees to bring their own device (BYOD) for work purposes are toeing a fine line: providing workers with ability to use the smartphone or tablet they’re most comfortable with, but also subjecting the enterprise’s data to potential security risks.

One issue keeping digital security and IT managers awake at night is smartphone rooting.

What is smartphone rooting?

Rooting phones, no matter what the operating system, usually means discovering a bug of some sort that lets you bypass internal protections and gain complete control over the operating system — to become the “root” user, who has all privileges and all access. Rooting is sometimes called “jailbreaking,” as it allows the user to break out of constraints of the operating system.

In the Android ecosystem, since the platform is based upon Linux permissions and file-system ownership, rooting means gaining “superuser” access. Rooting is generally carried out using Android SDK tools to unlock the bootloader and then flash a custom image to the device. Some third-party applications may offer to root your device for you, but users should be particularly cautious of these as they have the potential to introduce malware or other security loopholes.

Not everyone rooting a phone breaks in by finding a bug. Android phones sold for development purposes, for example, may allow rooting to help in the testing and debugging process.

It’s also important to note that rooting is different from unlocking a phone. In the U.S. especially, phones are often sold with a subsidy provided by a telecom carrier. To help enforce the contract terms, phones may be configured by the carrier so that they can only be used on certain networks. Disabling these controls is called “unlocking” the phone, but this does not involve gaining superuser permissions.

 

Why do people root their phones?

People root smartphones for many different reasons. They may want to install a specific application, change certain settings, or just because they don’t like being told what they can and can’t do with their phone.

In the early years of Android smartphones, rooting was popular among tech enthusiasts as a way to strip back user interface customizations made by manufacturers to the Android platform. In other instances, the motivation has been to remove preloaded applications.

 

How can you tell if a phone is rooted?

Users who are uncertain if their phone has been rooted have several ways to check.

The presence of a Kinguser or Superuser application on the device is an obvious sign that the device has been rooted. These applications are typically installed as part of the rooting process to allow access to superuser privileges. Users can also download a root checker app or a terminal client to determine if superuser access is configured.

With Samsung’s Android devices featuring Samsung Knox, the user can simply go into Settings and tap “About Phone” to review the software versions on their device. Any irregularities in the software will be noted.

 

Is rooting your smartphone a security risk?

Rooting disables some of the built-in security features of the operating system, and those security features are part of what keeps the operating system safe, and your data secure from exposure or corruption. Since today’s smartphones operate in an environment filled with threats from attackers, buggy or malicious applications, as well as occasional accidental missteps by trusted users, anything that reduces the internal controls in the Android operating system represents a higher risk.

Quantifying that increased level of risk is hard because it depends on how the phone was rooted and what happens next. If a user roots their smartphone and doesn’t do anything outside of normal day-to-day usage, it becomes hard to point and say “this is a big security problem.” But if a rooted phone stops checking for software updates and security patches (or cannot install them because the kernel is no longer signed properly), then even a phone used in a very normal way slowly turns into a ticking time bomb running old software and applications.

On the other hand, IT managers know that many users root their phones and then engage in unsafe behaviors, such as installing pirated applications or malware — even unintentionally. In that case, the security risk rises quickly.

A rooted smartphone — especially one that doesn’t get updated — creates a security problem that gets worse over time. Similarly, some of the important security features of smartphones, such as Samsung’s Trusted Execution Environment (TEE), can be disabled when a smartphone is rooted. This means that applications dependent on the security of TEE for encryption key storage or home/work partitions, for example, either stop functioning entirely or are no longer secure. And that’s why most IT managers strongly discourage rooting phones.

 

Should rooted smartphones be used for work?

Rooting a smartphone changes the fundamental security posture of the device, and this generally makes the device unsuitable for work use, exposing enterprise data and applications to new threats.

Many acceptable use policies (AUPs) explicitly state that rooted devices are not allowed to access corporate networks, applications and data. As discussed in more detail below, IT admins may also use rooting or jailbreak detection capabilities within their Mobile Device Management (MDM) solution to red-flag any compromised devices enrolled. Even if these policies and protections are not in place, users who are aware their device is rooted should think twice before using that phone for business purposes.

 

What should IT managers do? 

First, make it hard for people to root phones. Pick a business-focused phone that has hardware protections that make booting of untrusted code somewhere between difficult and impossible. For example, Samsung’s phones with the built-in Knox platform and TEE use a combination of hardware and firmware to keep untrusted operating systems from loading by verifying a digital signature on each part of the operating system as it’s loaded into memory. If the software is not digitally signed by someone in Samsung’s chain of trust, then the phone won’t load the software at all. The digital signature guarantees, with cryptographic assurance, that the operating system software being loaded has not been modified. That eliminates one favorite technique for rooting phones.

Samsung Knox also has rollback protection as part of the trusted boot process. Another favorite rooting technique is to load an older version of the Android operating system with an old bug that makes it easy to root the phone. With Knox-integrated phones, though, once a new version of the operating system has been loaded, it can set a minimum version number in the TEE, and the smartphone can detect if the operating system meets the minimum requirement.

Depending on where the device is in the boot process, it will either refuse to load older, buggier versions of the operating system, or in some cases, it will boot up but clear out the secure area in the TEE which has decryption keys in it, effectively wiping the phone’s data storage. Rollback protection is a one-way street — no amount of factory resetting the phone will clear this information out, so once a phone has been patched and the rollback protection updated, it can’t be unpatched by someone trying to root it.

Finally, after making it harder to root phones, IT managers should actively detect rooted devices, typically using their MDM, Enterprise Mobility Management (EMM) or Unified Endpoint Management UEM) console. This service helps by providing reporting on device software versions, and any back-tracking of a smartphone to an earlier version should stand out — and cause the MDM/EMM to log a security event. Upon detection of rooting, the admin can choose to have MDM automatically lock the user out of the device, wipe all enterprise data or restrict access.

More advanced phones can also report back to the MDM/EMM on periodic real-time checks on the integrity of the operating system. For example, in Samsung phones with Knox, IT managers can take advantage of Realtime Kernel Protection (RKP) and Periodic Kernel Measurement (PKM) to detect and block kernel tampering at run time.

IT managers can’t convince people not to root their smartphones. But they can make it harder for those devices to be used in the enterprise, and they can better detect policy violations. All it takes is the right hardware, the right software and a keen eye.

Learn more about the Samsung Knox platform by reading our free white paper.

Read the KPE white paper

[아이콘] 닫기

삼성 Knox 시작하기

[아이콘] 여행가방
리셀러, 솔루션 공급업체 또는 서비스 공급업체이신가요?

지금 Knox 파트너가 되어 비즈니스 성장을 도모하세요.

[아이콘] 정보

시작할 Knox 제품 선택:

올인원 번들
Knox Suite
리브랜딩 및 맞춤 설정
Knox Configure
사기 및 도난 방지
Knox Guard
디바이스 보호 플랜
Samsung Care+ for Business
기타 제품 및 서비스

시작하기

[이미지] Knox Suite

기업용 모바일을 위한 일체형 솔루션 번들

  • 최대 30대의 디바이스에 제공되는 90일 무료 평가판을 사용해 보세요.
  • 회사 디바이스를 안전하게 보호, 배포, 관리 및 분석할 수 있는 완벽한 툴 모음입니다.
  • Knox Suite와 함께 제공되는 강력한 기능을 사용해 보세요.

Knox Suite에는 다음이 포함됩니다.:

Knox Mobile Enrollment 무료
Knox Manage
Knox E-FOTA
Knox Asset Intelligence
Knox Platform for Enterprise 무료
Knox Remote Support
Knox Capture
Knox Authentication Manager

시작하기

[이미지] Knox Configure 로고

삼성 디바이스를 리브랜딩하고 맞춤 설정하세요.

  • 최대 30대의 디바이스에 제공되는 90일 무료 평가판을 사용해 보세요.
  • 삼성 디바이스를 대량으로 구매하는 즉시 원격으로 구성하고 특정 요구 사항을 충족하도록 맞춤 구성합니다.
  • 디바이스를 일회성 배포를 위해 설정하거나 원하는 만큼 업데이트할 수 있습니다.

시작하기

[아이콘] Knox Guard 로고

삼성 디바이스를 위한 사기 및 도난 방지

  • 최대 30대의 디바이스에 제공되는 90일 무료 평가판을 사용해 보세요.
  • 원격으로 삼성 디바이스를 제어하여 금융 관련 위험성을 줄이고 자산을 보호하세요.
  • SIM 제어 및 디바이스 잠금 기능을 포함한 Knox Guard의 모든 기능을 사용해 보세요.

시작하기

[이미지] Samsung Care Plus For Business 로고

삼성 디바이스를 위한 디바이스 보호 플랜

  • 빠른 디바이스 수리 및 교체로 업무 중단을 최소화합니다. 시작하려면 삼성 영업팀에 문의하세요.
  • 한 곳에서 모든 디바이스 보증 범위 및 청구 정보를 확인하세요.
  • 이미 Samsung Care+ for Business를 구매하셨나요? Samsung Care+ for Business 콘솔에서 계정을 만들고 플랜을 활성화하세요.

기타 제품 및 서비스

[이미지] 기타 로고

고객의 고유한 요구 사항을 해결하는 최신 솔루션입니다.

  • Enterprise Tech Support를 통해 전담 계정 관리자로부터 효율적인 기술 지원을 받아보세요.
  • 삼성 소프트웨어 맞춤 설정 서비스를 사용하여 귀사를 위한 맞춤형 디바이스를 만들어 보십시오.
영업 팀에 문의