7 CONCLUSIONS AND FUTURE
WORK
This work analyzed the newly employed security mecha-
nisms of the Electroneum cloud mining app. The analysis
identified several vulnerabilities related to the in-place
security measures that allow for protocol exploitation
and device/app impersonation attacks. We successfully
mounted an account creation and device emulation at-
tack to generate illegitimate accounts that exploit the
cloud mining process and earn ETN reward tokens. On a
technical level, the attack consists of an initial account
setup phase that circumvents Electroneum’s selfie-based
account verification mechanism via generated selfies,
and a fully-automated cloud mining extension process
that reconstructs the network protocol and emulates a
cloud-miner. We evaluated our approach by creating
multiple fake accounts with generated selfies with prede-
termined gestures or symbols and developing a bot that
emulates the Electroneum app and regularly maintains
these accounts by extending their cloud-mining process.
The generated selfies for each of these accounts were
approved by the Electroneum team, and our automated
mining-extension protocol successfully maintained the
accounts and enabled receiving payouts at the same rate
as legitimate reference accounts. We further propose
potential mitigation techniques for preventing application
repackaging or emulation attacks.
In future work we plan to further extend and improve
our attack by fully automating the initial account setup
phase. The complete automation of the selfie generation
process would consequently increase the efficiency and
scale of the attack and therefore enable the attackers to
obtain significantly large amounts of ETN payouts.
Responsible Disclosure.
We adhered to responsible
disclosure guidelines and informed the Electroneum team
about our findings.
REFERENCES
Apple (2019). App store review guidelines. https://
developer.apple.com/app-store/review/guidelines/.
Bente, I., Dreo, G., Hellmann, B., Heuser, S., Vieweg, J.,
von Helden, J., and Westhuis, J. (2011). Towards
Permission-Based Attestation for the Android Plat-
form. In Lecture Notes in Computer Science (includ-
ing subseries LNAI and LNBI), volume 6740 LNCS,
pages 108–115.
Comben, C. and Rivet, C. (2019). How to do cryptocurrency
mobile mining. https://finance.yahoo.com/news/
cryptocurrency-mobile-mining-100019158.html.
Corcoran, K. (2017). Bitcoin is climbing on the last day
of 2017. https://www.businessinsider.com/bitcoin-
price-value-increasing-on-final-day-of-2017-2017-
12/commerce-on-business-insider?r=DE&IR=T.
Desnos, A. and Gueguen, G. (2011). Android: From Re-
versing to Decompilation. Proc. of Black Hat Abu
Dhabi, pages 1–24.
Electroneum (2020). Electroneum roadmad - our vision
mapped out. https://electroneum.com/journey/.
Enck, W., Ongtang, M., and McDaniel, P. (2009). On
Lightweight Mobile Phone Application Certification.
Proceedings of the 16th ACM conference on Com-
puter and communications security - CCS ’09, page
235.
Frankenfield, J. (2019). Mining pool. https://www.
investopedia.com/terms/m/mining-pool.asp.
Google (2018). Let’s build the world’s most trusted source
for apps and games. https://play.google.com/about/
developer-content-policy-print/.
Google (2019). Safetynet attestation api. https://developer.
android.com/training/safetynet/attestation.
Jung, J. H., Kim, J. Y., Lee, H. C., and Yi, J. H. (2013).
Repackaging attack on android banking applications
and its countermeasures. Wireless Personal Commu-
nications, 73(4):1421–1437.
Karras, T., Laine, S., and Aila, T. (2019a). A style-based
generator architecture for generative adversarial net-
works. In Proceedings of the IEEE Conference on
Computer Vision and Pattern Recognition.
Karras, T., Laine, S., Aittala, M., Hellsten, J., Lehtinen,
J., and Aila, T. (2019b). Analyzing and improv-
ing the image quality of stylegan. arXiv preprint
arXiv:1912.04958.
Keybase (2019). The big stellar space drop. https://keybase.
io/a/i/r/d/r/o/p/spacedrop2019.
Microsoft (2019). Face swap. https://www.microsoft.com/
en-us/garage/profiles/face-swap/.
Nauman, M., Khan, S., Zhang, X., and Seifert, J.-P. (2010).
Beyond Kernel-Level Integrity Measurement: En-
abling Remote Attestation for the Android Platform.
In Acquisti, A., Smith, S. W., and Sadeghi, A.-R., ed-
itors, Trust and Trustworthy Computing, pages 1–15.
Springer Berlin Heidelberg, Berlin, Heidelberg.
Pr
¨
unster, B., Palfinger, G., and Kollmann, C. (2019). Fides
– unleashing the full potential of remote attestation.
In Proceedings of the 16th International Joint Confer-
ence on e-Business and Telecommunications, volume
2: SECRYPT, pages 314—-321. SciTePress - Science
and Technology Publications.
Ren, C., Chen, K., and Liu, P. (2014). Droidmarking: Re-
silient SoftwareWatermarking for Impeding Android
Application Repackaging. 29th ACM/IEEE interna-
tional conference on Automated software engineering,
pages 635–646.
Rossler, A., Cozzolino, D., Verdoliva, L., Riess, C., Thies,
J., and Niessner, M. (2019). Faceforensics++: Learn-
ing to detect manipulated facial images. In The IEEE
ICCV.
Vidas, T. and Christin, N. (2014). Evading Android Run-
time Analysis via Sandbox Detection. Proceedings
of the 9th ACM symposium on Information, computer
and communications security - ASIA CCS ’14.
Zhou, W., Zhang, X., and Jiang, X. (2013). AppInk: Water-
marking Android Apps for Repackaging Deterrence.
In Proceedings of the 8th ACM SIGSAC symposium on
This Selfie Does Not Exist: On the Security of Electroneum Cloud Mining
395