Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

Malicious Version of BatteryBot Pro App Found on Google Play

Security researchers have come across a fake version of the popular BatteryBot Pro application for Android devices. The rogue app is designed to conduct ad fraud, send SMS messages to premium rate numbers, and download additional threats.

Security researchers have come across a fake version of the popular BatteryBot Pro application for Android devices. The rogue app is designed to conduct ad fraud, send SMS messages to premium rate numbers, and download additional threats.

BatteryBot is an application that monitors the battery of Android devices. The app, installed between 100,000 and 500,000 from Google Play, displays the battery charge level in the status bar, and additional information such as temperature, time left, health and voltage in the notification area. The Pro version, which costs $2,99, has some additional features.

According to cloud-based security firm Zscaler, cybercriminals have taken the legitimate BatteryBot Pro app and embedded malicious modules into it. One version of the fake application was uploaded to Google Play, but the search giant removed it from its app store as soon as it learned of its existence.

Unlike the legitimate BatteryBot Pro, which only requests minimal permissions at installation, the fake variant requests permission to send SMS messages, access the Internet, access the file system, process outgoing calls, and download files without notification.

During installation, the rogue application requests administrative access to the device, which allows it not only to carry out its malicious activities, but also to be persistent on the device and prevent removal.

Researchers say the fake BatteryBot Pro works just like the legitimate application. However, unlike the genuine app, which doesn’t display any ads, the malicious version is designed to push pop-up advertisements according to instructions received from its command and control (C&C) server.

In addition to displaying ads, the malware also downloads and installs other malicious APKs on the infected device.

While displaying ads can help the cybercriminals make a profit through affiliate advertising networks, the malware uses an even more direct approach for earning its masters money. When users click on the “View Battery Use” button in the fake app, the malware contacts its C&C server and requests short codes, which represent premium rate phone numbers.

Advertisement. Scroll to continue reading.

Every time the malware sends an SMS to one of these numbers, the victim is charged a certain amount of money, usually much more than what a regular text message would cost because the number is associated with a premium service.

Zscaler says the malware authors appear to be working on a new version of the threat that might include command execution capabilities. Experts have spotted traces of command execution functionality, but it had not been fully implemented.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Mobile & Wireless

Asus patched nine WiFi router security defects, including a highly critical 2018 vulnerability that exposes users to code execution attacks.