Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

Mobile Malware Leveraging Trusted App and Service Vulnerabilities: McAfee

Cybercriminals are increasingly abusing flaws in trusted mobile apps and services in an effort to distribute malware, McAfee Labs revealed in a threat report published on Tuesday.

Cybercriminals are increasingly abusing flaws in trusted mobile apps and services in an effort to distribute malware, McAfee Labs revealed in a threat report published on Tuesday.

McAfee’s report provides three examples of malicious applications exploiting features and vulnerabilities in legitimate apps and services. The first example details how an app offered on Google Play automatically downloaded, installed, and launched other apps without a user’s permission. The application in question, detected as Android/BadInst.A, helped the attackers make a profit through a pay-to-download scheme, but it could have been used just as easily to download malware.

A different threat, a Trojan detected as Android/Waller.A, was found exploiting a security hole in the Visa QIWI Wallet digital wallet service to steal money from victims. The final example provided by McAfee is a piece of malware (Android/Balloonpopper.A) designed to exploit an encryption weakness in WhatsApp to intercept users’ conversations and photos.

Cybercriminals are also leveraging the popularity of various mobile applications to achieve their goals. McAfee analyzed 300 clones of the Flappy Bird game and found that close to 80% of them contained malware. The rogue apps have been designed to make calls, track geolocation, harvest contact information, and send and receive SMS messages without the user’s permission.                                                             

According to McAfee, the total number of mobile malware samples increased by 167% between Q1 2013 and Q1 2014. In the first quarter of 2014, over 750,000 new unique samples were detected by the company.

“We tend to trust the names we know on the internet and risk compromising our safety if it means gaining what we most desire,” noted Vincent Weafer, senior vice president for McAfee Labs.

“The year 2014 has already given us ample evidence that mobile malware developers are playing on these inclinations, to manipulate the familiar, legitimate features in the mobile apps and services we recognize and trust. Developers must become more vigilant with the controls they build into these apps, and users must be more mindful of what permissions they grant.”

The complete McAfee Labs Threats Report: June 2014 is available online.

Advertisement. Scroll to continue reading.
Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed the new CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.