Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Symantec Identifies Android Malware on Google Play Using Remote Payload

Symantec found two malicious apps on Google Play that may have infected up to 100,000 users before it was removed by Google.

The malware posed as two apps, “Super Mario Bros.” and “GTA3 Moscow City,” and used a remote payload technique to avoid detection, Irfan Asrar, a security researcher from Symantec, wrote on the Symantec Connect blog July 10. Both apps appeared on Google Play on June 24, and racked up between 50,000 to 100,000 downloads in less than two weeks.

Symantec found two malicious apps on Google Play that may have infected up to 100,000 users before it was removed by Google.

The malware posed as two apps, “Super Mario Bros.” and “GTA3 Moscow City,” and used a remote payload technique to avoid detection, Irfan Asrar, a security researcher from Symantec, wrote on the Symantec Connect blog July 10. Both apps appeared on Google Play on June 24, and racked up between 50,000 to 100,000 downloads in less than two weeks.

“What is most interesting about this Trojan is the fact that the threat managed to stay on Google Play for such a long time, clocking up some serious download figures before being discovered,” Asrar wrote.

Both apps employed remote payloads, where the malicious code is broken into separate modules and delivered independently, Asrar wrote. This technique may be partly how they managed to get past Google’s “Bouncer,” a screening technology that scans all apps on Google Play to detect and block malicious apps.

The apps, as posted on Google Play, contained only the component that Asrar identified as Android.Dropdialer. Once installed, the apps downloaded the next component, a malicious activator file, via Dropbox. The package, Activator.apk, is set up to send SMS messages to a premium-rate number based in Eastern Europe, Asrar said.

Notably, once the app had sent out premium SMS messages and racked up high charges on the user’s phone bill, it would prompt the user to uninstall Activator.

“An obvious attempt at hiding the true intent of the malicious app,” Asrar said.

Since the malicious activity was performed by Activator, which was never on Google Play, Bouncer wouldn’t have known what the apps would wind up doing.

Advertisement. Scroll to continue reading.

Mobile malware is a growing problem, as criminals realize mobile devices are a goldmine of valuable information, Stefan Tanase, senior security researcher at Kaspersky Lab said recently. There were 1160 mobile malware samples between 2004 and 2010, compared to 13,870 samples already discovered in 2012, Tanase said. Many malicious apps use popular titles to trick users into thinking they are versions of official games, or a free version of paid app, he said.

However, malicious Android apps that send SMS messages are generally a bigger threat outside the United States, where it’s easier to set up premium SMS services, according to Denis Maslennikov, a senior malware analyst at Kaspersky Lab. They are increasingly common in Eastern Europe, Russia, and other countries.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.

Malware & Threats

Cisco is warning of a zero-day vulnerability in Cisco ASA and FTD that can be exploited remotely, without authentication, in brute force attacks.