Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Malicious Optimizers Hosted on Google Play Amassed 470,000 Downloads

Malicious optimizer, booster, and utility applications hosted on Google Play gathered nearly half a million downloads before being taken down, Trend Micro reports.

Malicious optimizer, booster, and utility applications hosted on Google Play gathered nearly half a million downloads before being taken down, Trend Micro reports.

The apps, which are detected by the company’s products as AndroidOS_BadBooster.HRX, were designed to perform activities such as ad fraud, and to download around 3,000 malware variants or other malicious payloads to the infected devices.

Active since 2017, the campaign involved 9 malicious applications, with a collective download count of more than 470,000. Four of the apps gathered more than 100,000 downloads each before Google removed them from the official storefront.

All of the offending apps — they were named Shoot Clean, Super Clean Lite, Super Clean, Quick Games, Rocket Cleaner, Rocket Cleaner Lite, Speed Clean, LinkWorldVPN, and H5 gamebox — have been removed from Google Play.

The malware variants these apps drop onto devices masquerade as system applications and do not show icons on the launcher or application list.

Speed Clean, for example, was designed to launch a transparent activity background that hides malicious content from the user, while a service establishes a connection with remote ad configuration servers and registers the installation. Next, the app starts displaying malicious ad content.

The app can also download malware variants or other payloads on the infected device to perform additional ad fraud techniques, including simulating a user clicking on ads for malicious Google Play application. These apps are integrated in legitimate advertising platforms, such as Google AdMob and Facebook Audience Network.

The malicious payloads can also install rewarded apps from mobile advertising platforms — in a virtual environment, to prevent user detection — and can trick users into enabling accessibility permissions and deactivating Google Play Protect.

Advertisement. Scroll to continue reading.

The apps can then abuse the affected device’s accessibility function to post fake reviews or to log in the new applications with users’ Google and Facebook accounts.

In 2017, when the campaign started, there were 6 malware variants these applications could download. Over 169 such malicious payloads were observed throughout 2018, roughly 2,600 emerged in 2019, and 33 more were added to the list at the beginning of 2020.

Over the past three months, Trend Micro observed more than 65,000 infections associated with the campaign. Japan was affected the most, with over 48,000 infections, followed by Taiwan with more than 5,700, the United States with nearly 2,500, Israel with over 1,950, and India with a bit more than 1,080.

Trend Micro’s security researchers observed that malicious content was being delivered to users regardless of the geographic parameter value of the country code, except for China, suggesting that the campaign’s operators attempt to avoid infecting users from this country.

“Fraudsters attempt to deceive users by making malicious apps look genuine, so users should do their due diligence before downloading any mobile app. Verifying an app’s legitimacy is typically done by checking user-created reviews on the Play Store. However, in this particular case, the malicious app is capable of downloading payloads that can post fake reviews unbeknownst to the user,” Trend Micro concludes.

Related: Threat From Pre-Installed Malware on Android Phones is Growing

Related: Ring Doorbell App for Android Sends Out Loads of User Data

Related: ‘StrandHogg’ Vulnerability Exploited by Malicious Android Apps

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.