Symantec found two malicious apps on Google Play that may have infected up to 100,000 users before it was removed by Google.
The malware posed as two apps, “Super Mario Bros.” and “GTA3 Moscow City,” and used a remote payload technique to avoid detection, Irfan Asrar, a security researcher from Symantec, wrote on the Symantec Connect blog July 10. Both apps appeared on Google Play on June 24, and racked up between 50,000 to 100,000 downloads in less than two weeks.
“What is most interesting about this Trojan is the fact that the threat managed to stay on Google Play for such a long time, clocking up some serious download figures before being discovered,” Asrar wrote.
Both apps employed remote payloads, where the malicious code is broken into separate modules and delivered independently, Asrar wrote. This technique may be partly how they managed to get past Google’s “Bouncer,” a screening technology that scans all apps on Google Play to detect and block malicious apps.
The apps, as posted on Google Play, contained only the component that Asrar identified as Android.Dropdialer. Once installed, the apps downloaded the next component, a malicious activator file, via Dropbox. The package, Activator.apk, is set up to send SMS messages to a premium-rate number based in Eastern Europe, Asrar said.
Notably, once the app had sent out premium SMS messages and racked up high charges on the user’s phone bill, it would prompt the user to uninstall Activator.
“An obvious attempt at hiding the true intent of the malicious app,” Asrar said.
Since the malicious activity was performed by Activator, which was never on Google Play, Bouncer wouldn’t have known what the apps would wind up doing.
Mobile malware is a growing problem, as criminals realize mobile devices are a goldmine of valuable information, Stefan Tanase, senior security researcher at Kaspersky Lab said recently. There were 1160 mobile malware samples between 2004 and 2010, compared to 13,870 samples already discovered in 2012, Tanase said. Many malicious apps use popular titles to trick users into thinking they are versions of official games, or a free version of paid app, he said.
However, malicious Android apps that send SMS messages are generally a bigger threat outside the United States, where it’s easier to set up premium SMS services, according to Denis Maslennikov, a senior malware analyst at Kaspersky Lab. They are increasingly common in Eastern Europe, Russia, and other countries.
More from Fahmida Y. Rashid
- Emissary Panda Hackers Get Selective in Data Heists
- Financial Firms Embrace Cloud With Encryption, Tokenization: Report
- United Airlines Hack Highlights Need for Improved Information Sharing
- CISOs Challenged in C-Suite: Report
- Cyber Attack on Power Grid Could Top $1 Trillion in Damage: Report
- Dyre Malware Gang Targets Spanish Banks
- Ex-employees Have “Easy” Access to Corporate Data: Survey
- Leaked Government Credentials Abundant on Public Web
Latest News
- Industrial Giant ABB Confirms Ransomware Attack, Data Theft
- Organizations Worldwide Targeted in Rapidly Evolving Buhti Ransomware Operation
- Google Cloud Users Can Now Automate TLS Certificate Lifecycle
- Zyxel Firewalls Hacked by Mirai Botnet
- Watch Now: Threat Detection and Incident Response Virtual Summit
- NCC Group Releases Open Source Tools for Developers, Pentesters
- Memcyco Raises $10 Million in Seed Funding to Prevent Website Impersonation
- New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids
