Attacks/Breaches
7/11/2012
09:32 AM
Connect Directly
RSS
E-Mail
50%
50%
Repost This

More Android Malware Pulled From Google Play

Disguised as Mario Bros. and Grand Theft Auto games, the malware downloaded itself in stages to evade Google's automated security checks.

Google has pulled from Google Play two malicious Android apps that were disguised as legitimate versions of popular Mario Brothers and Grand Theft Auto titles.

According to Symantec, which recently spotted the apps and alerted Google, they were first added to Google Play on June 24 and had since been downloaded between 50,000 and 100,000 times. One was packaged as "Super Mario Bros.," while the other was titled "GTA 3 Moscow City," which also offers a clue to the geographic location of targeted Android users.

In reality, both apps were a Trojan app known as Dropdialer. Once installed, Dropdialer downloads an additional package, "Activator.apk," via file-sharing website Dropbox. The secondary payload allows the malware to send messages to premium-rate SMS numbers in Eastern Europe, in a type of attack often referred to as toll fraud. The malware then uninstalls the secondary payload, helping to disguise what it's been up to.

[ A security researcher has discovered an Android botnet that hijacks Android devices and turns them into spam servers. Read about it here: Android Botnet Seen Spewing Spam. ]

"What is most interesting about this Trojan is the fact that the threat managed to stay on Google Play for such a long time, clocking up some serious download figures before being discovered," said Symantec security researcher Irfan Asrar in a blog post. "Our suspicion is that this was probably due to the remote payload employed by this Trojan."

By breaking up the malicious payload into pieces, the malware's developer was able to sneak it past the automated Google Bouncer malware-checking service that reviews apps before they can be added to Google Play. "The idea is simple: instead of having one payload that carries all of the malicious code for any given attack, break the threat into separate modules that can be delivered independently," said Asrar, in an overview of the technique he published last year.

Breaking malicious applications into pieces offers numerous additional benefits to attackers. "First, it obviates the telltale sign of a huge, overzealous permissions list accompanying the installation of the threat, which may alarm the user as to the intention of the malicious app," he said. "Secondly, smaller pieces are easier to hide and inject into other apps. Furthermore, dispersing the attack across separate apps complicates the integrated revocation processes from the service provider, marketplace, etc."

One mitigating factor with most Android malware is that users must first approve the app's installation, as well as its permission requests. Hence attackers, via a social-engineering attack, often disguise their malware as well-known software, and especially as "free" versions of these applications.

In the case of the Dropdialer apps recently discovered on Google Play, users had multiple opportunities to prevent the malicious software from executing. "After installation, the first application shows a notification in Russian informing the user that the application must be activated. The application mentions that by activating the application the user agrees to a set of rules. If a user chooses to read these rules--which are also in Russian--they provide very vague information regarding how much a user will be charged," read an analysis of the malware published by mobile security firm Lookout.

After the user agrees, the app downloads its secondary payload, which again triggers an Android warning. "A normal Android system installation message appears, asking if the user would like to install the application, which includes permissions to send SMS," said Lookout.

Occasionally, however, attackers do find ways to install malicious apps automatically. For example, the malicious Android application jSMSHider--targeting Chinese users--was designed to infect smartphones using custom ROMs, which are custom-built Android distributions. In particular, attackers targeted a vulnerability related to the Android Open Source Project (AOSP), which uses "publicly available private keys ... to sign the custom ROM builds," according to an analysis of the malware published by Lookout.

These keys are used to authorize updates for the custom ROM. In a move reminiscent of the Flame malware, which used a spoofed Windows certificate to automatically install itself on targeted PCs via the Windows Update mechanism, jSMSHider could be delivered to custom ROM builds disguised as a system update, allowing the software--which eavesdrops on SMS communications--to automatically install itself. Oftentimes, the malware could then install secondary payloads, adding further attack functionality.

Reached for comment, Google declined to offer specifics on the Dropdialer-in-disguise app takedowns. "We remove applications that violate our policies, such as apps that are illegal or that promote hate speech," said a Google spokesman via email. "We don’t comment on individual applications--however, you can check out our policies for more information."

In addition to enforcing those policies, Google last year--in the wake of security firms noting an alarming rise in Android malware--unveiled Bouncer. Bouncer, however, isn't foolproof. For starters, it's automated. In comparison, Apple employs teams of application reviewers, who hand-screen all iOS apps before they're allowed into the Apple App Store. To date, only one malicious app, "Find and Call,"--as well as one proof-of-concept attack authored by security researcher Charlie Miller--appears to have snuck by those reviewers.

By comparison, Google regularly needs to excise malicious apps--often aimed at perpetrating premium SMS toll fraud--from Google Play, but only after they've been spotted, downloaded, and apparently infected Android devices, thus generating fraudulent profits for attackers.

Black Hat USA Las Vegas, the premiere conference on information security, features four days of deep technical training followed by two days of presentations from speakers discussing their latest research around a broad range of security topics. At Caesars Palace in Las Vegas, July 21-26. Register today.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Andrew Hornback
50%
50%
Andrew Hornback,
User Rank: Apprentice
7/12/2012 | 2:20:49 AM
re: More Android Malware Pulled From Google Play
As long as there's money to be made in dupe-ing the end user of a new technology that they may have limited understanding about, there will always be a criminal element waiting to take advantage of them - and no matter how many security interlocks you put between the user and the criminal, someone will always find a way around them.

So, it looks like Google is happy with the idea of automating their process and just chalking up those who get damaged by the applications that get by their process as collateral damage. Apple's examining every application that comes in, by hand, and still doesn't have a perfect record.

With regards to the new attack vector discussed here, with applications being downloaded in pieces from various sites, etc., wouldn't it be possible (in a testing lab) to look at the data coming into and going out of the Android session to determine what the application is actually doing? If it was in the PC world, a simple network sniffer would be able to tell you all you'd need to know in very short order.

Andrew Hornback
InformationWeek Contributor
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2008-3277
Published: 2014-04-15
Untrusted search path vulnerability in a certain Red Hat build script for the ibmssh executable in ibutils packages before ibutils-1.5.7-2.el6 in Red Hat Enterprise Linux (RHEL) 6 and ibutils-1.2-11.2.el5 in Red Hat Enterprise Linux (RHEL) 5 allows local users to gain privileges via a Trojan Horse p...

CVE-2010-2236
Published: 2014-04-15
The monitoring probe display in spacewalk-java before 2.1.148-1 and Red Hat Network (RHN) Satellite 4.0.0 through 4.2.0 and 5.1.0 through 5.3.0, and Proxy 5.3.0, allows remote authenticated users with permissions to administer monitoring probes to execute arbitrary code via unspecified vectors, rela...

CVE-2011-3628
Published: 2014-04-15
Untrusted search path vulnerability in pam_motd (aka the MOTD module) in libpam-modules before 1.1.3-2ubuntu2.1 on Ubuntu 11.10, before 1.1.2-2ubuntu8.4 on Ubuntu 11.04, before 1.1.1-4ubuntu2.4 on Ubuntu 10.10, before 1.1.1-2ubuntu5.4 on Ubuntu 10.04 LTS, and before 0.99.7.1-5ubuntu6.5 on Ubuntu 8.0...

CVE-2012-0214
Published: 2014-04-15
The pkgAcqMetaClearSig::Failed method in apt-pkg/acquire-item.cc in Advanced Package Tool (APT) 0.8.11 through 0.8.15.10 and 0.8.16 before 0.8.16~exp13, when updating from repositories that use InRelease files, allows man-in-the-middle attackers to install arbitrary packages by preventing a user fro...

CVE-2013-4768
Published: 2014-04-15
The web services APIs in Eucalyptus 2.0 through 3.4.1 allow remote attackers to cause a denial of service via vectors related to the "network connection clean up code" and (1) Cloud Controller (CLC), (2) Walrus, (3) Storage Controller (SC), and (4) VMware Broker (VB).

Best of the Web