Mobile
3/27/2014
02:10 PM
50%
50%

Android Apps Hide Crypto-Currency Mining Malware

Apps downloaded by millions from Google Play and Spanish software forums include hidden altcoin-mining software. But criminals aren't getting rich quickly.

Security researchers this week warned that malware designed to mine crypto-currencies has been hidden in apps distributed via Google Play as well as in online forums.

Malware known as KageCoin has been hidden inside two apps distributed through Google Play -- Songs and Prized -- which have collectively been downloaded more than a million times by Android users, Trend Micro mobile threat analyst Veo Zhang said Tuesday in a blog post. While the security firm informed Google about the apps, as of Thursday morning they were still available for download via Google Play.

The KageCoin malware was originally discovered in the wild -- not being distributed via Google Play -- in versions of some popular apps, including Football Manager Handheld and TuneIn Radio, that had been repacked to include code from cpuminer, which is a multi-threaded, CPU miner that runs on Android.

That previous version of KageCoin apparently earned its creators "thousands of Dogecoins," Zhang said. But even with a botnet composed of thousands of infected smartphones, the criminals behind this enterprise aren't getting rich quickly: 1,000 of the Dogecoins crypto-currency are worth only 60 cents. "Yes, they can gain money this way, but at a glacial pace," he said.

Those economics might help explain why the version of KageCoin hidden in the Google Play apps has been updated to work with the WafflePool mining pool, which is designed to mine a variety of "altcoins" -- referring to any crypto-currency that isn't Bitcoin. In exchange for every altcoin they mine, however, they receive a payment, in bitcoins.

As far as malware goes, KageCoin isn't the worst parasite on the books, given that it's somewhat resource-savvy. "The mining only occurs when the device is charging, [so] the increased energy usage won't be noticed as much," Zhang said.

But the same can't be said for a malware family known as CoinKrypt, which has been distributed via online forums based in Spain -- although most of the infections appear to be based in France. Notably, one sign of infection by CoinKrypt is that it consumes a vast amount of resources. "[At] a minimum, users affected by this malware will find their phones getting warm and their battery-life massively shortened," said Marc Rogers, principal security researcher at Lookout, in a blog post. Users' mobile phone accounts, of course, may also get drained. "CoinKrypt might suck up your data plan by periodically downloading what is known as a block chain, or a copy of the currency transaction history, which can be several gigabytes in size."

image (derived) courtesy of Flickr user .RGB
image (derived) courtesy of Flickr user .RGB

From a programming perspective, as with KageCoin, this malware is far from sophisticated. In this case, however, "lack of complexity is part of what makes it dangerous," Rogers said. Unlike purpose-built crypto-currency-mining software, the malware includes no throttle to protect the software from overtaxing processors or to manage battery life, and it will continue running until the device loses power, as well as "potentially damage hardware by causing it to overheat and even burn out."

CoinKrypt, like KageCoin, doesn't mine for bitcoins, which are worth about $525 each. Instead, it tries to mine Casinocoin, Dogecoin, and Litecoin. (As of Thursday, Litecoin is worth less than $15.)

Why don't smartphone malware authors try to mine bitcoins directly? The answer has to do with the complex calculations that are required to mine crypto-currencies.

"To control the rate at which new digital coins are minted, the software that runs the currency sets a difficulty rate which governs just how much processing power you need to expend in order to solve the blockchain and get new coins," Rogers said. "The difficulty for Bitcoin is so tough right now that a recent mining experiment using 600 quadcore servers was only able to generate 0.4 bitcoins."

That referred to an experiment conducted by iDrive, which explored whether its idle quad-core servers might provide a secondary income stream by mining bitcoins. But the findings weren't good. "It's a waste of time, so any other company thinking about mining with their infrastructure, learn from us," iDrive's Matthew Harvey told Data Center Knowledge. "Don't do it. You need custom machines to effectively mine bitcoins and generate a real ROI."

But might a botnet composed of Android smartphones and tablets successfully mine altcoins? According to Lookout, based on current difficulty rates, it's 1 million times easier to mine Litecoin than Bitcoin, and more than 3.5 million times easier to mine Dogecoin than Bitcoin.

Based on the company's tests, however, today's smartphones simply aren't powerful enough to mine altcoins, either. Notably, running AndLTC mining software on a Nexus 4, researchers found that they could achieve about 8,000 hash calculations per second. But based on the difficulty level set for Litecoin (LTC), that capability "would net us 0.01 LTC after seven days non-stop mining," Rogers said. At today's exchange rates, that haul wouldn't even be worth 20 cents.

IT is turbocharging BYOD, but mobile security practices lag behind the growing risk. Also in the Mobile Security issue of InformationWeek: These seven factors are shaping the future of identity as we transition to a digital world. (Free registration required.)

Mathew Schwartz served as the InformationWeek information security reporter from 2010 until mid-2014. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
securityaffairs
50%
50%
securityaffairs,
User Rank: Ninja
3/30/2014 | 5:01:41 AM
mobile malware in the rise
Principal security firms agree on the fact that cybercrime, but also state sponsored actors, are targeting even more mobile platforms. 

Crypto currency mobile malware is the last family of malicious code that we are observing in the wild, but it's a just the beginning. Bad actors can benefit of large diffusion of mobile and of low level of awareness on cyber threats.

Mobile users are unaware of threats and have wrong habits that expose them to serious risks. On the other end the majority of app is not designed with security by design and the results are evident.

It's time to change the mentality otherwise mobile will be soon the paradise for hackers and criminals. 

Excellent post!
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Social engineering, ransomware, and other sophisticated exploits are leading to new IT security compromises every day. Dark Reading's 2016 Strategic Security Survey polled 300 IT and security professionals to get information on breach incidents, the fallout they caused, and how recent events are shaping preparations for inevitable attacks in the coming year. Download this report to get a look at data from the survey and to find out what a breach might mean for your organization.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Security researchers are finding that there's a growing market for the vulnerabilities they discover and persistent conundrum as to the right way to disclose them. Dark Reading editors will speak to experts -- Veracode CTO and co-founder Chris Wysopal and HackerOne co-founder and CTO Alex Rice -- about bug bounties and the expanding market for zero-day security vulnerabilities.