Mobile
6/18/2014
04:18 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Malicious Google Play Clone Steals Banking Credentials

Google, FireEye disrupt sneaky Android malware operation.

FireEye and Google have dismantled part of a mobile malware operation that stole online banking credentials from Android users via a malicious and stealthy app posing as Google Play.

The malicious Android app has infected at least 200 victims in the past 30 days, and appears to be targeting Korean-speaking victims. So far, only three of fifty-one antivirus programs can detect the malware, which has a Korean-language user interface, according to FireEye. It's tough for AV to spot because the malware is encrypted behind the app's user interface.

The app uses an icon that looks like Google Play's icon, and sits on the mobile device home screen as an attempt to fool or confuse the user into clicking on it rather than on Google Play. Once it's clicked on and activated, it steals the user's text messages, signature certificates, and online banking passwords from the device.

One of the more confounding features of the app -- called Google App Stoy -- is that its "uninstall" function doesn't actually remove the app. Even if the user kills the app services in the back-end, they restart when the Android device is restarted.

(Image: FireEye)
(Image: FireEye)

"It disguises itself and evades detection better than most malware apps pretending to be legitimate ones by preventing users from removing it and encrypting and compressing the real malware until after the app is downloaded and opened," Jinjian Zhai, a mobile security researcher with FireEye who has analyzed the malware, says in an email interview. "Furthermore, it steals SMS, certificate, and bank account information using well-encrypted Gmail SSL protocol, allowing it to further evade detection."

Zhai says FireEye enlisted the help of Google to take down the attackers' Gmail accounts, where they were sending the stolen information from the victims' phones. "Gmail is using the SSL protocol, which can help hackers evade the traditional network detection," Zhai says.

But even with the attackers' Gmail accounts now taken down, the operation could easily retrench, he says. "We can only work with Google to stop the hackers' Gmail. But they still have HTTP servers online. They can also easily change the Gmail account to publish new malware," he says.

[UPDATED 6/19/2014:] This isn't the first time the malware has been spotted, however. Jeremy Linden, senior security product manager at mobile security firm Lookout Security says this malware has been circulating since late 2013. Lookout calls it PlayBanker, but it's also known as FakeKRB or FakeKRBank. "Banking malware has become quite advanced in Korea due to the prevalence of mobile banking in that region. There are several large prominent families that have been extensively covered in the Android malware world. This variant is very similar to previous variants of PlayBanker in its functionality, with the major change being in the obfuscation method. That is, the app hides the malicious code in asset files," Linden says.

That obfuscation has been in use in otehr Android malware variants, he says. "Lookout first saw this approach used in April 2012 when we identified new variants of Legacy Native that used a very similar method to conceal the malicious payload in an otherwise-functional image file. It is clear that the significant potential for financial gain will continue to motivate malware developers in Korea and elsewhere to try new techniques to conceal their activities in the future," he says.

To kill the infection, victims should deactivate the app in the Device Administrator settings and then uninstall it, he says.

Meanwhile, just how victims initially become infected with the new malicious Google Play app is unclear. FireEye's Zhai says his firm received the sample from one of its customers, so didn't get any intelligence on the download lure. "However, the actual infection occurs after the app is downloaded and initially opened, which, when disguised as the official Google Play app, is an easy trick for a user to fall for," he says.

Even having two Google Play-looking icons on a screen can fool a busy or distracted user. "Sometimes the icons are not on the same page," which would make it even more likely the malicious one would be chosen, he says.

The attackers use a dynamic DNS server with SSL-enabled Gmail to gather the stolen information, and change their HTTP servers regularly.

"We have only found evidence in the last 30 days on about 200 victims. The older evidence has been removed by the hacker," he says.

The full technical analysis by FireEye is here.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
DNS Threats: What Every Enterprise Should Know
Domain Name System exploits could put your data at risk. Here's some advice on how to avoid them.
Flash Poll
Containing Corporate Data on Mobile Devices
Containing Corporate Data on Mobile Devices
If you’re still focused on securing endpoints, you’ve got your work cut out for you. WiFi network provider iPass surveyed 1,600 mobile workers and found that the average US employee carries three devices -- a smartphone, a computer, and a tablet or e-reader -- with more than 80% of them doing work on personal devices.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio

The cybersecurity profession struggles to retain women (figures range from 10 to 20 percent). It's particularly worrisome for an industry with a rapidly growing number of vacant positions.

So why does the shortage of women continue to be worse in security than in other IT sectors? How can men in infosec be better allies for women; and how can women be better allies for one another? What is the industry doing to fix the problem -- what's working, and what isn't?

Is this really a problem at all? Are the low numbers simply an indication that women do not want to be in cybersecurity, and is it possible that more women will never want to be in cybersecurity? How many women would we need to see in the industry to declare success?

Join Dark Reading senior editor Sara Peters and guests Angela Knox of Cloudmark, Barrett Sellers of Arbor Networks, Regina Wallace-Jones of Facebook, Steve Christey Coley of MITRE, and Chris Roosenraad of M3AAWG on Wednesday, July 13 at 1 p.m. Eastern Time to discuss all this and more.