Vulnerabilities / Threats
3/2/2011
02:10 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Google Removes Malicious Android Apps

More than 50 apps in the Android Market have been identified as malicious, prompting Google to take steps to remove them.

Google on Wednesday confirmed that it has removed a number of Android apps from its Android Market for policy violations but declined to say how many apps it had removed.

The Android Market Developer Program Policies forbid the distribution of malicious software. Nonetheless, mobile security firm Lookout has identified over 50 apps in the Android Market infected with malware.

According to Lookout, a Reddit user going by the name "Lompolo" first reported problems with the software.

Lookout is calling the malware DroidDream. Another security firm, Kaspersky, says the malware tries to gather data about the user and his or her device, including product ID, device type, language, country, and userID, and then tries to upload this information to a remote server.

Unlike the way Apple reviews iOS apps, Google relies on Android users to flag apps they believe violate rules. Applications that have been flagged a certain number of times are then reviewed by Google staff and removed if necessary. The Android operating system is also designed to seek permission from the user before allowing apps to access certain information. Whether users adequately understand these notifications remains open to question.

Symantec says Android malware, such as Android.Geimini and Android.Pjapps, has been spotted recently in unofficial app stores. The trend has been for malware creators to bundle popular free apps with malware designed to steal user data.

This latest outbreak has affected the official Google Android Market. Symantec estimates that the infected apps have been downloaded between 50,000 and 200,000 times.

Google declined to comment on whether it could confirm any identity theft or other harm arising from the malware.

Back in August 2009, Google told the FCC, "Approximately 1% of all applications that have been uploaded to Android Market and subsequently made available to consumers subsequently have been taken down by Google." Not all of these removals are necessarily related to malware; some may represent other policy violations. Google declined to comment on whether this figure remains accurate.

That was when the Android Market had 6,000 apps. Today, that figure stands at over 270,000, according to AndroLib.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.