Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

More Android Malware Pulled From Google Play

Disguised as Mario Bros. and Grand Theft Auto games, the malware downloaded itself in stages to evade Google's automated security checks.

Google has pulled from Google Play two malicious Android apps that were disguised as legitimate versions of popular Mario Brothers and Grand Theft Auto titles.

According to Symantec, which recently spotted the apps and alerted Google, they were first added to Google Play on June 24 and had since been downloaded between 50,000 and 100,000 times. One was packaged as "Super Mario Bros.," while the other was titled "GTA 3 Moscow City," which also offers a clue to the geographic location of targeted Android users.

In reality, both apps were a Trojan app known as Dropdialer. Once installed, Dropdialer downloads an additional package, "Activator.apk," via file-sharing website Dropbox. The secondary payload allows the malware to send messages to premium-rate SMS numbers in Eastern Europe, in a type of attack often referred to as toll fraud. The malware then uninstalls the secondary payload, helping to disguise what it's been up to.

[ A security researcher has discovered an Android botnet that hijacks Android devices and turns them into spam servers. Read about it here: Android Botnet Seen Spewing Spam. ]

"What is most interesting about this Trojan is the fact that the threat managed to stay on Google Play for such a long time, clocking up some serious download figures before being discovered," said Symantec security researcher Irfan Asrar in a blog post. "Our suspicion is that this was probably due to the remote payload employed by this Trojan."

By breaking up the malicious payload into pieces, the malware's developer was able to sneak it past the automated Google Bouncer malware-checking service that reviews apps before they can be added to Google Play. "The idea is simple: instead of having one payload that carries all of the malicious code for any given attack, break the threat into separate modules that can be delivered independently," said Asrar, in an overview of the technique he published last year.

Breaking malicious applications into pieces offers numerous additional benefits to attackers. "First, it obviates the telltale sign of a huge, overzealous permissions list accompanying the installation of the threat, which may alarm the user as to the intention of the malicious app," he said. "Secondly, smaller pieces are easier to hide and inject into other apps. Furthermore, dispersing the attack across separate apps complicates the integrated revocation processes from the service provider, marketplace, etc."

One mitigating factor with most Android malware is that users must first approve the app's installation, as well as its permission requests. Hence attackers, via a social-engineering attack, often disguise their malware as well-known software, and especially as "free" versions of these applications.

In the case of the Dropdialer apps recently discovered on Google Play, users had multiple opportunities to prevent the malicious software from executing. "After installation, the first application shows a notification in Russian informing the user that the application must be activated. The application mentions that by activating the application the user agrees to a set of rules. If a user chooses to read these rules--which are also in Russian--they provide very vague information regarding how much a user will be charged," read an analysis of the malware published by mobile security firm Lookout.

After the user agrees, the app downloads its secondary payload, which again triggers an Android warning. "A normal Android system installation message appears, asking if the user would like to install the application, which includes permissions to send SMS," said Lookout.

Occasionally, however, attackers do find ways to install malicious apps automatically. For example, the malicious Android application jSMSHider--targeting Chinese users--was designed to infect smartphones using custom ROMs, which are custom-built Android distributions. In particular, attackers targeted a vulnerability related to the Android Open Source Project (AOSP), which uses "publicly available private keys ... to sign the custom ROM builds," according to an analysis of the malware published by Lookout.

These keys are used to authorize updates for the custom ROM. In a move reminiscent of the Flame malware, which used a spoofed Windows certificate to automatically install itself on targeted PCs via the Windows Update mechanism, jSMSHider could be delivered to custom ROM builds disguised as a system update, allowing the software--which eavesdrops on SMS communications--to automatically install itself. Oftentimes, the malware could then install secondary payloads, adding further attack functionality.

Reached for comment, Google declined to offer specifics on the Dropdialer-in-disguise app takedowns. "We remove applications that violate our policies, such as apps that are illegal or that promote hate speech," said a Google spokesman via email. "We don’t comment on individual applications--however, you can check out our policies for more information."

In addition to enforcing those policies, Google last year--in the wake of security firms noting an alarming rise in Android malware--unveiled Bouncer. Bouncer, however, isn't foolproof. For starters, it's automated. In comparison, Apple employs teams of application reviewers, who hand-screen all iOS apps before they're allowed into the Apple App Store. To date, only one malicious app, "Find and Call,"--as well as one proof-of-concept attack authored by security researcher Charlie Miller--appears to have snuck by those reviewers.

By comparison, Google regularly needs to excise malicious apps--often aimed at perpetrating premium SMS toll fraud--from Google Play, but only after they've been spotted, downloaded, and apparently infected Android devices, thus generating fraudulent profits for attackers.

Black Hat USA Las Vegas, the premiere conference on information security, features four days of deep technical training followed by two days of presentations from speakers discussing their latest research around a broad range of security topics. At Caesars Palace in Las Vegas, July 21-26. Register today.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Andrew Hornback
50%
50%
Andrew Hornback,
User Rank: Apprentice
7/12/2012 | 2:20:49 AM
re: More Android Malware Pulled From Google Play
As long as there's money to be made in dupe-ing the end user of a new technology that they may have limited understanding about, there will always be a criminal element waiting to take advantage of them - and no matter how many security interlocks you put between the user and the criminal, someone will always find a way around them.

So, it looks like Google is happy with the idea of automating their process and just chalking up those who get damaged by the applications that get by their process as collateral damage. Apple's examining every application that comes in, by hand, and still doesn't have a perfect record.

With regards to the new attack vector discussed here, with applications being downloaded in pieces from various sites, etc., wouldn't it be possible (in a testing lab) to look at the data coming into and going out of the Android session to determine what the application is actually doing? If it was in the PC world, a simple network sniffer would be able to tell you all you'd need to know in very short order.

Andrew Hornback
InformationWeek Contributor
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Introducing 'Secure Access Service Edge'
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  7/3/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15001
PUBLISHED: 2020-07-09
An information leak was discovered on Yubico YubiKey 5 NFC devices 5.0.0 to 5.2.6 and 5.3.0 to 5.3.1. The OTP application allows a user to set optional access codes on OTP slots. This access code is intended to prevent unauthorized changes to OTP configurations. The access code is not checked when u...
CVE-2020-15092
PUBLISHED: 2020-07-09
In TimelineJS before version 3.7.0, some user data renders as HTML. An attacker could implement an XSS exploit with maliciously crafted content in a number of data fields. This risk is present whether the source data for the timeline is stored on Google Sheets or in a JSON configuration file. Most T...
CVE-2020-15093
PUBLISHED: 2020-07-09
The tough library (Rust/crates.io) prior to version 0.7.1 does not properly verify the threshold of cryptographic signatures. It allows an attacker to duplicate a valid signature in order to circumvent TUF requiring a minimum threshold of unique signatures before the metadata is considered valid. A ...
CVE-2020-15299
PUBLISHED: 2020-07-09
A reflected Cross-Site Scripting (XSS) Vulnerability in the KingComposer plugin through 2.9.4 for WordPress allows remote attackers to trick a victim into submitting an install_online_preset AJAX request containing base64-encoded JavaScript (in the kc-online-preset-data POST parameter) that is execu...
CVE-2020-4173
PUBLISHED: 2020-07-09
IBM Guardium Activity Insights 10.6 and 11.0 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure l...