Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

CopyCat Malware Infects 14 Million Android Devices

A new malware strain is discovered with a novel approach to infecting Android handheld devices with adware.

Millions of Android devices have been hit with a new malware strain called CopyCat that uses a unique approach to injecting the devices with adware, according to a researcher with Check Point's mobile research team, which released its findings today in a blog post.

CopyCat's malware infected 14 million Android devices, with the majority hitting Asia (55%), followed by Africa (18%), and then the Americas (12%).

Check Point first ran across CopyCat in March, after one of its enterprise customers was attacked by the malware. However, the security company believes the CopyCat campaign hit its peak between April and May of 2016.

"While other adware [has existed] for a long time now, we can't really identify CopyCat with any known malware family, and it introduced new tactics which were never seen before," says Daniel Padon, a Check Point researcher, who noted it does not behave like other known adware families like HummingBad and Gooligan.

CopyCat is believed to have spread by phishing scams and repackaging popular apps with malware as users download them from third-party app stores, according to Check Point.

After infecting the Android device, it roots the device to take full control of it. The malware then injects the Zygote launching process app with code to begin installing unauthorized apps onto the device.

Adware Twist

What is novel about CopyCat is what happens once it detects that an unauthorized app has been installed. 

"The really interesting technology it uses to steal revenue is taking credit for advertising ads that led to installations of apps. It simply switches the real referrer's ID with its own once it detects an installation process," Padon explains.

By using a separate module to install the fraudulent apps and swapping out the referrer's ID, the cyberthieves get the credit – and the revenue – for having installed the app and displaying the fraudulent ads.

Check Point estimates the attackers who created CopyCat have generated $1.5 million in revenue. Check Point found CopyCat may have possible ties to MobiSummer, a Chinese ad network, but it is hard to determine if this group is involved with CopyCat intentionally, says Padon.

 [Source: Check Point]

Versions of Android 5 or earlier are vulnerable to rooting exploits, says Padon. He notes that Google estimates 60% of its mobile users are on Android 5 or earlier versions.

In addition to CopyCat, another Android malware strain that roots devices was recently discovered. Palo Alto Networks today noted it discovered SpyDealer, which gains root privilege using Baidu Easy Root and then steals sensitive data from more than 40 apps that may be loaded on the device. This malware affects Android devices with versions 2.2 to 4.4, which accounts fpr approximately 25% of Androids worldwide, according to Palo Alto Networks.

After Check Point made its discovery in March, it notified Google. And although the malware appears not to be coming from apps in the official Google Play store, Google was able to mitigate the CopyCat campaign, Check Point notes in its blog.

Although patches exist for all vulnerabilities used by CopyCat, Padon notes Android devices suffer from a severe lack of patching. That, in turn, makes it easier for attackers to install CopyCat.

Black Hat USA returns to the fabulous Mandalay Bay in Las Vegas, Nevada, July 22-27, 2017. Click for information on the conference schedule and to register.

 

Related Content:

Dawn Kawamoto is an Associate Editor for Dark Reading, where she covers cybersecurity news and trends. She is an award-winning journalist who has written and edited technology, management, leadership, career, finance, and innovation stories for such publications as CNET's ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/5/2020
Abandoned Apps May Pose Security Risk to Mobile Devices
Robert Lemos, Contributing Writer,  5/29/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9074
PUBLISHED: 2020-06-05
Huawei Smartphones HONOR 20 PRO;Honor View 20;HONOR 20 have an improper handling of exceptional condition Vulnerability. A component cannot deal with an exception correctly. Attackers can exploit this vulnerability by sending malformed message. This could compromise normal service of affected phones...
CVE-2020-9859
PUBLISHED: 2020-06-05
A memory consumption issue was addressed with improved memory handling. This issue is fixed in iOS 13.5.1 and iPadOS 13.5.1, macOS Catalina 10.15.5 Supplemental Update, tvOS 13.4.6, watchOS 6.2.6. An application may be able to execute arbitrary code with kernel privileges.
CVE-2020-11975
PUBLISHED: 2020-06-05
Apache Unomi allows conditions to use OGNL scripting which offers the possibility to call static Java classes from the JDK that could execute code with the permission level of the running Java process.
CVE-2020-12723
PUBLISHED: 2020-06-05
regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.
CVE-2020-1883
PUBLISHED: 2020-06-05
Huawei products NIP6800;Secospace USG6600;USG9500 have a memory leak vulnerability. An attacker with high privileges exploits this vulnerability by continuously performing specific operations. Successful exploitation of this vulnerability can cause service abnormal.