Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

7/9/2020
04:50 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

'Joker' Android Malware Pulls Another Trick to Land on Google's Play Store

Authors of the malware, which signs up mobile users for premium services, are repeatedly finding ways to bypass app review checks.

The authors of a particularly persistent Android malware family called "Joker" have once again found a way to sneak their product into Google's official Play mobile app store.

The malware (aka "Bread") is known for subscribing mobile users to premium content without their knowledge and has been floating around since at least early 2017.

Google security researchers previously described Joker as malware that was originally designed for SMS fraud but is now being used for large-scale billing fraud. According to the company, the creators of Joker "have at some point used just about every cloaking and obfuscation technique under the sun in an attempt to go undetected."

The latest gambit to sneak Joker into the Play store actually involves an old technique used in the conventional PC threat landscape, according to researchers from Check Point.

Aviran Hazum, team leader of Check Point's Mobile Malware and Threat Intelligence Team, says the authors of Joker beat Google's security controls this time by hiding the malicious payload in a file called the "Android Manifest" file.

"Without this file, an [Android] application cannot be installed or executed," he says.

Instead of having the Joker dropper downloading the malicious payload from a remote command-and-control server, the newest version just reads developer-inserted fields in the Manifest file, he says. The payload was not executed — or decoded — while the app went through Google's security inspection process when being uploaded to the Play Store.

"So the malware was able to bypass Google's inspection," Hazum says. "In general, Joker is not an easy malware to detect, and on top of that the actor is spending constant efforts to bypass those protections."

Other tricks that Joker has employed to evade detection include geolocation checks to target or avoid specific countries and implementation of malicious behavior in native code.

According to Google, as of January 2020, the company's Play mobile app store security controls had detected and removed at least 1,700 unique Android apps containing Joker.

In the past, the creators of Joker have hidden the malware in seemingly legitimate apps, such as filters, animations, and other camera utility apps. This time around, the malware was hidden in software posing as messaging apps for Android.

"The apps themselves are not legitimate — they are actor-created," Hazum says. "But they do provide some sort of functionality."

Persistent Problem
Once the fake app is installed on a system, it uses code downloaded from a command-and-control server to register users to premium services. It then takes advantage of an Android feature called "Notification Listener" to quietly intercept and kill any registration confirmation notifications that might be sent to the unsuspecting user's device.

"Notification Listener is a service that is called by the operating system whenever a notification event occurs," Hazum says.

By using the service, Joker is able to read the content of all incoming notifications, including SMS notifications. This allows the malware to intercept and remove any registration verification codes that might be sent to the Android user, thereby keeping them in the dark about what had just happened, he noted.

Both Google and Apple have spent considerable efforts deploying layered security controls to prevent developers from uploading malware-laden applications to their respective mobile app stores. Security researchers generally agree the app review efforts have made the stores, particularly the Apple App Store, considerably more secure in recent years. The number of malicious apps — as a proportion of the overall number of application on these app stores — still remains very small.

Even so, bad actors have been able to continue uploading malicious software — mainly to Google Play — relatively frequently. In 2019, for instance, RiskIQ detected 25,647 apps on the Google Play Store as being malicious. Though the number represented a more than 76% decline from the 108,770 malicious applications detected in 2018, it still presented a risk to users who trusted the store to be safe.

"Google and Apple invest a lot in security research, but that's not enough," Hazum says. "As we have shown time after time, malware is  still able to bypass market security," he says. "Security vulnerabilities are discovered in a constant basis, and if your device is not patched, you are vulnerable."

Related Content:

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/23/2020
7 Tips for Choosing Security Metrics That Matter
Ericka Chickowski, Contributing Writer,  10/19/2020
Russian Military Officers Unmasked, Indicted for High-Profile Cyberattack Campaigns
Kelly Jackson Higgins, Executive Editor at Dark Reading,  10/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-24847
PUBLISHED: 2020-10-23
A Cross-Site Request Forgery (CSRF) vulnerability is identified in FruityWifi through 2.4. Due to a lack of CSRF protection in page_config_adv.php, an unauthenticated attacker can lure the victim to visit his website by social engineering or another attack vector. Due to this issue, an unauthenticat...
CVE-2020-24848
PUBLISHED: 2020-10-23
FruityWifi through 2.4 has an unsafe Sudo configuration [(ALL : ALL) NOPASSWD: ALL]. This allows an attacker to perform a system-level (root) local privilege escalation, allowing an attacker to gain complete persistent access to the local system.
CVE-2020-5990
PUBLISHED: 2020-10-23
NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in the ShadowPlay component which may lead to local privilege escalation, code execution, denial of service or information disclosure.
CVE-2020-25483
PUBLISHED: 2020-10-23
An arbitrary command execution vulnerability exists in the fopen() function of file writes of UCMS v1.4.8, where an attacker can gain access to the server.
CVE-2020-5977
PUBLISHED: 2020-10-23
NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in NVIDIA Web Helper NodeJS Web Server in which an uncontrolled search path is used to load a node module, which may lead to code execution, denial of service, escalation of privileges, and information disclosure.