Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

7/9/2020
04:50 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

'Joker' Android Malware Pulls Another Trick to Land on Google's Play Store

Authors of the malware, which signs up mobile users for premium services, are repeatedly finding ways to bypass app review checks.

The authors of a particularly persistent Android malware family called "Joker" have once again found a way to sneak their product into Google's official Play mobile app store.

The malware (aka "Bread") is known for subscribing mobile users to premium content without their knowledge and has been floating around since at least early 2017.

Google security researchers previously described Joker as malware that was originally designed for SMS fraud but is now being used for large-scale billing fraud. According to the company, the creators of Joker "have at some point used just about every cloaking and obfuscation technique under the sun in an attempt to go undetected."

The latest gambit to sneak Joker into the Play store actually involves an old technique used in the conventional PC threat landscape, according to researchers from Check Point.

Aviran Hazum, team leader of Check Point's Mobile Malware and Threat Intelligence Team, says the authors of Joker beat Google's security controls this time by hiding the malicious payload in a file called the "Android Manifest" file.

"Without this file, an [Android] application cannot be installed or executed," he says.

Instead of having the Joker dropper downloading the malicious payload from a remote command-and-control server, the newest version just reads developer-inserted fields in the Manifest file, he says. The payload was not executed — or decoded — while the app went through Google's security inspection process when being uploaded to the Play Store.

"So the malware was able to bypass Google's inspection," Hazum says. "In general, Joker is not an easy malware to detect, and on top of that the actor is spending constant efforts to bypass those protections."

Other tricks that Joker has employed to evade detection include geolocation checks to target or avoid specific countries and implementation of malicious behavior in native code.

According to Google, as of January 2020, the company's Play mobile app store security controls had detected and removed at least 1,700 unique Android apps containing Joker.

In the past, the creators of Joker have hidden the malware in seemingly legitimate apps, such as filters, animations, and other camera utility apps. This time around, the malware was hidden in software posing as messaging apps for Android.

"The apps themselves are not legitimate — they are actor-created," Hazum says. "But they do provide some sort of functionality."

Persistent Problem
Once the fake app is installed on a system, it uses code downloaded from a command-and-control server to register users to premium services. It then takes advantage of an Android feature called "Notification Listener" to quietly intercept and kill any registration confirmation notifications that might be sent to the unsuspecting user's device.

"Notification Listener is a service that is called by the operating system whenever a notification event occurs," Hazum says.

By using the service, Joker is able to read the content of all incoming notifications, including SMS notifications. This allows the malware to intercept and remove any registration verification codes that might be sent to the Android user, thereby keeping them in the dark about what had just happened, he noted.

Both Google and Apple have spent considerable efforts deploying layered security controls to prevent developers from uploading malware-laden applications to their respective mobile app stores. Security researchers generally agree the app review efforts have made the stores, particularly the Apple App Store, considerably more secure in recent years. The number of malicious apps — as a proportion of the overall number of application on these app stores — still remains very small.

Even so, bad actors have been able to continue uploading malicious software — mainly to Google Play — relatively frequently. In 2019, for instance, RiskIQ detected 25,647 apps on the Google Play Store as being malicious. Though the number represented a more than 76% decline from the 108,770 malicious applications detected in 2018, it still presented a risk to users who trusted the store to be safe.

"Google and Apple invest a lot in security research, but that's not enough," Hazum says. "As we have shown time after time, malware is  still able to bypass market security," he says. "Security vulnerabilities are discovered in a constant basis, and if your device is not patched, you are vulnerable."

Related Content:

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Exploiting Google Cloud Platform With Ease
Dark Reading Staff 8/6/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-16219
PUBLISHED: 2020-08-07
Delta Electronics TPEditor Versions 1.97 and prior. An out-of-bounds read may be exploited by processing specially crafted project files. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.
CVE-2020-16221
PUBLISHED: 2020-08-07
Delta Electronics TPEditor Versions 1.97 and prior. A stack-based buffer overflow may be exploited by processing a specially crafted project file. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.
CVE-2020-16223
PUBLISHED: 2020-08-07
Delta Electronics TPEditor Versions 1.97 and prior. A heap-based buffer overflow may be exploited by processing a specially crafted project file. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.
CVE-2020-16225
PUBLISHED: 2020-08-07
Delta Electronics TPEditor Versions 1.97 and prior. A write-what-where condition may be exploited by processing a specially crafted project file. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.
CVE-2020-16227
PUBLISHED: 2020-08-07
Delta Electronics TPEditor Versions 1.97 and prior. An improper input validation may be exploited by processing a specially crafted project file not validated when the data is entered by a user. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute a...