Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

9/22/2015
09:00 AM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Run, Jump, Shoot, Infect: Trojanized Games Invade Google Play

ESET Researchers find Trojan Mapin bundled with games that look like popular titles such as Plants vs. Zombies and Candy Crush.

A newly discovered mobile sneak attack has taken aim at casual gaming fans with a ploy to repackage mobile Trojans with games on Google Play that look like popular titles: Plants vs. zombies, Candy crush, Jewel crush, and Super Maria Adventure, are among some of these malicious apps. While they've now been taken off the Google Play store, these Trojanized apps were there for a year-and-a-half and remain proliferated in third-party app stores.

Introduced to Google Play as early as 2013, the Trojanized apps silently drop another app called systemdata or resourcea with permission from the user -- by masquerading as a request to install a "Manage Settings" app. Its real identity is a Trojan called Android/Mapin, which runs thereafter on the infected device in the background as a service.

[By 2020 there will be 25 billion Internet of Things devices...all full of vulnerabilities. What can we do to solve the problem now? Don't miss the next episode of Dark Reading Radio, "Fixing IoT Security," this Wednesday, Sep. 23 at 1 p.m. Eastern Time.]

This piece of malware is a backdoor Trojan designed to put infected devices under the thumb of a botmaster. Interestingly, with Trojanized apps growing in popularity, the creator of Mapin built in the means of flying under the radar of gamers who might be suspicious of their new apps.

"The Trojan sets timers that delay the execution of the malicious payload. This is to make it less obvious that the trojanised game is responsible for the suspicious behavior," explains Lukáš Štefanko, malware researcher at ESET. "In some variants of this infiltration, at least three days must elapse before the malware achieves full Trojan functionality."

ESET researchers believe this delay probably is what also made it possible to evade Google's Bouncer malware prevention system. Mapin contains functionalities to push notifications, download, install, and launch apps and get access to private information on the device. Its primary reason for existence, though, seems to be displaying full-screen ads on the infected device.

"It can enable or disable interstitial or banner ads, change the publisher ID for displayed ads, choose whether or not to display ads to the user, change the delay time between ads being shown, install, download and launch applications, push notifications, revoke device admin rights, change the server with which the malware communicates, and create shortcuts on the home screen to URLs that install downloaded applications," explains Štefanko.

According to ESET, Mapin's rise is a good lesson in only trusting applications from well-known and respected publishers.

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
lorine34
50%
50%
lorine34,
User Rank: Strategist
10/19/2015 | 11:52:45 AM
Re: Who to blame?
Trojanized Games Invade many plateforms
amitsaga
50%
50%
amitsaga,
User Rank: Apprentice
9/27/2015 | 5:34:38 PM
whom to blame
Interesting view. My view is that, there is no reason to blame anyone..
nomii
50%
50%
nomii,
User Rank: Apprentice
9/24/2015 | 12:42:32 PM
Re: Who to blame?

Failing to clean up the site is a big negative for the site runners. They must have lost a large part of users who thinks that what if other games are also infected. These sites need to work to win back the trust of its users which is fast moving away. Google play store is a big banner and people trust its reputation. If these things can happen at their site I am afraid what will be the condidtion of the site which are not very popular. ?

nomii
50%
50%
nomii,
User Rank: Apprentice
9/24/2015 | 12:38:24 PM
Who to blame?

Interesting. I am not sure whom to bame here. Either its the management of google play store or the user. The sufferers are eventually the end users. These kind of malicious softwares seems to be there for ever. The remidial measures are always launched after the trojan has bloomed to millions. Does it sound any alarm on wrong intentions. I am really sensing something fishy in that. Do you?

COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/21/2020
Hacking Yourself: Marie Moe and Pacemaker Security
Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning,  9/21/2020
Startup Aims to Map and Track All the IT and Security Things
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15930
PUBLISHED: 2020-09-24
An XSS issue in Joplin desktop 1.0.190 to 1.0.245 allows arbitrary code execution via a malicious HTML embed tag.
CVE-2020-19447
PUBLISHED: 2020-09-24
SQL injection exists in the jdownloads 3.2.63 component for Joomla! com_jdownloads/models/send.php via the f_marked_files_id parameter.
CVE-2020-3560
PUBLISHED: 2020-09-24
A vulnerability in Cisco Aironet Access Points (APs) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) on an affected device. The vulnerability is due to improper resource management while processing specific packets. An attacker could exploit this vulnerability by s...
CVE-2020-3509
PUBLISHED: 2020-09-24
A vulnerability in the DHCP message handler of Cisco IOS XE Software for Cisco cBR-8 Converged Broadband Routers could allow an unauthenticated, remote attacker to cause the supervisor to crash, which could result in a denial of service (DoS) condition. The vulnerability is due to insufficient error...
CVE-2020-3510
PUBLISHED: 2020-09-24
A vulnerability in the Umbrella Connector component of Cisco IOS XE Software for Cisco Catalyst 9200 Series Switches could allow an unauthenticated, remote attacker to trigger a reload, resulting in a denial of service condition on an affected device. The vulnerability is due to insufficient error h...