Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

9/22/2015
09:00 AM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Run, Jump, Shoot, Infect: Trojanized Games Invade Google Play

ESET Researchers find Trojan Mapin bundled with games that look like popular titles such as Plants vs. Zombies and Candy Crush.

A newly discovered mobile sneak attack has taken aim at casual gaming fans with a ploy to repackage mobile Trojans with games on Google Play that look like popular titles: Plants vs. zombies, Candy crush, Jewel crush, and Super Maria Adventure, are among some of these malicious apps. While they've now been taken off the Google Play store, these Trojanized apps were there for a year-and-a-half and remain proliferated in third-party app stores.

Introduced to Google Play as early as 2013, the Trojanized apps silently drop another app called systemdata or resourcea with permission from the user -- by masquerading as a request to install a "Manage Settings" app. Its real identity is a Trojan called Android/Mapin, which runs thereafter on the infected device in the background as a service.

[By 2020 there will be 25 billion Internet of Things devices...all full of vulnerabilities. What can we do to solve the problem now? Don't miss the next episode of Dark Reading Radio, "Fixing IoT Security," this Wednesday, Sep. 23 at 1 p.m. Eastern Time.]

This piece of malware is a backdoor Trojan designed to put infected devices under the thumb of a botmaster. Interestingly, with Trojanized apps growing in popularity, the creator of Mapin built in the means of flying under the radar of gamers who might be suspicious of their new apps.

"The Trojan sets timers that delay the execution of the malicious payload. This is to make it less obvious that the trojanised game is responsible for the suspicious behavior," explains Lukáš Štefanko, malware researcher at ESET. "In some variants of this infiltration, at least three days must elapse before the malware achieves full Trojan functionality."

ESET researchers believe this delay probably is what also made it possible to evade Google's Bouncer malware prevention system. Mapin contains functionalities to push notifications, download, install, and launch apps and get access to private information on the device. Its primary reason for existence, though, seems to be displaying full-screen ads on the infected device.

"It can enable or disable interstitial or banner ads, change the publisher ID for displayed ads, choose whether or not to display ads to the user, change the delay time between ads being shown, install, download and launch applications, push notifications, revoke device admin rights, change the server with which the malware communicates, and create shortcuts on the home screen to URLs that install downloaded applications," explains Štefanko.

According to ESET, Mapin's rise is a good lesson in only trusting applications from well-known and respected publishers.

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
lorine34
50%
50%
lorine34,
User Rank: Strategist
10/19/2015 | 11:52:45 AM
Re: Who to blame?
Trojanized Games Invade many plateforms
amitsaga
50%
50%
amitsaga,
User Rank: Apprentice
9/27/2015 | 5:34:38 PM
whom to blame
Interesting view. My view is that, there is no reason to blame anyone..
nomii
50%
50%
nomii,
User Rank: Apprentice
9/24/2015 | 12:42:32 PM
Re: Who to blame?

Failing to clean up the site is a big negative for the site runners. They must have lost a large part of users who thinks that what if other games are also infected. These sites need to work to win back the trust of its users which is fast moving away. Google play store is a big banner and people trust its reputation. If these things can happen at their site I am afraid what will be the condidtion of the site which are not very popular. ?

nomii
50%
50%
nomii,
User Rank: Apprentice
9/24/2015 | 12:38:24 PM
Who to blame?

Interesting. I am not sure whom to bame here. Either its the management of google play store or the user. The sufferers are eventually the end users. These kind of malicious softwares seems to be there for ever. The remidial measures are always launched after the trojan has bloomed to millions. Does it sound any alarm on wrong intentions. I am really sensing something fishy in that. Do you?

News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-23381
PUBLISHED: 2021-04-18
This affects all versions of package killing. If attacker-controlled user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
CVE-2021-23374
PUBLISHED: 2021-04-18
This affects all versions of package ps-visitor. If attacker-controlled user input is given to the kill function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
CVE-2021-23375
PUBLISHED: 2021-04-18
This affects all versions of package psnode. If attacker-controlled user input is given to the kill function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
CVE-2021-23376
PUBLISHED: 2021-04-18
This affects all versions of package ffmpegdotjs. If attacker-controlled user input is given to the trimvideo function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
CVE-2021-23377
PUBLISHED: 2021-04-18
This affects all versions of package onion-oled-js. If attacker-controlled user input is given to the scroll function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.