25 malicious apps  - Malicious 2BApps - 25 Malicious Apps with Over 2.1 Million Downloads in the Google Play

Researchers uncovered several malicious apps in the play poses as photo utility app and a fashion app. These malicious altogether found downloaded more than 2.1 million times.

All the 25 malicious apps are published form 22 different developer accounts, but all the apps have similar structure and content. This indicates the developers of the app are from the same group and developed the script from the same code base.

Malware Installation

Once the app installed it displays an icon on the screen, if opened then it downloads a remote configuration file from third-party service without user consent. The configuration file contains settings that “can toggle the app’s icon-hiding behavior, as well as other advertisement-related settings.”

- Figure 2B1 0 2B 25281 2529 - 25 Malicious Apps with Over 2.1 Million Downloads in the Google Play

The downloaded malware extracts the settings and applies to the app. The malware code contains keywords “such as “app_hideIcon” in the case of the icon-hiding feature, are encoded and encrypted. To avoid detection by antivirus scanners.”

Once the app icon got hidden from the device screen it starts displaying advertisements, these advertisements continue to show even the app is closed.

- Malicious 2Bapps1 - 25 Malicious Apps with Over 2.1 Million Downloads in the Google Play

“Full-screen advertisements are displayed at random intervals with no app title registered in the advertisement window, so users have no way of knowing which app is responsible for the behavior.”

These illicit apps generate revenue to its developers by infecting the user’s device, they generate ads randomly which makes hard for end-users to determine which app is responsible for it.

To play more stealthy, one developer published two identical apps in the store one is the clean and the second one packed with malicious code. In another scenario, they created a malicious copy of the trending apps.

“Unlike the previously hidden app malware we discovered, this batch does not have the icon-hiding function hardcoded in the APK. Instead, the switch is controlled remotely via the downloaded configuration file, allowing the malware developer to evade Google Play’s rigorous security testing.”

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.





Source link

No tags for this post.

LEAVE A REPLY

Please enter your comment!
Please enter your name here