NetMag Global
Google play discovers files with malicious backdoor

Google play discovers files with malicious backdoor

About 24 or so applications with more than 2 million downloads have been removed from the Google Play market after researchers found they contained a device-draining backdoor that allowed them to surreptitiously download files from an attacker-controlled server. The 24 or so titles included Sparkle Flashlight, a flashlight app that had been downloaded more than 1 million times since it entered Google Play sometime in 2016 or 2017, antivirus provider Sophos said in a blog post published recently. Starting March 2018, Sparkle Flashlight and two other applications were updated to add the secret downloader. The remaining 19 apps were made available after June and contained the downloader from the start.

By the time Google removed the apps in late November, they were being used to click endlessly on fraudulent ads. “Andr/Clickr-ad,” as Sophos has dubbed the family of apps, automatically started and ran even after a user force-closed them, functions that caused the apps to consume huge amounts of bandwidth and drain batteries. In Thursday’s post, Sophos researcher Chen Yu wrote, “Andr/Clickr-ad is a well-organized, persistent malware that has the potential to cause serious harm to end users, as well as the entire Android ecosystem. These apps generate fraudulent requests that cost ad networks significant revenue as a result of the fake clicks.”

From the user’s perspective, these apps drain their phone’s battery and may cause data overages as the apps are constantly running and communicating with servers in the backgd. Furthermore, the devices are fully controlled by the C2 server and can potentially install any malicious modules upon the instructions of the server. The apps worked by reporting to an attacker-controlled domain, mobbt.com, where the infected phones would download ad-fraud modules and receive specific commands every 80 seconds. The modules caused the phones to click on huge numbers of links that hosted fraudulent apps. To prevent users from suspecting their phones were infected, the apps displayed the ads in a window that was zero pixels high and zero wide. To give defrauded advertisers the false impression the clicks were coming from a much larger pool of authentic users, Andr/Clickr-ad manipulated user-agent strings to pose as a wide variety of apps running on a wide variety of phones, including iPhones. The following image shows a malicious app running on an Android virtual device identifying itself as running on an iPhone.

Must Read: OPPO Completes World’s First 5G Multi party Video Callon a Smartphone

Many of the malicious Google Play apps were made by developers who had titles in the iOS App Store. In all, Sophos observed server data causing the fraudulent clicks to appear as if they were coming from Apple models ranging from the iPhone 5 to 8 plus and from 249 different forged models from 33 distinct brands of Android phones (purportedly) running Android OS versions ranging from 4.4.2 to 7.x. The false user-agent data likely served several purposes. First, the iPhone labels may have allowed the scammers to fetch higher prices, since some advertisers will pay premiums when their ads are viewed by iPhone users. Second (and more importantly), the false labeling gave the impression the ads were being clicked on by a much larger number of devices.

Thursday’s post is the latest evidence that Google can’t proactively police its own market for apps that pose a serious security threat, though in fairness the company is very quick to remove titles once they’re reported. While Google removed the malicious apps on November 25, it’s not clear that all phones that downloaded them have been disinfected. Google representatives didn’t respond to an email asking about this. Android has the ability to automatically remove apps that are later found to be abusive, but it’s worth manually checking. Android users should be highly selective about the apps they install. Carefully reading reviews can sometimes help, but the rave reviews many of the Andr/Clickr-ad apps received underscores the limits to this measure. Ultimately, the advice that makes the most sense is to install as few apps as possible, particularly if, as is the case with flashlight apps, the same function is offered inside the Android OS itself.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *