Rogue Android app sent personal info to legit version's developer, claims AVAST
Developer denies he created the app to humiliate pirates
Computerworld - A malicious Android app that shamed users for pirating software transmitted personal information to a URL controlled by the legitimate app's developer, a security company said today.
The developer of "Walk and Text," the app whose code was recompiled and re-released on numerous file-sharing sites, denied the claim by AVAST Software, an anti-virus firm based in Prague.
Walk and Text, which costs $1.54 to download from the official Android Market, uses the smartphone's camera to show what's in front of users as they simultaneously walk and text, theoretically preventing them from slamming into signposts or stepping off curbs into traffic.
The Trojanized version of the app includes malicious code that texts an embarrassing anti-piracy message to each contact in the phone's address book.
"Hey, just downlaoded [sic] a pirated App off the Internet," the message reads. "Walk and Text for Android. Im [sic] stupid and cheap, it costed [sic] only 1 buck. Don't steal like I did!"
The rogue app -- which Symantec yesterday named "Android.Walkinwat" and identified as a Trojan horse -- also pilfers personal data from the phone, including the phone number and the device's unique identifier, and sends it to a remote server.
According to AVAST, that data was sent to a URL controlled by Georgi Tanmazov, the CEO of Incorporate Apps, and the developer of Walk and Text, as well as other Android apps.
"It was very obvious that the information went to his URL," said Vincent Steckler, the CEO of AVAST in an interview Friday. "Was there something receiving the information? [Tanmazov] said there was not. But from what we could see, yes, there was something there receiving the information."
Tanmazov flatly denied that he created the malicious version of Walk and Text.
"AVAST has indeed claimed there is a link to our servers, but there was no such file on our servers, and logs could probably prove this," said Tanmazov in an e-mail interview, also on Friday. "There is also no personal information being saved on our servers and this could also easily be proven."
Steckler said that he has yet to see that proof, and called on Tanmazov to share his server logs.
When asked if he would share the logs, Tanmazov agreed, but said he wasn't sure that such logs exist.
"The Web site is on a really cheap shared server and they delete stuff after three days I think," he said. "You understand that if we do have logs those are text files that could be altered so this will also not prove anything."
AVAST and Tanmazov have been at odds for more than a week, when AVAST blogged about the malicious version of Walk and Text that researchers found on the Internet.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Performance Management: The Mobile App Development Playbook This comprehensive 16 page Forrester Research, Inc. report, authored by Jeffrey Hammond, Forrester VP and Principal Analyst, details a number of valuable, commonly...
- New Problems Require Innovative Solutions The mobile market is expected to be worth $25 billion by 2015
- Getting Agnostic about Mobile Devices The idea of being able to interact with customers, prospects, and stay attuned to competitive pressures is not new, but the velocity at...
Red Hat Enterprise Linux - The Original Cloud Operating System
Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Mobile Apps White Papers | Webcasts
As emerging technologies evolve they often find an initial niche in highly specialized scenarios, or in specific industry verticals, before expanding to wider areas of applicability. Within these initial niches, the early adopters can be anything from digital enthusiasts to fashionistas, or they can be folks simply using the technology because it serves a specific need extremely well. (free registration required) more