Google pulls 22 more malicious Android apps from Market
'RuFraud' sent texts to premium numbers, posed as popular games like 'Angry Birds,' 'Need for Speed'
Computerworld - Google has removed nearly two dozen malware-infected apps from its official Android Market in the last several days, a security company said Sunday.
So far this year, Google has yanked more than 100 malicious Android apps from its download distribution channel.
San Francisco-based Lookout Security said that it and other vendors had notified Google of several recent waves of malicious apps -- 22 apps altogether -- that reached the Android Market. Google has yanked those programs from the e-mart, said Lookout.
Lookout spotted nine malware-infected apps last week, and another 13 over the weekend.
The company dubbed the malware bundled with the fake apps "RuFraud," and said that the code sent spurious text messages to premium numbers, racking up revenues for the criminals.
While North American users were not affected -- RuFraud was written not to target the U.S., for instance -- people in France, Germany, Italy, Poland, Russia, the U.K. and several other eastern European and central Asian countries were.
As in previous malicious app campaigns, the RuFraud apps borrowed elements of legitimate apps, but did not simply snatch complete apps, then re-package them with malicious code, said Lookout.
"They borrowed aspects of other apps, including terminology and in some cases identical text," said Tim Wyatt, a principal engineer at Lookout.
The recent RuFraud operations began with horoscope apps, said Lookout, then moved on to Android phone wallpapers -- including one for the Twilight series of movies -- and downloaders posing as accessories to bestselling games such as "Angry Birds" and "Cut the Rope," then finished with a round of fake games, Lookout's researchers said.
That last run accounted for the majority of downloads before Google pulled the apps. Lookout estimated that about 14,000 copies of the fake games were grabbed by users.
"A couple of instances of the apps from this weekend really drove that [number]," added Derek Halliday, a Lookout senior security product manager. "The others really didn't affect very many people as far as we know."
Both Lookout and Google -- the latter in an email from a spokesman -- pointed out that the fraudulent apps declare possible SMS charges in their terms of service, and in the permissions users grant. "It's not possible for a user to install the app without approving this permission to allow the app to send premium SMS messages," said the Google spokesman.
Google's Android OS
- Review: 5 video editing apps for Android
- Malware-infected Android apps spike in the Google Play store
- Nokia plans forked Android smartphone for Barcelona unveiling
- LG G Flex deep-dive review: The curious case of the curved phone
- Xperia Z1S deep-dive review: A stylish phone with power and panache
- Low-end smartphone battle forces Nokia to Android
- Moto G real-world review: The best budget phone money can buy
- Google escalates offensive against Office with Android 'KitKat'
- Galaxy Note 3 deep-dive review: A plus-sized phone with perks and quirks
- LG G2 deep-dive review: Extraordinary hardware in an ordinary phone
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts