Security researchers find multistage Android malware on Google Play
Malware apps found on Google Play deliver their payload as a secondary app after installation
IDG News Service - Security researchers from antivirus vendor Symantec identified two malware apps on Google Play that used a multistage payload delivery system in order to remain undetected.
The apps, which have since been removed by Google, masqueraded as two games -- "Super Mario Bros." and "GTA 3 - Moscow city."
"Both were posted to Google Play on June 24 and since then have generated in the range of 50,000 to 100,000 downloads," Symantec security researcher Irfan Asrar said Tuesday in a blog post.
Once installed, the apps downloaded an additional package called Activator.apk from a Dropbox account and prompted the device owners to install it.
This secondary Activator app sent SMS messages to a premium-rate number located in Eastern Europe, after which it asked to be uninstalled.
The fact that the malicious payload was delivered in multiple stages is probably why the apps managed to remain undetected for so long on Google Play, Asrar said.
Earlier this year, Google started using an automated scanner called Bouncer to detect malware on Google Play. Bouncer runs all published apps in an emulated Android environment and monitors them for suspicious activity.
However, downloading a secondary app from a developer's server and prompting the user to install it might not necessarily represent malicious behavior.
This is not the first time when Android malware developers have used multi-stage payloads. The Android.Lightdd and Android.Jsmshider threats discovered in 2011 both downloaded additional components after the installation of an initial app.
There are several advantages to spreading the payload across multiple apps, Asrar said about those threats at the time. For one, the initial malicious app no longer needs to display an extensive list of permissions that might attract the user's attention.
Secondly, if the initial app is downloaded from the official Android marketplace -- now called Google Play -- the user is likely to assume that the additional apps also originate from there.
Symantec detects the two newly found malware apps as Android.Dropdialer. The Android security team immediately removed the threat after being notified by Symantec, Asrar said.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Malware and Vulnerabilities White Papers | Webcasts