Google faces new round of Android malware

Again yanks malware-infected apps from Android Market as hackers try trickier tactics

For the second time in three months, Google yanked dozens of malware-infected smartphone apps from the Android Market.

The 34 apps were pulled over the weekend and Tuesday by Google after security researchers notified the company.

Google acknowledged giving some Android apps the heave-ho. "We've suspended a number of suspicious applications from Android Market and are continuing to investigate them," a Google spokeswoman said in an email reply to questions late Tuesday.

As in the March episode, when Google removed more than 50 apps, the newest round consisted of pirated legitimate programs that had been modified with malicious code and then re-released to the Android Market under false names.

But there was an important difference to this campaign, said Kevin Mahaffey, co-founder and CTO of Lookout, a San Francisco firm that specializes in mobile security.

"These apps have the ability to fire up a page on the Android Market," said Mahaffey, adding that the hackers can send commands to the smartphone telling it which Market page to display.

He speculated that the attackers probably intended the new feature as a way to dupe users into downloading additional rogue apps that would have malicious functions, just as a hijacked PC is told to retrieve more malware. "They seem to have been designed to encourage people to install additional payloads," Mahaffey said.

Mahaffey said it was impossible to deduce hacker intent from the malicious apps' code, but he believed the criminals took the new path because social engineered attacks -- those that rely on tricking victims into installing malware rather than depending on an exploited vulnerability -- are more difficult to defend.

"Social engineered attacks are much more subtle, but very powerful because they're hard to protect against," said Mahaffey. "It could be they changed because either [the attackers] believed exploits were a dead giveaway, or they found this more effective."

Lookout and AVG Technologies of the Czech Republic uncovered malicious apps on the Android Market and reported their findings to Google. According to Mahaffey, Google pulled the apps "almost instantaneously."

It's unclear how the attackers planned to turn a profit on the new campaign of rogue apps.

"They could do things like listen in to all the banking transactions [conducted using the smartphone]," said Omri Sigelman, the vice president of products at AVG Mobilation, AVG's mobile security arm, in an interview Tuesday.

Both Mahaffey and Sigelman said that the same group responsible for the March malware was behind the most recent attempt to infiltrate Android phones.

The new rogue apps contained what Mahaffey called "Droid Dream Light," a stripped-down version of the DroidDream code used to infect apps in March.

Once a DroidDream-enabled app was downloaded and installed to an Android phone, the malware surreptitiously downloaded a second-stage payload that contained one or more "root" exploits that give attackers complete control of the device.

This week's infected apps were downloaded and presumably installed by between 30,000 and 120,000 users, Lookout estimated.

Google has not said what its next step will be.

But Mahaffey said Google will throw the "kill switch" on the rogue apps -- remotely remove them from users' Android phones -- in the near future. In March, Google pulled that switch four days after being notified of the infected apps.

At that time, Google also pushed an app of its own to affected users. The Android Market Security Tool March 2011 did not patch the underlying bugs that were exploited, but instead deleted traces of the malicious code that weren't erased when the apps were automatically uninstalled.

On Tuesday, Sigelman said that the new rogue apps also contained working exploits. "They aimed to root the device," Sigelman said.

Mahaffey said this second campaign showed both the persistence of cybercriminals -- "They're going to keep trying," he predicted -- and the failure of smartphone owners to understand what they held in their hands.

"This raises the importance of thinking of the phone as a computer," said Mahaffey. "It's a cat-and-mouse world, and the level of security [of a smartphone] has to be the same as a computer."

Lookout has published a list of the 34 infected Android apps on the company's blog.

Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer or subscribe to Gregg's RSS feed . His e-mail address is gkeizer@computerworld.com .

Read more about app security in Computerworld's App Security Topic Center.

Copyright © 2011 IDG Communications, Inc.

Bing’s AI chatbot came to work for me. I had to fire it.
Shop Tech Products at Amazon