Story image

Sophisticated malware resurfaces in Google Play apps

08 Sep 2015

Bitdefender has identified a sophisticated CAPCHA-avoiding Android malware in Google Play apps.

Dubbed Android.Trojan.MKero.A, the malware was originally distributed via third-party marketplace and local social networks in Eastern Europe late 2014, with Russia as one of the most affected countries.

At the time, Bitdefender was conducting research into the malware’s behaviour and found that they had evolved the recent versions to become less detectable.

As the malware has been built to operate completely silent on the victim’s Android device, removal has become extremely difficult.

Current capabilities

This is the first time the malware has occurred in the official Google Play store, suggesting its developers found new ways of packing it into seemingly legitimate apps that can bypass Google Bouncer - Google’s screening system, Bitdefender says.

The Trojan’s sophistication lies in its ability to bypass CAPCHA authentication systems by redirecting these requests to an online image-to-text recognition service, Antigate.com.

The online service relies on actual individuals to recognise CAPCHA images, therefore requests are often sent back to the malware within seconds so that it can proceed with the concealed subscription process.

Among Google Play apps that distribute the Trojan, two have had between 100,000 and 500,000 instals each, raising the potential victim count to staggering numbers. Google has been notified of the existence of these malicious apps in Google Play.

Implications

The total financial losses could amount to $250,000 purely from the minimum $0.05 charge by subscribed SMS messages.

As the malware has been built with concealed capabilities to operate completely silent on the victim’s Android device, user detection and removal is made extremely difficult.

To this end, a mobile security solution needs to be installed on the device to identify malicious applications - regardless from where they have been downloaded - and block threats from causing irreparable financial harm or personal data loss, Bitdefender says.

Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.
How blockchain could help stop video piracy in its tracks
An Australian video tech firm has successfully tested a blockchain trial that could end up being a welcome relief for video creators and the fight against video piracy.
IBM X-Force Red & Qualys introduce automated patching
IBM X-Force Red and Qualys are declaring a war on unpatched systems, and they believe automation is the answer.
Micro Focus acquires Interset to improve predictive analytics
Interset utilises user and entity behavioural analytics (UEBA) and machine learning to give security professionals what they need to execute threat detection analysis.
Raising the stakes: McAfee’s predictions for cybersecurity
Security teams and solutions will have to contend with synergistic threats, increasingly backed by artificial intelligence to avoid detection.
Exclusive: Ping Identity on security risk mitigation
“Effective security controls are measured and defined by the direct mitigation of inherent and residual risk.”
CylancePROTECT now available on AWS Marketplace
Customers now have access to CylancePROTECT for AI-driven protection across all Windows, Mac, and Linux (including Amazon Linux) instances.