Hacker-Powered Security for Startups » Get the Free E-Book from HackerOne!
Welcome Guest | Sign In
TechNewsWorld.com
salesforce commerce cloud

Infected Android Apps From Google Play Affect Millions

By Richard Adhikari
Feb 4, 2015 4:17 PM PT

Millions of Android users have been hit by malware posing as games on Google Play, according to Avast security researcher Flip Chytry.

Infected Android Apps From Google Play Affect Millions

The malware harbors fake ads that pop up when users unlock their devices, to warn them about nonexistent infections, or that their devices are out of date or have porn.

Victims are then asked to take action. If they agree, they are redirected to poisoned Web pages that contain dubious app stores, or apps that try to send premium SMS messages -- which are expensive -- without their knowledge, or apps that collect scads of personal information on the sly.

Sometimes users were directed to legitimate companies' websites, or to security apps on Google Play, but even if they install these security apps, the unwanted ads keep on popping up.

"Some of the malware lies quiet for up to 30 days before activating," Chytry said.

Google spokesperson Elizabeth Markman did not confirm how many devices had been hit.

"Our techniques for protecting Google Play users continue to improve, and are reflected in the low numbers of users who install potential malware from the Google Play Store," Markman stated.

About the Apps Breaking Bad

All the apps mentioned by Avast had been suspended, Markman told TechNewsWorld.

The Durak app had been removed from Google Play when TechNewsWorld checked at 8:43 a.m. PT today, but was available when checked at 12:06 p.m. PT.

Google Protection

"We scan apps as they are uploaded to Google Play, running each app to detect and remove malware, spyware and Trojans from Google Play," Markman told TechNewsWorld.

That scanning is done by Bouncer, a service Google implemented in 2012.

Google can then disable developer apps and accounts if they violate its terms and content policies.

"Our goal is to provide people with an extra layer of protection while still maintaining Android's openness and developers' workflow," Markman remarked.

What Went Wrong?

Google's app scanning process may have missed the malware because "they rely mostly on static code analysis and the app in question may have used a 'time bomb' method -- waiting a period of time before downloading and executing the malware," Patrick Murray, vice president of products at Zimperium, told TechNewsWorld.

This is a core vulnerability when it comes to apps, Murray pointed out, because all mobile apps must communicate frequently with a server to complete updates, receive instructions and perform other tasks.

Additionally, Google's scanning services are not adequate because scanning "is only as good as the signature database it has from the service provider," Andrew Blaich, lead security analyst at Bluebox Labs, said. "It takes several different malware scanning programs to catch all known malware on a device since they all scan for different things."

Google's policy of openness is the problem because the resulting business model and architecture "make Android very difficult for them to secure," Murray said.

Anatomy of a Takedown

In April 2014, Google enhanced its "Verify" apps to continually check devices to make sure all apps are behaving in a safe manner even after they're installed.

However, this service "only works after an app is identified as bad," Blaich told TechNewsWorld.

Google's "Bouncer" service "works more along the lines of risk management," Blaich remarked. "If enough red flags show up, then an app becomes a candidate for takedown."

Protecting The Enterprise

Malware downloaded onto BYOD devices "can easily compromise the enterprise network by stealing corporate credentials or simply bringing the compromised device back onto the network," Zimperium's Murray warned.

Businesses "need to think about expanding their BYOD initiatives to go beyond simple management of devices, and employ solutions on the device that prevent these types of cyberattacks," Murray suggested. For example, they could monitor devices continuously so malware "is caught whenever it is delivered, even if it tries to lie and wait for a period of time before detonation."


Richard Adhikari has written about high-tech for leading industry publications since the 1990s and wonders where it's all leading to. Will implanted RFID chips in humans be the Mark of the Beast? Will nanotech solve our coming food crisis? Does Sturgeon's Law still hold true? You can connect with Richard on Google+.


Facebook Twitter LinkedIn Google+ RSS
salesforce commerce cloud
How do you feel about the latest challenges to Facebook's reputation?
I think the critics have ulterior motives. I'm a Facebook fan.
I don't like it, but there's no alternative, so I still use Facebook heavily.
I have adjusted my Facebook privacy settings to suit my comfort level.
I only use Facebook casually, and I avoid posting anything very personal.
I check Facebook to see what others post, but I don't post myself.
I never use Facebook.