Millions hit by major Android-based malware campaigns

Dozens of 'innocent' apps are being infected through the development supply chain

Researchers have outlined two separate malicious campaigns that have collectively infected more than 200 Android apps that have surpassed the 250 million download milestone. 

Both campaigns, which centre on adware and data-scraping respectively, are targeting Android users only, and have infected a host of applications by fooling developers into using malicious software development kits (SDKs).

The more prominent campaign of the two, dubbed 'SimBad' because it primarily affects simulation games, has infected 206 apps which have been downloaded a combined 150 million times, according to Check Point Research.

The malware itself lives in the ad-related 'RXDroider' SDK, provided by 'addroider.com' and adopted by a swathe of developers.

Once the user downloads and installs one of the infected apps, SimBad registers itself to the device and is allowed to perform actions autonomously. After installation, the malware then connects with the command and control server to receive orders. These may range from opening a browser with a given URL to removing the app icon from the launcher.

Advertisement
Advertisement - Article continues below

The app's three-pronged capabilities include showing ads, opening phishing pages, and exposing users to other applications. The attackers are also able to install a remote application from a designated server, allowing them to further infect users with malware at their discretion.

"With the capabilities of showing out-of-scope ads, exposing the user to other applications, and opening a URL in a browser," the researchers said, "'SimBad' acts now as an Adware, but already has the infrastructure to evolve into a much larger threat."

CheckPoint Research also outlined 'Operation Sheep' in a second report yesterday. This involves a group of Android apps harvesting contact information from users' phones on a mass scale without their consent.

This malware has similarly been loaded in an SDK built for data analytics, and has been seen in up to 12 different Android apps to date. These have been collectively downloaded over 111 million times.

The SWAnlaytics SDK has been integrated into a dozen seemingly innocuous Android apps published on third-party Chinese app stores such as the Huawei App Store, Xioami App Store and Tencent MyApp.

The researchers first encountered a sample of the infection in September 2018, and have traced a data-scraping path that leads to servers owned by Shun Wang Technologies. Once the malicious apps are installed, entire contact lists are uploaded to the firm's servers, according to Check Point Research.

They also noted in the Tencent MyApp store alone, eight of 12 infected apps collectively amassed 111 million downloads.

"In theory," the researchers speculated, "Shun Wang Technologies could have collected a third of China's population names and contact numbers if not more."

They added with no clear declaration of data usage form Shun Wang, nor regulatory supervision, data could easily be traded within underground markets and abused in a variety of ways. These may range from rogue marketing to friend referral program abuse.

"Compared to financial data and government-issued ID document information, personal contact information is often treated as less sensitive data," the researchers said.

Advertisement
Advertisement - Article continues below

"According to popular belief, it requires extra effort to exploit such data while potential profits do not match a hacker's effort. Hence it is unlikely to be targeted.

"However, the landscape is changing with deep specialization in underground markets and new "business models" available to profit from such personal contact data."

Featured Resources

The essential guide to cloud-based backup and disaster recovery

Support business continuity by building a holistic emergency plan

Download now

Trends in modern data protection

A comprehensive view of the data protection landscape

Download now

How do vulnerabilities get into software?

90% of security incidents result from exploits against defects in software

Download now

Delivering the future of work - now

The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.

Download now
Advertisement

Recommended

Visit/malware/33080/hackers-abuse-linkedin-dms-to-plant-malware
malware

Hackers abuse LinkedIn DMs to plant malware

25 Feb 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019
Visit/antivirus/28144/best-antivirus
antivirus

Best antivirus for Windows 10

3 Sep 2019
Visit/security/malware/28083/the-five-best-free-malware-removal-tools
Security

Best free malware removal tools 2019

8 Mar 2019

Most Popular

Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/cloud/amazon-web-services-aws/354223/what-to-expect-from-aws-reinvent-2019
Amazon Web Services (AWS)

What to expect from AWS Re:Invent 2019

29 Nov 2019
Visit/hardware/354232/raspberry-pi-4-owners-complain-of-broken-wi-fi-when-using-hdmi
Hardware

Raspberry Pi 4 owners complain of broken Wi-Fi when using HDMI

29 Nov 2019
Visit/mobile/google-android/354189/samsung-galaxy-a90-5g-review-simply-the-best-value-5g-phone
Google Android

Samsung Galaxy A90 5G review: Simply the best value 5G phone

22 Nov 2019