Millions hit by major Android-based malware campaigns

Dozens of 'innocent' apps are being infected through the development supply chain

Researchers have outlined two separate malicious campaigns that have collectively infected more than 200 Android apps that have surpassed the 250 million download milestone. 

Both campaigns, which centre on adware and data-scraping respectively, are targeting Android users only, and have infected a host of applications by fooling developers into using malicious software development kits (SDKs).

The more prominent campaign of the two, dubbed 'SimBad' because it primarily affects simulation games, has infected 206 apps which have been downloaded a combined 150 million times, according to Check Point Research.

The malware itself lives in the ad-related 'RXDroider' SDK, provided by 'addroider.com' and adopted by a swathe of developers.

Once the user downloads and installs one of the infected apps, SimBad registers itself to the device and is allowed to perform actions autonomously. After installation, the malware then connects with the command and control server to receive orders. These may range from opening a browser with a given URL to removing the app icon from the launcher.

The app's three-pronged capabilities include showing ads, opening phishing pages, and exposing users to other applications. The attackers are also able to install a remote application from a designated server, allowing them to further infect users with malware at their discretion.

"With the capabilities of showing out-of-scope ads, exposing the user to other applications, and opening a URL in a browser," the researchers said, "'SimBad' acts now as an Adware, but already has the infrastructure to evolve into a much larger threat."

CheckPoint Research also outlined 'Operation Sheep' in a second report yesterday. This involves a group of Android apps harvesting contact information from users' phones on a mass scale without their consent.

This malware has similarly been loaded in an SDK built for data analytics, and has been seen in up to 12 different Android apps to date. These have been collectively downloaded over 111 million times.

The SWAnlaytics SDK has been integrated into a dozen seemingly innocuous Android apps published on third-party Chinese app stores such as the Huawei App Store, Xioami App Store and Tencent MyApp.

The researchers first encountered a sample of the infection in September 2018, and have traced a data-scraping path that leads to servers owned by Shun Wang Technologies. Once the malicious apps are installed, entire contact lists are uploaded to the firm's servers, according to Check Point Research.

They also noted in the Tencent MyApp store alone, eight of 12 infected apps collectively amassed 111 million downloads.

"In theory," the researchers speculated, "Shun Wang Technologies could have collected a third of China's population names and contact numbers if not more."

They added with no clear declaration of data usage form Shun Wang, nor regulatory supervision, data could easily be traded within underground markets and abused in a variety of ways. These may range from rogue marketing to friend referral program abuse.

"Compared to financial data and government-issued ID document information, personal contact information is often treated as less sensitive data," the researchers said.

"According to popular belief, it requires extra effort to exploit such data while potential profits do not match a hacker's effort. Hence it is unlikely to be targeted.

"However, the landscape is changing with deep specialization in underground markets and new "business models" available to profit from such personal contact data."

Featured Resources

Unlocking collaboration: Making software work better together

How to improve collaboration and agility with the right tech

Download now

Four steps to field service excellence

How to thrive in the experience economy

Download now

Six things a developer should know about Postgres

Why enterprises are choosing PostgreSQL

Download now

The path to CX excellence for B2B services

The four stages to thrive in the experience economy

Download now

Recommended

HackBoss malware is using Telegram to steal cryptocurrency from other hackers
cryptocurrencies

HackBoss malware is using Telegram to steal cryptocurrency from other hackers

16 Apr 2021
Mastering endpoint security implementation
Security

Mastering endpoint security implementation

16 Apr 2021
US, UK say Russia was behind SolarWinds hack
cyber attacks

US, UK say Russia was behind SolarWinds hack

16 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
University of Hertfordshire's entire IT system offline after cyber attack
cyber attacks

University of Hertfordshire's entire IT system offline after cyber attack

15 Apr 2021
NSA uncovers new "critical" flaws in Microsoft Exchange Server
servers

NSA uncovers new "critical" flaws in Microsoft Exchange Server

14 Apr 2021