Technology
42 malicious apps affected 8 million Android users
London, Oct 25
Security researchers have detected a massive year-long adware campaign where the involved apps were installed on users' Android devices eight million times from Google Play alone.
Slovak internet security company ESET identified 42 apps on Google Play as belonging to the campaign, which had been running since July 2018. Of those, 21 were still available at the time of discovery.
"We reported the apps to the Google security team and they were swiftly removed. However, the apps are still available in third-party app stores," said the researchers in a statement on Thursday.
Once launched, the "Ashas" adware family app sent "home" key data about the affected device: device type, OS version, language, number of installed apps, free storage space, battery status, whether the device is rooted and Developer mode enabled, and whether Facebook and FB Messenger are installed.
"The app receives configuration data from the command and control server (C&C) server, needed for displaying ads, and for stealth and resilience," said security researcher Lukas Stefanko.
Once a user installed an adware-infected app, the app will show full-screen ads on the device's display at intervals.
First, the malicious app tries to determine whether it is being tested by the Google Play security mechanism.
After dodging Google servers, the malicious app can set a custom delay between displaying ads. Based on the server response, the app can also hide its icon and create a shortcut instead.
"If a typical user tries to get rid of the malicious app, chances are that only the shortcut ends up getting removed. The app then continues to run in the background without the user's knowledge. This stealth technique has been gaining popularity among adware-related threats distributed via Google Play," the researchers noted.
According to the team, students at a Vietnamese university may be behind the malicious adware app.
"Due to poor privacy practices on the part of our culprit's university, we now know his date of birth, we know that he was a student and what university he attended. We retrieved his University ID; a quick googling showed some of his exam grades," said researchers.
"The malicious developer also has apps in Applea¿s App Store. Some of them are iOS versions of the ones removed from Google Play, but none contain adware functionality," said Stefanko.
Slovak internet security company ESET identified 42 apps on Google Play as belonging to the campaign, which had been running since July 2018. Of those, 21 were still available at the time of discovery.
"We reported the apps to the Google security team and they were swiftly removed. However, the apps are still available in third-party app stores," said the researchers in a statement on Thursday.
Once launched, the "Ashas" adware family app sent "home" key data about the affected device: device type, OS version, language, number of installed apps, free storage space, battery status, whether the device is rooted and Developer mode enabled, and whether Facebook and FB Messenger are installed.
"The app receives configuration data from the command and control server (C&C) server, needed for displaying ads, and for stealth and resilience," said security researcher Lukas Stefanko.
Once a user installed an adware-infected app, the app will show full-screen ads on the device's display at intervals.
First, the malicious app tries to determine whether it is being tested by the Google Play security mechanism.
After dodging Google servers, the malicious app can set a custom delay between displaying ads. Based on the server response, the app can also hide its icon and create a shortcut instead.
"If a typical user tries to get rid of the malicious app, chances are that only the shortcut ends up getting removed. The app then continues to run in the background without the user's knowledge. This stealth technique has been gaining popularity among adware-related threats distributed via Google Play," the researchers noted.
According to the team, students at a Vietnamese university may be behind the malicious adware app.
"Due to poor privacy practices on the part of our culprit's university, we now know his date of birth, we know that he was a student and what university he attended. We retrieved his University ID; a quick googling showed some of his exam grades," said researchers.
"The malicious developer also has apps in Applea¿s App Store. Some of them are iOS versions of the ones removed from Google Play, but none contain adware functionality," said Stefanko.
40 minutes ago
Bharath-starrer 'Kaalidas 2' cleared for release with U/A certificate
41 minutes ago
Basil Joseph-starrer Raawadi's shooting wrapped up
42 minutes ago
Farida Jalal brings back Rajesh Khanna-era nostalgia, recreates iconic 'Aradhana' song after 57 years
42 minutes ago
Kareena Kapoor congratulates ‘Veere Di Wedding’ co-star Sonam Kapoor on arrival of her second baby
43 minutes ago
Sayani Gupta unpacks what she is hard focused on, as a producer
45 minutes ago
Natty's political comedy 'TN 2026' to hit screens on April 10!
46 minutes ago
Dia Mirza wishes stepdaughter Samaira on 17th birthday, calls her ‘her lifeboat’
46 minutes ago
Salman Khan to begin his next with Dil Raju from April: Dil, Dimag, Jigar se
47 minutes ago
Jackie Shroff pays tribute to Anand Bakshi on 24th death anniversary
50 minutes ago
Lok Sabha approves Insolvency and Bankruptcy Code (Amendment) Bill
51 minutes ago
Andhra doctor, wife die in suicide pact after killing their mentally challenged toddler
51 minutes ago
Andhra doctor, wife die in suicide pact after killing their mentally challenged toddler
52 minutes ago
Over 650 youth compete in IndiaSkills national competition
