Google pulls malware-infected apps in its Store, over 3 million users at risk
Some people call me the code cowboy, some call me the gangster of root, 'cause I'm a Joker
Google pulled 60 malware-infected apps from its Play Store, installed by more than 3.3 million punters, that can be used for all kinds of criminal activities including credential theft, spying and even stealing money from victims.
Zscaler's ThreatLabZ and security researcher Maxime Ingrao from fraud protection firm Evina discovered the downloader apps stuffed with software nasties including Joker, Facestealer, Coper, and Autolycos malware — the latter is a new family, according to Ingrao, who named and discovered Autolycos in eight different apps with more than three million downloads to Android devices.
The new malware strain, similar to Joker, steals SMS messages when downloaded and also unwittingly subscribes users to — and charges them for using — premium wireless application protocol services, Ingrao tweeted.
Found new family of malware that subscribe to premium services 👀8 applications since June 2021, 2 apps always in Play Store, +3M installs 💀💀No webview like #Joker but only http requestsLet's call it #Autolycos 👾#Android #Malware #Evina pic.twitter.com/SgTfrAOn6H— Maxime Ingrao (@IngraoMaxime) July 13, 2022
This spyware is designed to steal SMS messages, contact lists, and device information, and to sign the victim up for premium wireless application protocol (WAP) services.
"It retrieves a JSON on the C2 address: 184.108.40.206/pER/y," he further explained. "It then executes the urls, for some steps it executes the urls on a remote browser and returns the result to include it in the requests. This allows it not to have a Webview and to be more discreet."
Additionally, fraudsters created Facebook and Instagram ads to promote the phony applications, Ingrao noted.
The malicious apps include:
- Vlog Star Video Editor — 1 million downloads
- Creative 3D Launcher — 1 million downloads
- Wow Beauty Camera — 100,000 downloads
- Gif Emoji Keyboard — 100,000 downloads
- Freeglow Camera — 5,000 downloads
- Coco Camera v1.1 — 1,000 downloads
- Funny Camera — 500,000 downloads
- Razer Keyboard & Theme — 50,000 downloads
Joker, Facestealer and Coper resurface
Meanwhile, Zscaler's threat hunters this week said Google removed an additional 52 malware-infested apps on the Play Store, and 50 of them were used to deploy Joker, which has been an ongoing problem for Android devices. They also discovered Facestealer and Coper malware in two other malicious apps, and those have been booted from the online marketplace as well.
The Joker-spreading apps were downloaded more than 300,000 times, according to security researchers Viral Gandhi and Himanshu Sharma, who provided a technical analysis of the three malware family payloads and listed all 50 Joker downloaders on a ThreatLabZ blog post.
"Despite public awareness of this particular malware, it keeps finding its way into Google's official app store by regularly modifying the malware's trace signatures including updates to the code, execution methods, and payload-retrieving techniques," Gandhi and Sharma wrote.
Once downloaded, Joker malware steals SMS messages, contact lists, and device information and also unknowingly signs the victim up for premium services.
"Most commonly, threat actors disguise the Joker malware in messaging applications that require users to grant escalated access permissions by allowing them to serve as the default SMS app on the user's phone," the threat hunters noted. "The malware uses these advanced permissions to carry out its operations."
- Bogus cryptocurrency apps steal millions in mere months
- Botnet malware disguises itself as password cracker for industrial controllers
- North Koreans spotted harassing SMBs with malware
- CISA pulls the fire alarm on Juniper Networks bugs
Additionally, Zscaler discovered Facestealer hiding in the now-removed cam.vanilla.snap app on Google Play Store, which had 5,000 downloads. This malware targets Facebook users via fake Facebook login pages to steal credentials. And finally, the security team also discovered banking trojan Coper disguised as a Unicc QR Scanner app.
"Once downloaded, this app unleashes the Coper malware infection which is capable of intercepting and sending SMS text messages, making USSD (Unstructured Supplementary Service Data) requests to send messages, keylogging, locking/unlocking the device screen, performing overly attacks, preventing uninstalls and generally allowing attackers to take control and execute commands on infected device via remote connection with a C2 server," Gandhi and Sharma wrote. ®