Story image

Malware found prowling within every app of alternative Android store

27 Jul 2017

​ESET researchers have discovered an alternative Android app store was spreading malware within every single offered Android app.

When users browsed CepKutusu.com, a Turkish alternative Android app store, and went on to download an app, the ‘Download now’ button in actual fact led to banking malware instead.

A few weeks after ESET brought the infection to the store operator’s attention, the store ceased the malicious activity.

Malware researcher at ESET, Lukáš Štefanko says this is the first time he has ever seen an entire Android market infected like that.

Within the Windows ecosystem and in browsers, this technique is known to have been used for some time but in the Android ecosystem, it’s really a new attack vector,” says Štefanko.

“As for the impact, what we saw in this particular case was most probably a test. The crooks misused their control of the app store in the simplest manner. Replacing the links to all apps with a link to a single malicious app requires virtually no effort – but it also gives the store’s customers a fair chance to detect the scam.”

The malicious app distributed by the store at the time was remotely controlled banking malware capable of intercepting and sending SEMS, displaying fake activity, in addition to downloading and installing other apps.

However, when installed the malware didn’t mimic the app the user intended to install, but instead imitates Flash Player.

While an app store serving its customers with malware on a mass scale is a huge threat, however, serving Flash Player instead of whatever customers wanted is a thinly veiled disguise that no doubt resulted in the only few hundred infections.

Štefanko says this only strengthens his case that it was just a test from the cybercriminals, and he has no dounbt the attacks will get worse.

“I can imagine a scenario in which the crooks who control the store’s back end append a malicious functionality to each of the apps in the store, Štefanko  says.

“Serving those interested in a particular game with a trojanised version of that game... That would remove the biggest red flag and the number of victims might rise significantly.”

Štefanko puts down attribution of the attack to three possible scenarios – a legitimate app store turned malicious by an employee with bad intentions, a legitimate app store becoming a victim of a remote attacker, or an app store built with the intention to spread malware.

“As for scenarios one and two, I would think that such an attack would not go unnoticed by a legitimate store. User complaints, suspicious server logs and changes in code should be sufficient indicators for its operators…. The more that the malware was being distributed via the store for weeks,” says Štefanko .

“Also of interest in this regard is that we contacted the store operators with our findings but have not received any reaction.”

Secureworks Magic Quadrant Leader for Security Services
This is the 11th time Secureworks has been positioned as a Leader in the Gartner Magic Quadrant for Managed Security Services, Worldwide.
Google puts Huawei on the Android naughty list
Google has apparently suspended Huawei’s licence to use the full Android platform, according to media reports.
Using data science to improve threat prevention
With a large amount of good quality data and strong algorithms, companies can develop highly effective protective measures.
General staff don’t get tech jargon - expert says time to ditch it
There's a serious gap between IT pros and general staff, and this expert says it's on the people in IT to bridge it.
ZombieLoad: Another batch of flaws affect Intel chips
“This flaw can be weaponised in highly targeted attacks that would normally require system-wide privileges or a complete subversion of the operating system."
Forget endpoints—it’s time to secure people instead
Security used to be much simpler: employees would log in to their PC at the beginning of the working day and log off at the end. That PC wasn’t going anywhere, as it was way too heavy to lug around.
DimData: Fear finally setting in amongst vulnerable orgs
New data ranking the ‘cybermaturity’ of organisations reveals the most commonly targeted sectors are also the most prepared to deal with the ever-evolving threat landscape.
ExtraHop’s new partner program for enterprise security
New accreditations and partner portal enable channel partners to fast-track their expertise and build their security businesses.