Yet Another Android Malware Infects Over 4.2 Million Google Play Store Users


Even when such a big amount of efforts by Google, malicious apps somehow managed to fool its Play Store's anti-malware protections and infect folks with malicious computer code.
The same happened another time once a minimum of fifty apps managed to form its means onto Google Play Store and was with success downloaded as several as four.2 million times—one of the larger malware outbreaks.
Security firm Check purpose on Thursday printed a diary post revealing a minimum of fifty humanoid apps that were liberated to transfer on official Play Store and were downloaded between one million and four.2 million times before Google removed them.

These mechanical man apps go together with hidden malware payload that in secret registers victims for paid online services, sends fallacious premium text messages from victims' smartphones and leaves them to pay the bill—all while not the data or permission of users.
Dubbed ExpensiveWall by Check purpose researchers as a result of it had been found within the beautiful Wallpaper app, the malware comes hidden in free wallpaper, video or ikon redaction apps. It is a new variant of malware that Mcafee noticed earlier this year on the Play Store.
But what makes ExpensiveWall malware entirely different from its alternative variants is that it makes use of a complicated obfuscation technique referred to as "packed," that compresses malicious code and encrypts it to evade Google Play Store's constitutional anti-malware protections.
The researchers notified Google of the malicious apps on August seven, and also the software package large quickly removed all of them, however inside few days, the malware re-emerged on the Play Store and infected over five,000 devices before it had been deleted four days later, Check purpose aforesaid.

Here's How ExpensiveWall Malware Works:

Once Associate in a Nursing app with ExpensiveWall—which researchers assume came from a software system development kit known as GTK—is downloaded on a victim's device, the malicious app asks for user's permission to access the net, and send and receive SMS messages.
The internet access is employed by the malware to attach the victim's device to the attacker's command and management server, wherever it sends data on the infected telephone set, together with its location aboard unique hardware identifiers, like Macintosh and science addresses, IMSI and IMEI numbers.
The C&C server then sends the malware a URL, that it opens in Associate in Nursing embedded WebView window to transfer JavaScript code that begins to enter bills for the victim by causing dishonest premium SMS messages while not their data, and uses the victim's signal to register for paid services.
However, in line with the Check purpose researchers, it's still unclear what proportion revenue was generated via ExpensiveWall's premium SMS scam.


Google's Play Store—Home for Malware

Android malware continues to evolve with a lot of mental and never-seen-before capabilities with each passing day, and recognizing them on Google Play Store has become quite a common factor.
Last month, over five hundred golem apps with spyware capabilities were found on Play Store, which had been downloaded quite one hundred million times.
In July, saddle horse spyware apps were noticed on Play Store that may steal a full ton of knowledge on users, together with text messages, emails, voice calls, photos, location information, and alternative files, and spy on them.
In June, quite 800 Xavier-laden apps were discovered on Google Play that had been downloaded variant times, and also the same month researchers found 1st code injecting growth malware creating rounds on Google Play Store.
A month before it, researchers noticed forty-one apps on Play Store hidden with the Judy Malware that infected thirty six.5 million golem devices with malicious ad-click computer code.
In April, over forty apps with hidden FalseGuide malware were noticed on Play Store that created a pair of Million golem users victims.
Earlier this year, researchers conjointly discovered a replacement variant of the hummingbird malware, dubbed HummingWhale, hidden in additional than twenty apps on Google Play Store, which was downloaded by over twelve Million users.

How to Protect Your Android From Such Malware Apps

Even when Google removed all the malware-tainted apps from its official Play Store marketplace, your smartphones can stay infected with the ExpensiveWall malware till you expressly uninstall the malicious apps, if you have got downloaded any.
Google has recently provided a security feature called Play shield that uses machine learning and app usage analysis to mechanically take away malicious apps from the affected smartphones to forestall additional damage.
However, in line with the Check purpose researchers, several phones run the associate older version of mechanical man that doesn't support the feature, effort a real audience receptive malware attacks.
You are powerfully suggested to invariably keep a decent antivirus app on your device will|which will|that may} discover and block any malicious app before it can infect your device, and invariably keep your device and everyone apps up-to-date.



Comments