BadNews infections in Google Play spread premium-rate SMS trojan

Share this article:

Researchers have discovered a new family of malware that found its way into legitimate apps inside Google's official store thanks to a malicious advertising network.

Dubbed “BadNews” by Lookout, a San Francisco-based mobile security firm, the malware was detected in 32 apps across four different developer accounts in Google Play, a Friday blog post from Lookout said.

The company estimates that the apps had been downloaded somewhere between two million and nine million times. But apparently far fewer actually were hit with malicious code.

BadNews “ads” were hosted in a range of apps, from popular games to Russian dictionary apps (about 50 percent of the malicious apps are in Russian). The fake ads prompted users to download updates to other apps or social networking services, like Skype. But doing so took them to a site where additional malware, called AlphaSMS, is downloaded. AlphaSMS is designed to look like an app downloader, but when installed actually, it forces infected devices to send out premium-rate texts.

Google has since investigated and immediately removed all of the affected apps, while also suspending developer accounts associated with the ad network, according to Lookout.

On its own, BadNews malware is capable of sending victims' sensitive information – such as their phone numbers and their devices' unique International Mobile Equipment Identity (IMEI) numbers – to a command-and-control server.

“Because it's challenging to get malicious bad code into Google Play, the authors of BadNews created a malicious advertising network as a front that would push malware out to infected devices at a later date in order to pass the app scrutiny,” Marc Rogers, a principal security researcher at Lookout, wrote in the blog post.

He added that “a typical app-vetting process would, of course, conclude that it was safe because the malicious behavior has not yet occurred.”

Rogers explained that the malware outbreak served as a lesson that developers should closely monitor third-party libraries included in their apps, which could put users at risk.

Lookout is working to take down three BadNews command-and-control servers, believed to be based in Russia, Germany and the Ukraine.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Email promises free pizza, ensnares victims in Asprox botnet instead

Email promises free pizza, ensnares victims in Asprox ...

Cloudmark came upon an email that offers free pizza, but clicking on the link to get the coupon ends with victims being ensnared in a botnet.

Report: most orgs lacking in response team, policies to address cyber incidents

In its Q3 threat intelligence report, Solutionary learned that 75 percent of organizations it assisted had no response team or policies and procedures to address cyber incidents.

Flash redirect campaign impacts Carnegie Mellon page, leads to Angler EK

Flash redirect campaign impacts Carnegie Mellon page, leads ...

Malwarebytes found that, since early July, thousands of sites had been targeted in the campaign.