Two dozen apps that collectively generated over 472,000 downloads from the Google Play store were found to be infected with a new Android malware called Joker, which delivers a payload that perpetrates both ad fraud and data theft, a research firm has reported.
Joker's second-stage malware is a .dex (Dalvik Executable) file capable of stealing victims' SMS messages, contact lists and device information. It also secretly interacts with advertisement websites to generate fake clicks as well as sign up infected victims with premium service subscriptions that they didn't ask for, according to CSIS malware analyst Aleksejs Kuprins, writing in his company's tech blog.
The malware requests these unauthorized subscriptions are "by automating the necessary interaction with the premium offer's webpage, entering the operator's offer code, then waiting for a SMS message with a confirmation code and extracting it using regular expressions," Kuprins writes. "Finally, the Joker submits the extracted code to the offer's webpage, in order to authorize the premium subscription.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.