Android malware scores nine million downloads with fake ad network SDK
Summary: Attackers have found a side route to Android users that follow the good practice of only downloading apps from Google’s official store.
Makers of Android malware have developed an ad network SDK that pushes malicious software through seemingly innocuous apps.
Google has suspended several accounts associated with 32 apps on Google Play containing the malicious SDK which have been downloaded up to nine million times, according to mobile security firm Lookout.
Legitimate ad network SDKs, such as Google's own AdMob SDK, offer app developers the libraries to distribute in-app ads and monetise free apps. The malicious ad network masquerades as a genuine one, largely but not exclusively targeting Russian-speaking users. The SDK has been installed on a range of apps including games, recipe, sex and dictionary apps, some of which are also aimed at English-speaking users.
"Because it's challenging to get malicious bad code into Google Play, the authors of Badnews created a malicious advertising network, as a front, that would push malware out to infected devices at a later date in order to pass the app scrutiny," Lookout's principal security researcher Marc Rogers noted in an alert on Friday.
In violation of Google's developer terms, the malicious ad network causes the app to impersonates news messages, including fake alerts encouraging the user to install a "critical update" to Russian social network Vkontake, Skype, and other apps. The fake update attempts to lead the user to a website to install a premium rate SMS app and also sends the user's phone number and device ID to a command server.
The attackers took their cue from shady affiliate-based marketing websites, according to Rogers. Using an ad network to distribute malware is a "significant development" in mobile malware since it overcomes the hurdles placed at the gateway to app marketplaces, Lookout said.
Sidestepping Google protection
Google launched its server-side scanner Bouncer to fend off malicious submissions in early 2012, and late last year added a client-side malware scanner to Android 4.2 Jelly Bean that could be used to vet apps installed outside the official store.
The discovery of the malicious SDK follows reports last week from Russian security firm Dr Web that malware distributors were using Android in-app advertising to spread fake antivirus, bringing an old pest from the desktop to mobile.
The threat, which Dr Web has called Android.Fakealert, prompts users via in-app advertising users to install fake antivirus.
The fake antivirus or scareware scam was growing pest for desktop users until a major crackdown by the FBI and Russian authorities took out lead players in the industry back in 2011.
Dr Web says the fake alert scam for Android has been around since October 2012. However, the company's CEO Boris Sharov told ZDNet that this threat was not being distributed via Google Play.
Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.
Talkback
Ah the old Saying
Google itself is malware
So funny…….
OwlNetm OwllNet, OwlllNetm OwllllnNet, Owllll1Net,
OwlllllNet
Been so many most likely missed one….
LOL!…….. LOL!
troll
get lost -will you.
The main problem is ...
Google should add an extra layer of security so that no app can download unauthorized code.
Google should further add so called "fake data" that can be fed to apps craving for all sorts of personal data like location, etc.
Imagine an unaware phone user, all of sudden being confronted with a $1000 bill for calling all sorts of salacious hotlines ... actually the phone did it on a daily basis between 2am and 4am surreptitiously.
Unfortunately
Did you not read the article?
Read the article again
agreed
a bit further...
That is an excellent suggestion!
thanks
Android malware scores nine million downloads with fake ad network SDK
look ma! another troll !!!
Sigh.
Man, even OwlllllllllllllllllllllllNet is cleverer than you.
Loverock-Davidson
But then again, they wouldn't work well in your basement do they?
Lets have a resonable discussion
1) with XP and prior - full administrator access given by default, due to its original single-user, non-networked user-friendly design. Antivirus would have to detect you are running a malware .exe. Apps can be installed from anywhere on the internet. Any app can do whatever it wants.
2) with vista and beyond, non administrator by default and warnings about running exe's, which may help, but easily compromised when using a browser due to the excessive vulnerabilites going back to code from the DOS days. Much of this legacy code is still present even in windows RT.
With android, the problem is not 'exploits' due to an insecure design. Android is a "proper OS" design with security in mind from the start. The "malware problem" is Android consiously chosing to walk the line between pure security and convienence/openness. For example there are no "drive by" malware pwn-the-system types of problems as plagues windows, due to an inherent sandboxing provided by the *nix OS design.
Google could one day simply choose to run the play store just like apple, more carefully vetting each app, rejecting a huge portion of them, and disallow sideloading of apks. If this was done, android would be as "malware free" as iOS. They would be critisized as being a walled garden but would then have a great reputation for being malware free like apple. However, most people would be upset and not be interested in android anymore.
"... If this was done, android would be as "malware free" as iOS"
"ACLU Issues Wake-Up Call To Android Service Providers
http://www.darkreading.com/privacy/aclu-issues-wake-up-call-to-android-serv/240153210
That's right. The ACLU has formally complained to the U.S. FTC that the carriers, AT&T, Verizon, Sprint, and T-Mobile, are too slow to issue patches that fix Android security vulnerabilities to their customers.
Of course, one could simply choose to purchase an unlocked Nexus device from Google. Because Google is actually quick to generate Android security patches and unlocked Nexus devices get updated promptly.
yes the