Front page layout
Sign up or login to join the discussions!
Lily Hay Newman, wired.com –
Google has taken increasingly sophisticated steps to keep malicious apps out of Google Play. But a new round of takedowns involving about 200 apps and more than 10 million potential victims shows that this longtime problem remains far from solved—and in this case, potentially cost users hundreds of millions of dollars.
Researchers from the mobile security firm Zimperium say the massive scamming campaign has plagued Android since November 2020. As is often the case, the attackers were able to sneak benign-looking apps like “Handy Translator Pro,” “Heart Rate and Pulse Tracker,” and “Bus – Metrolis 2021” into Google Play as fronts for something more sinister. After downloading one of the malicious apps, a victim would receive a flood of notifications, five an hour, that prompted them to “confirm” their phone number to claim a prize. The “prize” claim page loaded through an in-app browser, a common technique for keeping malicious indicators out of the code of the app itself. Once a user entered their digits, the attackers signed them up for a monthly recurring charge of about $42 through the premium SMS services feature of wireless bills. It’s a mechanism that normally lets you pay for digital services or, say, send money to a charity via text message. In this case, it went directly to crooks.
The techniques are common in malicious Play Store apps, and premium SMS fraud in particular is a notorious issue. But the researchers say it’s significant that attackers were able to string these known approaches together in a way that was still extremely effective—and in staggering numbers—even as Google has continuously improved its Android security and Play Store defenses.
“This is impressive delivery in terms of scale,” says Richard Melick, Zimperium’s director of product strategy for end-point security. “They pushed out the full gauntlet of techniques across all categories; these methods are refined and proven. And it’s really a carpet-bombing effect when it comes to the quantity of apps. One might be successful, another might not be, and that’s fine.”
The operation targeted Android users in more than 70 countries and specifically checked their IP addresses to get a sense of their geographic regions. The app would show webpages in that location’s primary language to make the experience more compelling. The malware operators took care not to reuse URLs, which can make it easier for security researchers to track them. And the content the attackers generated was high quality, without the typos and grammatical errors that can give away more obvious scams.
Zimperium is a member of Google’s App Defense Alliance, a coalition of third-party companies that help keep tabs on Play Store malware, and the company disclosed the so-called GriftHorse campaign as part of that collaboration. Google says that all of the apps Zimperium identified have been removed from the Play Store and the corresponding app developers have been banned.
The researchers point out, though, that the apps—many of which had hundreds of thousands of downloads—are still available through third-party app stores. They note also that while premium SMS fraud is an old chestnut, it’s still effective because the malicious charges typically don’t show up until a victim’s next wireless bill. If attackers can get their apps onto enterprise devices, they can even potentially trick employees of large corporations into signing up for charges that could go unnoticed for years on a company phone number.
Though taking down so many apps will slow the GriftHorse campaign for now, the researchers emphasize that new variations always crop up.
“These attackers are organized and professional. They set this up as a business, and they’re not just going to move on,” says Shridhar Mittal, Zimperium’s CEO. “I’m certain this was not a one-time thing.”
This story originally appeared on wired.com.
You must login or create an account to comment.
Join the Ars Orbital Transmission mailing list to get weekly updates delivered to your inbox.
WIRED Media Group
Your California Privacy Rights | Do Not Sell My Personal Information
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of Condé Nast.
Front page layout