Windows 10 News and info | Forum

Mobile Devices and Apps | Mobile O.S's => Android O.S | Apps => Topic started by: javajolt on January 31, 2019, 01:54:16 PM



Title: Android Apps With Millions of Installs Collect Selfies, Push Porn Ads
Post by: javajolt on January 31, 2019, 01:54:16 PM
(http://i.postimg.cc/5tLLpLRG/Google-Play-Malicious-Apps.jpg)
Dozens of Android camera applications, some of them with over 1 million installs on the Google Play Store, were serving malicious ads and fake update prompts while also making sure that they won't be uninstalled by hiding their entries from the application list.

Lorin Wu, a mobile threats analyst for Trend Micro, sorted these malicious apps in two different categories: some of them were variations of the same camera application designed to beautify photos, while the other kind allowed their users to apply photo filters on their snapshots.

These apps have all been removed from the Google Play store by now, but not before they were able to amass millions of installations (some of them most probably fake).

All of them were also obviously connected to each other given that they were sharing various design components such as the screenshots added to their Google Play entries.

(http://i.postimg.cc/d14S4b7L/Malicious-app-ss-Google-Play-entry.jpg)
Malicious app's Google Play entry

According to Wu, the beauty camera apps detected as AndroidOS_BadCamera.HRX, were "capable of accessing remote ad configuration servers that can be used for malicious purposes."

After installation, they would automatically hide from the application list to make sure the victim would not be able to remove them and start displaying adult content and fraudulent content ads using the default web browser after every device unlock event.

To add insult to injury, the user would not be able to pinpoint the app that pushed the ads, while some of the advertisements redirected the victims to websites which asked for personal information to be able to collect various fake prizes.

The ads were displayed using ad configurations downloaded in JSON format which also contained instructions designed to allow the apps to adjust the ad behavior depending on the compromised device.

(http://i.postimg.cc/vZ0hRrYN/Malicious-ad-popups.png)
Malicious ad pop-ups

The other batch of malicious Android applications which targeted users who wanted to apply filters to their selfies could be considered even more dangerous considering that they uploaded their victims' snapshots to servers their authors controlled.

Seeing that none of them actually worked as advertised, only delivered fake update screens, and also hid themselves to avoid being uninstalled, their authors' intent was clearly malicious.

(http://i.postimg.cc/3RxH8Cm0/Fake-update-screens.png)
Fake update screens

As TrendMicro states (http://blog.trendmicro.com/trendlabs-security-intelligence/various-google-play-beauty-camera-apps-sends-users-pornographic-content-redirects-them-to-phishing-websites-and-collects-their-pictures/), "The authors can collect the photos uploaded in the app, and possibly use them for malicious purposes for example as fake profile pics in social media."

Scores of malicious apps also installed by millions of users have been previously found on the Google Play store, stealing banking information while trying to avoid detection with the help of the motion sensor, showing ads while impersonating GPS apps and a host of other Android utilities.

source (http://www.bleepingcomputer.com/news/security/android-apps-with-millions-of-installs-collect-selfies-push-porn-ads/)