News

Published on September 6th, 2019 📆 | 3737 Views ⚑

0

Holy cybercrime, Batman! Joker malware commits ad fraud, data theft


iSpeech.org

Two dozen apps that collectively generated over 472,000 downloads from the Google Play store were found to be infected with a new Android malware called Joker, which delivers a payload that perpetrates both ad fraud and data theft, a research firm has reported.

Joker’s second-stage malware is a .dex (Dalvik Executable) file capable of stealing victims’ SMS messages, contact lists and device information. It also secretly interacts with advertisement websites to generate fake clicks as well as sign up infected victims with premium service subscriptions that they didn’t ask for, according to CSIS malware analyst Aleksejs Kuprins, writing in his company’s tech blog.

The malware requests these unauthorized subscriptions are “by automating the necessary interaction with the premium offer’s webpage, entering the operator’s offer code, then waiting for a SMS message with a confirmation code and extracting it using regular expressions,” Kuprins writes. “Finally, the Joker submits the extracted code to the offer’s webpage, in order to authorize the premium subscription.

Kuprins notes that Google was aware of the malicious apps and has been active in extricating the malicious apps from its store, removing all 24 “without any note from us.”

Joker only downloads the malicious payload if the infected device contains a SIM card from one of 37 countries coded into the apps. In its post, CSIS identifies the countries as Australia, Austria, Belgium, Brazil, China, Cyprus, Egypt, France, Germany, Ghana, Greece, Honduras, India, Indonesia, Ireland, Italy, Kuwait, Malaysia, Myanmar, Netherlands, Norway, Poland, Portugal, Qatar, Republic of Argentina, Serbia, Singapore, Slovenia, Spain, Sweden, Switzerland, Thailand, Turkey, Ukraine, United Arab Emirates, United Kingdom and the U.S.





Although the U.S. is one of the 37 countries targeted, most of the apps contain additional instructions that prevent the malware from executing in the U.S., and Canada for that matter.

CSIS reports that the core payload is “small and silent,” using minimal Java code and generating a limited footprint, all in hopes of avoiding unwanted attention. It receives, code and commands over HTTP, running the code via JavaScript-to-Java callbacks to defend against static analysis.

The malware’s code comments and the user interface of its C2 panel are both written in Chinese, an observation that offers a possible clue as to attack attribution.

Source link

Tagged with: • • • • • •



Comments are closed.