Go to listing page

Chinese Affiliated Spyware Uncovered on Google Play Store

Chinese Affiliated Spyware Uncovered on Google Play Store
Security researchers at Mobile security solutions provider Pradeo identified two instances of spyware concealed within the Google Play Store, which have impacted approximately 1.5 million users. 

The malicious apps

Pradeo researchers uncovered details of a couple of spyware apps on the Google Play Store - File Recovery and Data Recovery and File Manager. 
  • These two applications, developed by the same entity, masquerade as file management tools and exhibit comparable malicious behaviors.
  • Notably, they are designed to initiate autonomously, without any user interaction, and transmit valuable user data to multiple servers located in China.

What’s on the line?

  • The spyware applications illicitly acquire the data, including OS version number, device brand and model, network provider, network code of the SIM provider, country code, as well as real-time user location.
  • They also pilfer sensitive media content, such as pictures, videos, and audio content, contact lists, and more.

How does the lure work?

  • The attackers behind these malicious apps have used various tactics to appear legitimate, such as showing a large user base without any user reviews. It is suspected that they employed mobile device emulators or installed farms to artificially inflate the number of users, boosting the apps' ranking on the store.
  • Another strategy employed is minimizing user interaction. These applications possess the ability to automatically launch upon system startup, allowing them to carry out their malicious activities even when the app itself is not actively being used. 
  • Additionally, these apps remain concealed on the home screen, ensuring their icons are hidden to prevent easy uninstallation.

More spyware

  • In June, three Android apps on Google Play were used by a state-sponsored hacking group to collect intelligence from targeted devices, highlighting the ongoing threat of malicious apps on trusted platforms. The operation was attributed to the DoNot APT group. 
  • The same month, researchers discovered the SpinOk malware in over 400 million Android app downloads, posing a significant threat to user data security. 

The bottom line

There are several ways to steer clear of these threats. Some of these measures include not downloading apps with thousands of users but zero reviews and read permissions before granting them. To enhance their security measures, organizations are advised to automate the process of detecting and responding to mobile threats by thoroughly evaluating applications and verifying their compliance with established security policies.
Cyware Publisher

Publisher

Cyware