Android Click-Fraud Apps Briefly Return to Google Play
Click-fraud apps frequently appear on Google Play and third-party markets. They are sometimes hard to identify because the malicious behavior that simulates clicks is similar to the behavior of many legitimate applications (using common API calls and permissions). Further, part of the malicious code does not reside in the original malware and comes from a control server. Using special methods to perform the clicking allows the attackers to decide when and how pursue their fraud.
The McAfee Mobile Malware Research Team recently found on Google Play a group of Android/Clickers published by the developer “TubeMate 2.2.9 SnapTube YouTube Downloader J.” Five apps were updated on Google Play on August 4 and were removed a few days later, along with the developer profile.
By checking “com.ggnegmth.app” on GooglePlay we saw something suspicious in this application: a nonsense name, no description, and poorly reviewed. Of course, those traits do not guarantee an app is malicious, but this lineup should serve as a warning for Android users looking for new apps.
Analyzing and reverse engineering this sample shows us a DeviceAdminReceiver class that connects to a hardcoded URL to obtain parameters that indicate how and where to perform click-fraud activities:
This function is part of a service initiated by a receiver related to DeviceAdmin.
Once the URL is requested, the control server returns an HTML page with the parameters in an uncommon way—inside the title tag, as we see in the following:
Once installed, Android/Clicker.BN adds an icon to the main menu that is not related to the downloaded app from Google Play. The new icon appears to be a system utility. Some examples of the icons loaded by the malware:
Some of the apps can access YouTube inside a WebView and list trending channels, others lock and blacken the screen, and others crash the UI while in the background running click fraud—which not only harms advertisers and publishers, but also generates malicious traffic on infected devices, impacts battery and overall usage performance, and opens the door to new malicious payloads.
McAfee Mobile Security detects this threat as Android/Clicker.BN!Gen and prevents its execution. To further protect yourself against malicious apps, use only legitimate app stores, and pay attention to suspicious traits such as nonsense names, missing descriptions, and poor reviews. Also verify that the app’s request for permissions are related to its functionality. Be wary when apps request device administration API access, which is usually requested only by security apps, antimalware, mobile device management, or corporate email clients. Most apps and games will never ask for device admin rights.
The post Android Click-Fraud Apps Briefly Return to Google Play appeared first on McAfee Blogs.
More antivirus and malware news?
- BIND Updates Patch Three Vulnerabilities
- US man confesses to part in $1.3M bank and payroll phishing scam
- University Collaboration Suite (UCS) Server Maintenance – January 17
- Dell pushes harder on encryption, anti-malware defenses
- Exploit Acquisition Firm Offers $3 Million for iOS 9 Zero-Days
- Microsoft Windows Kernel ‘Win32k.sys’ CVE-2015-0003 Local Privilege Escalation Vulnerability
- Twitter looking to hire two-factor authentication brains
- Voice ‘fingerprints’ may plug call-center security leaks
- Pharma hackers create a DIY EpiPen, the EpiPencil
- Germany says US may have spied on Merkel’s mobile phone