New Malware Found in Google Play Apps, 11 Million Downloads Affected

25 Sep 2024

Five years ago, a troubling discovery shook the tech community when a legitimate Android application on the Google Play Store was found to have been compromised. This breach stemmed from a library utilized by developers for ad revenue generation, which inadvertently introduced malicious code. As a result, the app connected a staggering 100 million devices to servers controlled by hackers, allowing harmful payloads to be secretly downloaded.

In a disconcerting echo of that incident, researchers from a Moscow-based security firm, Kaspersky, recently unveiled that two new applications, collectively downloaded 11 million times from the Google Play Store, were similarly infected with malware. The team suspects that a rogue software development kit (SDK) used for ad integration is once again at the heart of the issue.

Advanced Malware Techniques

SDKs serve as invaluable tools for developers, providing ready-made frameworks that streamline the app development process by managing repetitive tasks. In the case of the infected applications, an unvalidated SDK module was purportedly employed to facilitate ad displays. However, this same module also enabled covert communication with malicious servers, which not only harvested user data but also dispatched harmful code that could be executed and updated remotely at will.

The malware, identified as Necro, exhibited advanced techniques in this latest iteration. Some variants utilized steganography—a method of concealing data that is rarely seen in mobile malware. Furthermore, certain versions introduced sophisticated mechanisms to deliver harmful code capable of executing with elevated system privileges. Once a device fell victim to this malware, it established a connection with a hacker-operated command-and-control server, transmitting encrypted JSON data about the device and the compromised app.

The server would respond with a JSON file containing a link to a PNG image alongside metadata that included the image’s hash. If the hash verification succeeded on the infected device, the image would be downloaded.

According to Kaspersky researchers in a separate report, “The SDK module employs a fairly basic steganographic method. If the MD5 verification passes, it decodes the contents of the PNG file—specifically the pixel values in the ARGB channels—using standard Android tools. The getPixel method then extracts a value, the least significant byte of which contains the blue channel, and code processing starts.”

Viewing the blue channel as a one-dimensional byte array, the first four bytes represent the size of the encoded payload in Little Endian order. Following this, the payload of the stated size is recorded; this is a JAR file encoded with Base64, which is executed after being decoded via DexClassLoader. The Coral SDK then loads the sdk.fkgh.mvp.SdkEntry class from the JAR file using the native libcoral.so library, which has been obscured using the OLLVM tool. The execution starts from the ‘run’ method in the loaded class.

Subsequent payloads install malicious plugins that vary per device, enabling a spectrum of harmful activities. One such plugin allows the execution of code with elevated system privileges. Typically, Android restricts privileged processes from utilizing WebView, a component designed to display web content within apps. To bypass this restriction, Necro employs a hacking technique known as a reflection attack to instantiate a separate WebView factory.

This plugin is also capable of downloading and executing additional executable files that manipulate URL displays in WebView. With elevated privileges, these files can alter URLs to append verification codes for paid subscriptions and initiate downloads and executions of code from attacker-controlled links. Kaspersky's analysis of Necro revealed five distinct payloads.

The modular architecture of Necro presents numerous challenges for cybersecurity experts. Each payload is designed to perform specific tasks, making it difficult to detect and neutralize all components simultaneously. This adaptability underscores the importance of rigorous security measures and continuous monitoring in app development and distribution.

Top charts for Mobile Android

uTorrent

uTorrent

Latest update uTorrent download for free for Windows PC or Android mobile

5
1032 reviews
5605502
downloads
Zona

Zona

Latest update Zona download for free for Windows PC or Android mobile

4
614 reviews
999356
downloads
Minecraft

Minecraft

Latest update Minecraft download for free for Windows PC or Android mobile

5
750 reviews
438867
downloads
Geometry Dash

Geometry Dash

Latest update Geometry Dash download for free for Windows PC or Android mobile

4
539 reviews
366131
downloads

News and reviews for Mobile Android

Google's New Identity Policy Impacts Android Developers

Google's new Android policy requires developer identity verification, sparking debate over cybersecurity and user freedom amid malware concerns.

Read more

HereWeGo: A Privacy-Focused Alternative to Google Maps

HereWeGo offers a clean, ad-free mapping experience with features similar to Google Maps, prioritizing user privacy online and offline.

Read more

Password Manager Launched as Standalone App on Play Store

Google releases Password Manager as a standalone app, enabling easy access and management of passwords without relying on Chrome, despite some integration challenges with other browsers.

Read more

Shinkansen Tickets Now Available On Line App For Easy Access

Starting October 4, JR Central, JR West, and JR Kyushu will allow Shinkansen tickets to be purchased using the Line app, enhancing convenience and offering a discount.

Read more

Developer Verification to Be Mandatory for Android Apps by 2026

Google's 2026 developer verification policy requires app developers to verify identities. This aims to enhance security across Android, affecting both official and sideloading methods.

Read more

Samsung Introduces Bubble Emoji for Personalized Messaging

Samsung's Bubble Emoji feature adds a personal touch to texts, automatically assigning emojis based on message context. Now available in South Korea.

Read more

Elijah Wood Highlights Passion for Game Ventures

Elijah Wood shares his gaming favorites, from LucasArts classics to modern indie gems. The actor delves into his voice acting roles and involvement in upcoming projects, illustrating his deep connection with the gaming world.

Read more

Exclusive Deals on Android Apps and Google Pixel Devices

Discover the latest deals on Android apps and Google Pixel pre-orders, featuring cash discounts and significant savings on popular games and productivity tools.

Read more

Android Deals Lead to Big Savings on Apps and Devices

Discover incredible Android deals on apps, games, and Google Pixel devices. Don't miss out on these top discounts to boost productivity and enjoyment at unbeatable prices.

Read more

Uber to Pioneer Live Notifications in Samsung's One UI 8

Uber looks to integrate dynamic alerts with Samsung's One UI 8, aligning with Google’s Live Updates API on Android 16 devices to enhance real-time user experience.

Read more