android malware

Researchers have uncovered a brand new set of fraudulent Android apps within the Google Play retailer that had been discovered to hijack SMS message notifications for finishing up billing fraud.

The apps in query primarily focused customers in Southwest Asia and the Arabian Peninsula, attracting a complete of 700,000 downloads earlier than they had been found and faraway from the platform.

The findings had been reported independently by cybersecurity corporations Trend Micro and McAfee.

password auditor

“Posing as photograph editors, wallpapers, puzzles, keyboard skins, and different camera-related apps, the malware embedded in these fraudulent apps hijack SMS message notifications after which make unauthorized purchases,” researchers from McAfee stated in a Monday write-up.

The fraudulent apps belong to the so-called “Joker” (aka Bread) malware, which has been discovered to repeatedly sneak previous Google Play defenses over the previous 4 years, leading to Google eradicating no fewer than 1,700 contaminated apps from the Play Retailer as of early 2020. McAfee, nonetheless, is monitoring the risk below a separate moniker named “Etinu.”

The malware is infamous for perpetrating billing fraud and its spyware and adware capabilities, together with stealing SMS messages, contact lists, and machine info. The malware authors usually make use of a way referred to as versioning, which refers to importing a clear model of the app to the Play Retailer to construct belief amongst customers after which sneakily including malicious code at a later stage through app updates, in a bid to slide by way of the app evaluate course of.

The extra code injected serves because the first-stage payload, which masquerades seemingly innocuous .PNG information and establishes with a command-and-control (C2) server to retrieve a secret key that is used to decrypt the file to a loader. This interim payload then hundreds the encrypted second payload that is finally decrypted to put in the malware.

McAfee’s investigation of the C2 servers revealed customers’ private info, together with provider, telephone quantity, SMS message, IP tackle, nation, community standing, together with auto-renewing subscriptions.

password auditor

The listing of 9 apps is beneath –

  • Keyboard Wallpaper (
  • PIP Photograph Maker (com.pip.editor.digicam)
  • 2021 Wallpaper and Keyboard (
  • Barber Prank Hair Dryer, Clipper and Scissors (com.tremendous.shade.hairdryer)
  • Image Editor (
  • PIP Digital camera (com.hit.digicam.pip)
  • Keyboard Wallpaper (com.daynight.keyboard.wallpaper)
  • Pop Ringtones for Android (
  • Cool Woman Wallpaper/SubscribeSDK (cool.girly.wallpaper)

Customers who’ve downloaded the apps are urged to verify for any unauthorized transactions whereas additionally taking steps to be careful for suspicious permissions requested by apps and thoroughly scrutinize apps earlier than they’re put in on the gadgets.

“Judging by how Joker operators repeatedly make sure the malware’s persistence in Google Play even after being caught quite a few occasions, most likely there are methods [the operators] are cashing in on this scheme,” Development Micro researchers stated.

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.