pwshub.com

Necro malware infects 11M+ Android devices via Google Play apps

A new version of Necro malware, a form of malware that first emerged in 2019, has been found to have been installed on at least 11 million devices through apps that were distributed through the Google Play store.

Discovered by researchers at Kaspersky Lab Inc., the malware was installed on Android devices through malicious advertising software development kits used by apps on Google Play, along with game modifications and modified versions of popular applications and games available through unofficial app stores.

One of the infected apps, called Wuta Camera, was downloaded more than 10 million times from Google Play. Another app, Max Browser, had more than 1 million downloads from Google’s official store. Both of the infected versions of the apps have since been removed by Google.

In both cases, the apps are said by the Kaspersky researchers to have been infected by an advertising SDK called “Coral SDK” that used obfuscation techniques to hide its malicious activities. For the second-stage payload, the malware then uses image steganography through “shellPlugin” disguised as a harmless image.

Once an Android device is infected, the malware then displays ads in invisible windows and then clicks on them, downloads executable files, installs third-party applications and opens arbitrary links in invisible windows to executive Javascript. The malware can also subscribe users to paid services without their knowledge and redirect internet traffic through infected devices, using them as proxies.

Katie Teitler-Santullo, cybersecurity strategist at application security posture management company OX Appsec Security Ltd., told SiliconANGLE via email that “while users have no control over what SDKs are used in apps, developers of the apps can, indeed, check to make sure the SDK hasn’t been tampered with.”

“For instance, developers should check to see if the SDK has been signed with a valid certificate and comes from a trusted source,”  Teitler-Santullo said. “Scanning source code for malicious content and unauthorized access helps developers identify whether the code has been altered or is vulnerable to exploit.”

She added that “it’s always best practice for AppSec teams to conduct various other types of scanning including SAST, DAST, dependency and vulnerability, both to find issues before apps are deployed and during runtime.”

Source: siliconangle.com

Other stories
48 minutes ago - (Reuters) -The U.S. Federal Trade Commission is expected to greenlight U.S. oil producer Chevron's purchase of Hess as soon as this week, two people familiar with the matter said, leaving Exxon Mobil's challenge to the $53 billion deal as...
48 minutes ago - (Bloomberg) -- The stock market’s unrelenting rally this year has claimed its share of celebrity bears, the best known being JPMorgan Chase & Co. market strategist Marko Kolanovic. Most Read from BloombergUnlocking the Hidden Power of...
1 hour ago - Harmonic, an artificial intelligence startup that’s pursuing the goal of mathematical superintelligence, or MSI, said today it has closed on a $75 million early-stage funding round. Today’s Series A round was led by Sequoia Capital and...
1 hour ago - The S&P 500 could hit 7,000 if it follows the stock market's average bull market path since 1932, according to Oppenheimer.
2 hours ago - Altera today shared new details about Agilex 3, an upcoming series of chips optimized to power connected devices and factory automation systems. The Intel Corp. unit first previewed the processor line in February alongside a number of...