Threats to mobile devices
11.12 Doctor Web’s overview of mobile malware detected in November 2019
December 11, 2019
This November, Doctor Web virus analysts detected a number of new threats on Google Play. The list included new modifications to trojans of the
PRINCIPAL TREND IN NOVEMBER
- Malicious software appearing on Google Play
Mobile threat of the month
In November, Doctor Web experts detected a new modification to the
According to statistics collected by Dr.Web for Android
Android.Backdoor .682.origin- A trojan that executes cybercriminals’ commands and helps them control infected mobile devices.
Android.DownLoader .677.origin- A downloader of other malicious software.
Android.Triada .481.origin- A multi-functional trojan that performs various malicious actions.
Android.MobiDash.4006 - Trojan code that displays obnoxious advertising.
Android.RemoteCode .197.origin- A malicious application that downloads and executes arbitrary code.
- Program.FakeAntiVirus.2.origin
Detects adware that imitates anti-virus software. - Program.RiskMarket.1.origin
An app store that contains trojan software and recommends that users install it. - Program.HighScore.3.origin
An app store that invites users to install free Google Play apps by paying for them via expensive text messages. Program.MonitorMinor .1.originProgram.MobileTool .2.origin
Spyware that monitors activities of Android users and may serve as a tool for cyber espionage.
Tool.SilentInstaller .6.originTool.SilentInstaller .7.originTool.SilentInstaller .11.originTool.VirtualApk .1.origin
A riskware platform that allows applications to launch APK files without installing them.- Tool.Rooter.3
A utility designed to obtain root privileges on Android devices. It may be used by cybercriminals and malware.
Program modules that incorporate themselves into Android applications and display obnoxious ads on mobile devices:
- Adware.Dowgin.5.origin
- Adware.Toofan.1.origin
- Adware.BrowserAd.1
- Adware.Myteam.2.origin
- Adware.Altamob.1.origin
Trojans on Google Play
Last month, Doctor Web virus analysts detected a number of new modifications to trojans from the
We also detected the new trojan adware,
To protect your Android device from malware and unwanted programs, we recommend you install Dr.Web for Android.

Your Android needs protection.
Use Dr.Web
- The first Russian anti-virus for Android
- Over 140 million downloads—just from Google Play
- Available free of charge for users of Dr.Web home products
13.11 Doctor Web’s overview of malware detected on mobile devices in October 2019
November 13, 2019
The second autumn month turned out to be rough for Android users. Doctor Web virus analysts detected numerous malicious applications on Google Play, such as
PRINCIPAL TRENDS IN OCTOBER
- A growing number of threats on Google Play
Mobile threat of the month
In early October, Doctor Web reported a few clicker trojans that were added to the Dr.Web virus database as
- they are embedded into harmless applications;
- they are protected by a program packer;
- they are disguised as well-known SDKs;
- they attack users from specific countries.
Our virus analysts continued detecting additional modifications to these clickers throughout the entire month, having found
According to statistics collected by Dr.Web for Android
Android.HiddenAds .472.origin- A trojan that delivers annoying advertisements.
Android.RemoteCode .5564- A malicious application that downloads and executes arbitrary code.
Android.Backdoor .682.origin- A trojan that executes cybercriminals’ commands and helps them control infected mobile devices.
Android.DownLoader .677.origin- A downloader of other malicious software.
Android.Triada .465.origin- A multi-functional trojan that performs various malicious actions.
Program.FakeAntiVirus .2.origin
Detection of adware that imitates anti-virus software.Program.MonitorMinor .1.originProgram.MobileTool .2.originProgram.FreeAndroidSpy .1.originProgram.SpyPhone .4.origin
Spyware that monitors activities of Android users and may serve as a tool for cyber espionage.
Tool.SilentInstaller .6.originTool.SilentInstaller .7.originTool.SilentInstaller .11.originTool.VirtualApk .1.origin
A riskware platform that allows applications to launch APK files without installing them.- Tool.Rooter.3
A utility designed to obtain root privileges on Android devices. It may be used by cybercriminals and malware.
Program modules that incorporate themselves into Android applications and display obnoxious ads on mobile devices:
Adware.Patacore .253- Adware.Myteam.2.origin
- Adware.Toofan.1.origin
- Adware.Adpush.6547
- Adware.Altamob.1.origin
Trojans on Google Play
Apart from clicker trojans, Doctor Web virus analysts revealed several versions, as well as modifications to already known malware from the
Apart from that, our experts detected another trojan adware from the
Additionally, the Dr.Web virus database was updated to detect the trojans
To protect your Android device from malware and unwanted programs, we recommend you install Dr.Web for Android.

Your Android needs protection.
Use Dr.Web
- The first Russian Anti-virus for Android
- More than 140 million downloads on Google Play alone
- Free for users of Dr.Web home products
17.10 Clicker for Android subscribes users to paid services
October 17, 2019
Virus analysts have identified several modifications of this malicious code, dubbed
Apart from that, all malware was protected by the commercial Jiagu packer, which makes it harder for antiviruses to detect them and hinders the code analysis. Thus, the trojan was more likely to avoid detection by the built-in security tools of Google Play.
Besides, virus writers tried to disguise the trojan as well-known advertising and analytics libraries. After being added to the host software, it embedded itself in the Facebook and Adjust SDKs, hiding among their components.
The clicker attacked users selectively; it did not perform any malicious actions if the potential victim was not residing in one of the attackers’ countries of interest.
See below examples of apps with this trojan:
Upon installation and launch, the clicker (hereinafter, we will take its modification
If the user grants it the permissions, the trojan will be able to hide all notifications about incoming text messages and hook them.
Next, the clicker sends the technical data about the infected device to the command and control server and checks the serial number of the victim’s SIM card. If it corresponds to one of the target countries,
If the victim’s SIM card is not registered in a country of interest, the trojan does not take any action and stops its malicious activity. The studied modifications attack residents of the following states:
- Austria
- Italy
- France
- Thailand
- Malaysia
- Germany
- Qatar
- Poland
- Greece
- Ireland
After transmitting the number,
After receiving a website address,
Even though the clicker is not designed to work with text messages and has no access to them, it bypasses the restriction as follows. The trojan service monitors notifications from the default application that works with text messages. When there is an incoming message, the service hides the system notification. Then it hooks the information about the received text from the notification and transmits it to the trojan broadcast receiver. As a result, the user does not see any notifications about incoming texts and does not know what is happening. They only know about the subscription when money withdraws from their account, or if they go to the message menu and see texts related to the premium service.
Doctor Web experts have contacted Google and the detected malicious applications were removed from Google Play. All known modifications of this clicker are successfully detected and removed by Dr.Web for Android and do not pose any threat to our users.
Read more about Android.Click.322.origin
#Android, #Google_Play, #clicker, #paid_subscription

Your Android needs protection.
Use Dr.Web
- The first Russian Anti-virus for Android
- More than 140 million downloads on Google Play alone
- Free for users of Dr.Web home products
09.10 Doctor Web’s overview of malware detected on mobile devices in September 2019
October 9, 2019
In September, Android users were threatened by various malware, many of which was distributed via Google Play. Those were the
PRINCIPAL TRENDS IN SEPTEMBER
- Google Play remains the source of malicious and unwanted applications
- Users are still threatened by spyware
Mobile threat of the month
One of the malware detected last month was the
When launched,
The trojan hooked two-factor authentication codes from text messages, as well as access codes from emails. It also hooked and blocked notifications from instant messengers and email clients.
According to statistics collected by Dr.Web for Android
Android.RemoteCode .6122Android.RemoteCode .5564- Malicious applications that download and execute arbitrary code.
Android.HiddenAds .455.originAndroid.HiddenAds .472.origin (new threat)- Trojans that display unwanted ads on mobile devices.
Android.Backdoor .682.origin- A trojan that executes cybercriminals’ commands and helps them control infected mobile devices.
Program modules that incorporate themselves into Android applications and display obnoxious ads on mobile devices:
Adware.Patacore .253- Adware.Gexin.3.origin
- Adware.Zeus.1
- Adware.Altamob.1.origin
Riskware that silently launches applications without user intervention:
Tool.SilentInstaller .6.origin
Threats on Google Play
In addition to the
Attackers distributed
The banker used the Android Accessibility Service to steal information from text messages, such as confirmation codes and other sensitive data. Similarly to its previous modifications, it could also open phishing pages at the command of cybercriminals.
Last month, virus analysts detected several new adware trojans of the
Among the detected malware were trojan downloaders, such as
In September, several modifications of the Android.Joker trojan family were found on Google Play. These malicious applications were embedded in seemingly harmless software, such as plug-ins for cameras, photo editors, image collections, various system utilities, and other software.
Trojans are able to load and run auxiliary DEX files, as well as execute arbitrary code. They can also automatically subscribe users to expensive services by loading websites with premium content and clicking the appropriate links without user’s knowledge. To confirm the subscription, they hook verification codes from text messages. The Android.Joker malware also transfers the data from victims’ contact lists to the command and control server.
Other trojans that subscribed users to expensive services were dubbed
Spyware
In September, Doctor Web experts discovered several new versions of riskware, designed to spy on Android device users. The list included
To protect your Android device from malware and unwanted programs, we recommend that you install Dr.Web for Android.

Your Android needs protection.
Use Dr.Web
- The first Russian anti-virus for Android
- Over 140 million downloads—just from Google Play
- Available free of charge for users of Dr.Web home products
09.09 Doctor Web’s overview of malware detected on mobile devices in August 2019
September 9, 2019
In the last month of summer, Doctor Web virus analysts detected the clicker trojan
PRINCIPAL TRENDS IN AUGUST
- Detection of new malware on Google Play
- Emergence of new adware modules
Mobile threat of the month
In early August, Doctor Web reported the
- it began operating 8 hours after startup;
- some features were implemented using reflection;
- it could subscribe users to premium mobile services using WAP-Click.
For more information on
According to statistics collected by Dr.Web for Android
Android.HiddenAds .455.origin- A trojan designed to display unwanted ads on mobile devices.
Android.Backdoor .682.origin- A trojan that executes cybercriminals’ commands and helps them control infected mobile devices.
Android.Triada .467.origin- A multi-functional trojan that performs various malicious actions.
Android.RemoteCode .197.originAndroid.RemoteCode .5564- Malicious applications designed to download and execute arbitrary code.
Program modules that incorporate themselves into Android applications and display obnoxious ads on mobile devices:
- Adware.Gexin.3.origin
Adware.Patacore .253- Adware.Zeus.1
- Adware.Altamob.1.origin
- Adware.Myteam.2.origin (a new threat)
Threats on Google Play
Along with the
Virus analysts also identified new trojan adware of the
At the end of August, Doctor Web experts discovered another banking trojan that attacked Brazilian Android users. This malware was dubbed
To protect your Android device from malware and unwanted programs, we recommend that you install Dr.Web for Android.

Your Android needs protection.
Use Dr.Web
- The first Russian Anti-virus for Android
- More than 140 million downloads on Google Play alone
- Free for users of Dr.Web home products
08.08 Doctor Web: Clicker Trojan Installed from Google Play by Some 102,000,000 Android Users
August 8, 2019
The trojan is a malicious module, which, according to Dr.Web classification, was dubbed
Once launched, the trojan sends the following information about the infected device to the C&C server:
- manufacturer and model;
- operating system version;
- user’s country of residence and default system language;
- User-Agent ID;
- mobile carrier;
- internet connection type;
- display parameters;
- time zone;
- data on application containing trojan.
In response, the server sends the necessary settings. Some functions of the malware are using reflection, and the settings contain the names of methods and classes along with the parameters for them. They are used, for example, to register a broadcast receiver and a content observer, which
Upon installation of a new application or download of an apk file by the Play Market client, the trojan sends information about this software along with some technical data about the device to the command and control server. In response,
Thus, depending on the settings of the command and control server and the instructions it sends, the trojan can not only advertise applications on Google Play, but also covertly load any websites, including advertisements (even videos) or other dubious content. For example, after installing applications with the built-in trojan, users complained about being automatically subscribed to expensive content provider services.
Fig. 1. First user comment: “After installation, it subscribes you to paid services! Be careful, do not install this application!!!”
Developer response: “What services? You're wrong.”
Second user: “After installation, I was subscribed to 5 services and now my phone account is empty.”
Fig. 2. User comment: “What kind of joke is this? Paid subscriptions to Beeline (Russian mobile carrier). I have nothing to do with Beeline.”
Fig. 3. User comment: “The moment you log in, it deducts 50 rubles. I don’t know what it is for, please explain.”
Fig. 4. User comment: “After I use the app, they subscribe me to some shady services.”
Doctor Web specialists were unable to recreate the conditions for the trojan to open such websites. However, in the case of
Doctor Web virus analysts have identified 34 applications with the embedded
GPS Fix |
QR Code Reader |
ai.type Free Emoji Keyboard |
Cricket Mazza Live Line |
English Urdu Dictionary Offline - Learn English |
EMI Calculator - Loan & Finance Planner |
Pedometer Step Counter - Fitness Tracker |
Route Finder |
PDF Viewer - EBook Reader |
GPS Speedometer |
GPS Speedometer PRO |
Notepad - Text Editor |
Notepad - Text Editor PRO |
Who unfriended me? |
Who deleted me? |
GPS Route Finder & Transit: Maps Navigation Live |
Muslim Prayer Times & Qibla Compass |
Qibla Compass - Prayer Times, Quran, Kalma, Azan |
Full Quran MP3 - 50+ Audio Translation & Languages |
Al Quran Mp3 - 50 Reciters & Translation Audio |
Prayer Times: Azan, Quran, Qibla Compass |
Ramadan Times: Muslim Prayers, Duas, Azan & Qibla |
OK Google Voice Commands (Guide) |
Sikh World - Nitnem & Live Gurbani Radio |
1300 Math Formulas Mega Pack |
Обществознание - школьный курс. ЕГЭ и ОГЭ (Social Sciences - School Curriculum. State Uniform Examinations, Basic State Examinations.) |
Bombuj - Filmy a seriály zadarmo |
Video to MP3 Converter, RINGTONE Maker, MP3 Cutter |
Power VPN Free VPN |
Earth Live Cam - Public Webcams Online |
QR & Barcode Scanner |
Remove Object from Photo - Unwanted Object Remover |
Cover art IRCTC Train PNR Status, NTES Rail Running Status |
Doctor Web informed Google about this trojan, and some applications we had detected were quickly removed from Google Play. Additionally, several applications have been updated, removing the malicious component. However, at the time of this publication, most applications still contained a malicious module and remained available for download.
Virus analysts recommend that developers responsibly choose modules to monetize their applications and not integrate dubious SDKs into their software. Dr.Web for Android successfully detects and removes applications that have the known modifications of
Read more about Android.Click.312.origin
#Android, #Google_Play, #clicker
05.08 Doctor Web’s overview of virus activity on mobile devices in July 2019
August 5, 2019
Last month Doctor Web reported the dangerous
PRINCIPAL TRENDS IN JULY
- Distribution of an Android backdoor that was spying on users and executing commands from cybercriminals
- Detection of new trojans and unwanted applications on Google Play
- Distribution of spyware trojans
Mobile threat of the month
In mid-July, Doctor Web virus analysts investigated the
This backdoor spied on users, sending information about their contacts, phone calls, and their device location to the attackers. It also uploaded files from devices to a remote server, as well as download and installed software. Features of
- the main malicious component of the trojan was hiding in an auxiliary module, encrypted and stored in the application’s resource directory;
- with root privileges, it could automatically install software;
- could execute shell commands, received from the C&C server.
For more information regarding
According to statistics collected by Dr.Web for Android
Android.Backdoor .682.origin- A trojan that executes cybercriminals’ commands and helps them control infected mobile devices.
Android.HiddenAds .1424- A trojan designed to display obnoxious ads. It is distributed under the guise of popular applications.
Android.RemoteCode .197.originAndroid.RemoteCode .5564Android.RemoteCode .216.origin- Malicious applications designed to download and execute arbitrary code.
Program modules that incorporate themselves into Android applications and display obnoxious ads on mobile devices:
- Adware.Zeus.1
- Adware.Gexin.3.origin
Adware.Patacore .253- Adware.Altamob.1.origin
A riskware platform that allows applications to launch APK files without installing them:
Tool.VirtualApk .1.origin
Threats on Google Play
Since the beginning of July, Doctor Web malware analysts have detected many new adware trojans of the
In addition, a new unwanted advertising module named
Cyberespionage
Last month, the Dr.Web virus database was also updated to detect the spyware trojans
The second one displayed a fraudulent message, prompting a potential victim to update a Google Play component. If the user agreed, the trojan displayed a phishing window that simulated a Google account login page.
Virus writers made a spelling mistake in the phrase “Sign in”, which could indicate a fake. If the victim did not notice this and logged into the account,
To protect your Android device from malware and unwanted programs, we recommend you install Dr.Web for Android.

Your Android needs protection.
Use Dr.Web
- The first Russian anti-virus for Android
- Over 140 million downloads—just from Google Play
- Available free of charge for users of Dr.Web home products
12.07 Doctor Web: A dangerous Android backdoor distributed via Google Play
July 12, 2019
The malware was dubbed
When launched,
Its window contains a button to “check” for updates to the OpenGL ES interface. When a user taps the window, the trojan simulates a search for new versions of OpenGL ES, but does not actually perform any checks.
When the victim closes the application window,
The backdoor communicates with several command and control servers to receive commands from the attackers and send the collected data. The cybercriminals can also control the trojan via the Firebase Cloud Messaging service.
- sending information on contacts from the contact list to the server;
- sending information on text messages to the server (the investigated version of the trojan did not have the permissions for this);
- sending the phone call history to the server;
- sending the device location to the server;
- downloading and launching an APK or a DEX file using the DexClassLoader class;
- sending the information on the installed software to the server;
- downloading and launching a specified executable file;
- downloading a file from the server;
- uploading a specified file to the server;
- transmitting information on files in the specified directory or a memory card to the server;
- executing a shell command;
- launching the activity specified in a command;
- downloading and installing an Android application;
- displaying a notification specified in a command;
- requesting permission specified in a command;
- sending the list of permissions granted to the trojan to the server;
- not letting the device go into sleep mode for a specified time period.
The trojan AES encrypts all data transmitted to the server. Each request is protected with a unique generated key based on the current time. The same key encrypts the server response.
- automatically, if the system has root access (using a shell command);
- using a system package manager (system software only);
- displaying a standard system installation dialog where the user needs to confirm the installation.
As you can see, this backdoor is a serious threat. Not only does it act as spyware, but it can also be used for phishing because it can display windows and notifications with any content. It can also download and install any other malicious application, as well as execute arbitrary code. For example, at the command of attackers,
Doctor Web has notified Google about the trojan; it was already removed from Google Play at the time of publication.
Read more about Android.Backdoor.736.origin
#Android, #backdoor, #Google_Play, #spyware

Your Android needs protection.
Use Dr.Web
- The first Russian anti-virus for Android
- Over 140 million downloads—just from Google Play
- Available free of charge for users of Dr.Web home products
03.07 June 2019 mobile malware review from Doctor Web
July 3, 2019
In mid June, Dr.Web virus analysts discovered the
PRINCIPAL TREND IN JUNE
- New malicious and unwanted applications on Google Play
Mobile threat of the month
On June 14, Doctor Web reported the
Clicking such a message would open one of the advertised websites in the browser. Many of them were fraudulent.
Features of
- it is distributed via Google Play under the guise of official software by well-known brands;
- notifications from websites, loaded by the trojan, did not stop when the trojan was removed.
According to statistics collected by Dr.Web for Android
Android.Backdoor .682.origin- A trojan that executes cybercriminals’ commands and helps them control infected mobile devices.
Android.HiddenAds .1424- A trojan designed to display obnoxious ads. It is distributed under the guise of popular applications.
Android.RemoteCode .197.originAndroid.RemoteCode .4411- Malicious applications designed to download and execute arbitrary code.
Android.Triada .3670- A multi-functional trojan that performs different malicious actions.
Program modules that incorporate themselves into Android applications and display obnoxious ads on mobile devices:
- Adware.Zeus.1
- Adware.Jiubang.2
Adware.AdPush .33.origin- Adware.Toofan.1.origin
A riskware platform that allows applications to launch APK files without installing them:
Tool.VirtualApk .1.origin
A new threat:
Adware.Patacore .253- A representative of a family of unwanted modules that display banner advertisments on Android devices.
Threats on Google Play
Along with
Virus analysts have also discovered a number of new
After installation and launch, the malware hid its icons and began displaying ads.
Another trojan found on Google Play was named
The first versions of this application were safe; but later, in versions 1.1.0 and 1.1.4, it was updated with trojan functionality.
Another downloader was named
At the end of June, the Dr.Web virus database was updated to detect the
To protect your Android device from malware and unwanted programs, we recommend you install Dr.Web for Android.

Your Android needs protection.
Use Dr.Web
- The first Russian anti-virus for Android
- Over 140 million downloads—just from Google Play
- Available free of charge for users of Dr.Web home products
14.06 Doctor Web: Android users threatened by fraudulent push notifications
June 14, 2019
The Web Push technology allows websites to send notifications even when the webpage is not open in the browser if the user agrees to that. When it comes to harmless websites, this feature can be useful and convenient. For example, social media can notify the users on new messages, and news agencies can spread information about new articles. However, cybercriminals and unscrupulous advertisers can abuse this technology by spreading advertising and fraudulent notifications that come from hacked or malicious websites.
PC, laptop browsers, as well as mobile devices support these notifications. Typically, the victim gets to a questionable spamming website by clicking a unique link or an advertising banner.
When launched, the trojan loads a website in Google Chrome. The website is specified in the trojan settings. According to its parameters, it performs several redirects to pages of various affiliated programs. Each of them prompts the user to allow notifications. To be convincing, they inform the victim that it is done for verification purposes (for example, that the user is not a robot), or simply hint on which dialog button to click. Thus, they increase the number of successful subscriptions. See examples of such queries in the images below:
After activating the subscription, websites start sending the user numerous notifications of questionable content. Notifications are displayed in the status bar of the operating system even if the browser is closed and the trojan has already been removed. The contents can be anything, from false notifications about cash bonuses or transfers or new messages on social media to advertisements of horoscopes, casinos, goods and services, even various “news”.
Many of them look like real notifications of actual online services and applications installed on the device. For example, they display the logo of a bank, a dating website, a news agency, or a social network, as well as an eye-catching banner. Owners of Android devices can receive dozens of such spam messages per day.
Although these notifications also indicate the address of the website they come from, an unskilled user may fail to notice it, or not give it much thought. See below the examples of fraudulent notifications:
Having clicked a notification, the user is redirected to a website with questionable content. This may include advertising of casinos, betting shops, various Google Play applications, discounts and coupons, fake online polls and prize drawings, aggregators of partner links, and other online resources that vary depending on the country of residence of the user. See examples of such websites below:
Many of these resources are involved in well-known fraudulent schemes for stealing funds, but attackers can also launch an attack to steal confidential data at any time. For example, by sending an “important” notification via the browser on behalf of a bank or a social network. Potential victims can think the fake notification is real and tap it only to be redirected to a phishing site, where they will be prompted to indicate their name, credentials, email addresses, bank card numbers, and other confidential information.
Doctor Web experts believe that cybercriminals will make more active use of this method to promote questionable services, so mobile users should be careful while visiting websites and not subscribe to notifications if the website is unfamiliar or suspicious. If you are already subscribed to spam notifications, perform the following steps:
- Go to the Google Chrome settings, select “Site Settings” and then “Notifications”;
- On the list of websites with notifications, find the website address, tap it, and select “Clear & reset”.
Dr.Web for Android successfully detects and removes all known modifications of
Read more about Android.FakeApp.174

Your Android needs protection.
Use Dr.Web
- The first Russian anti-virus for Android
- Over 140 million downloads—just from Google Play
- Available free of charge for users of Dr.Web home products
03.06 May 2019 mobile malware review from Doctor Web
June 3, 2019
In the past month, Android devices were once again targeted by malicious programs distributed via Google Play. The list contained the
PRINCIPAL TREND IN MAY
- Distribution of malicious applications on Google Play
Mobile threat of the month
The malware detected in May included spyware trojans from the
After installation and launch, these malicious programs attempted to assign themselves as the default SMS manager, requesting permission from the user. If permission was granted,
Specific features of the malware:
- it was intended for Spanish-speaking users;
- it was based on the open source SMSdroid software with an added trojan function.
According to statistics collected by Dr.Web for Android
Android.Backdoor .682.origin- A trojan that executes cybercriminals’ commands and helps them control infected mobile devices.
Android.RemoteCode .4411Android.RemoteCode .197.origin- Malicious applications designed to download and execute arbitrary code.
Android.HiddenAds .261.originAndroid.HiddenAds .1102- Trojans designed to display intrusive advertisements. They are distributed as popular applications by other malicious programs; which in some cases, covertly install them in the system catalog.
- Adware.Zeus.1
- Adware.Jiubang.2
Adware.AdPush .33.origin- Adware.Toofan.1.origin
- Unwanted program modules that embed themselves into Android applications and display obnoxious ads on mobile devices.
Tool.VirtualApk .1.origin- A riskware platform that allows applications to launch APK files without installing them.
Adware trojan
In early May, Doctor Web analysts discovered the
The malicious program did allow users to listen to music, but then hid its icon after the first launch, preventing users from launching it again.
New malicious and unwanted applications keep appearing on Google Play. Doctor Web recommends Android device owners to install Dr.Web for Android to protect themselves.

Your Android needs protection.
Use Dr.Web
- The first Russian anti-virus for Android
- Over 140 million downloads—just from Google Play
- Available free of charge for users of Dr.Web home products
30.04 April 2019 mobile malware review from Doctor Web
April 30, 2019
In April Doctor Web reported on the
PRINCIPAL TRENDS IN APRIL
- The detection of new malicious applications on Google Play
- Distribution of banking trojans
Mobile threat of the month
In early April Doctor Web reported on a dangerous trojan,
According to statistics collected by Dr.Web for Android
Android.Backdoor .682.origin- A trojan that executes cybercriminals’ commands and helps them control infected mobile devices.
Android.HiddenAds .1102Android.HiddenAds .261.origin- Trojans designed to display intrusive advertisements. They are distributed as popular applications by other malicious programs; which in some cases, covertly install them in the system catalog.
Android.RemoteCode .4411- A malicious application designed to download and execute arbitrary code.
Android.DownLoader .812.origin- A Trojan that downloads other malicious applications.
- Adware.Zeus.1
Adware.AdPush .33.origin- Adware.Toofan.1.origin
- Adware.Jiubang.2
- Unwanted program modules that incorporate themselves into Android applications and display obnoxious ads on mobile devices.
Tool.VirtualApk .1.origin- A riskware platform that allows applications to launch APK files without installing them.
Banking trojans for Android
Over the past month, banking trojans threatened users of Android devices. In late April Doctor Web virus analysts detected new modifications of the
These modifications of
These trojan modifications are able to intercept and send SMS on hackers’ command, show phishing windows, make calls, and listen to the surrounding environment using the device’s built-in microphone. On top of that, they can control smartphones and tablets; for example, they can turn on Wi-Fi, connect to the Internet via a mobile network, block the screen, and so on.
In addition, new downloaders from the
Trojans on Google Play
Aside from downloaders, other trojans, such as
This malicious software opens hidden activity with several WebView elements. A website is loaded on one of them to get commands. Hackers use other WebViews to load different JavaScript and specified websites where they simulate user actions. On these websites, they click links and banner ads to drive up hit and click counters. Hackers can also subscribe mobile device owners to paid services by clicking on special buttons if service providers support the Wap-Click technology of fast subscription. To make themselves more difficult to delete, trojans hide their icons from the operating system’s main screen.
In late April, new entries were added to the Dr.Web virus database to detect the trojans
Other threats
The
To distribute itself among a greater number of users, the trojan sent SMS with a link to the download page of its copy to all contacts of the infected device. The main goal of
Users of Android devices are threatened by different trojan applications that are distributed not only via malicious websites, but also via the official Google Play store. To protect smartphones and tablets, we recommend that you install Dr.Web for Android.

Your Android needs protection.
Use Dr.Web
- The first Russian anti-virus for Android
- Over 140 million downloads—just from Google Play
- Available free of charge for users of Dr.Web home products
12.04 Doctor Web: Trojan Android.InfectionAds exploits critical vulnerabilities of Android to infect and install other software
April 12, 2019
The attackers embed the trojan in initially harmless software and then distribute the modified copies via popular third-party Android stores, such as Nine Store and Apkpure. Our experts detected Android.InfectionAds.1 in games and software such as HD Camera, ORG 2018_19\Tabla Piano Guitar Robab Guitar, Euro Farming Simulator 2018, and Touch on Girls. Some of them were installed by at least several thousand mobile device owners. However, the number of infected applications and affected users may be much greater.
When a user launches a program containing a trojan, it extracts auxiliary modules from file resources to decrypt and launch them as well. One of them is designed to display obnoxious ads, while others infect applications and automatically install software.
Android.InfectionAds.1 overlays advertising banners on the system interface and running applications, making it difficult to work with the devices. In addition, if triggered by the command and control server, the trojan can modify the code of popular advertising platforms, such as Admob, Facebook, and Mopub, which are used in many programs and games. It replaces their advertising identifiers with its own identifier so that all profits from displaying advertisements in infected applications are transferred to the attackers.
Android.InfectionAds.1 exploits the critical vulnerability CVE-2017-13315 in Android, which allows the trojan to launch system activities. As a result, it can automatically install and uninstall programs without a user’s knowledge. The trojan is based on the PoC code (Proof of Concept) by Chinese researchers, written to prove the possibility of exploiting this system breach.
CVE-2017-13315 falls under the EvilParcel class of vulnerabilities. This means that a number of system components contain an error that allows for alteration of data during the exchange between applications and the operating system. The final value of the specifically generated fragment of the transmitted data will differ from the initial one. Thus, programs are able to bypass operating system checks, obtain higher privileges, and perform previously unavailable actions. As of now, we know of 7 vulnerabilities of this type, but the number may increase over time.
Using EvilParcel, Android.InfectionAds.1 installs the hidden APK file that contains all components of the trojan. Similarly, Android.InfectionAds.1 is able to install its own updates, downloaded from the command and control server, as well as other software or malware. For example, during our analysis, the trojan downloaded and installed the malware Android.InfectionAds.4, one of its own modifications.
An example of how the trojan installs applications without the user’s permission:
Along with EvilParcel, the trojan also exploits another Android vulnerability known as Janus (CVE-2017-13156). This system breach can be used to infect previously installed applications by embedding the trojan’s copy within them. Android.InfectionAds.1 connects to the command and control server and obtains a list of programs that it needs to infect. If it fails to connect to the remote server, it will infect applications specified in the initial settings. Depending on the modification, the list may contain different items. See below an example from one of the versions of Android.InfectionAds.1 we have investigated:
- com.whatsapp (WhatsApp Messenger);
- com.lenovo.anyshare.gps (SHAREit - Transfer & Share);
- com.mxtech.videoplayer.ad (MX Player);
- com.jio.jioplay.tv (JioTV - Live TV & Catch-Up);
- com.jio.media.jiobeats (JioSaavn Music & Radio – including JioMusic);
- com.jiochat.jiochatapp (JioChat: HD Video Call);
- com.jio.join (Jio4GVoice);
- com.good.gamecollection;
- com.opera.mini.native (Opera Mini - fast web browser);
- in.startv.hotstar (Hotstar);
- com.meitu.beautyplusme (PlusMe Camera - Previously BeautyPlus Me);
- com.domobile.applock (AppLock);
- com.touchtype.swiftkey (SwiftKey Keyboard);
- com.flipkart.android (Flipkart Online Shopping App);
- cn.xender (Share Music & Transfer Files – Xender);
- com.eterno (Dailyhunt (Newshunt) - Latest News, LIVE Cricket);
- com.truecaller (Truecaller: Caller ID, spam blocking & call record);
- com.ludo.king (Ludo King™).
To infect software, the trojan embeds its components in APK files without changing the digital signature. Then it installs the modified versions of the apps instead of the originals. Since the vulnerability helps the digital signature of the infected files remain the same, the programs are installed as their own updates. At the same time, EvilParcel helps perform the installation independently from the user. As a result, the affected software continues its normal operations, but with a functioning copy of Android.InfectionAds.1 within it. Once apps are infected, the trojan gets access to their data. For example, if WhatsApp is infected, the trojan gets access to all users’ messages, if a browser is infected, saved logins and passwords are available to the trojan.
The only way to remove the trojan and restore the security of the infected programs is to remove the applications containing it and reinstall their normal versions from reliable sources, such as Google Play. The updated version of Dr.Web Security Space for Android is able to detect EvilParcel vulnerabilities. This feature is available in Security Auditor. You can download a new distribution package from the Doctor Web official website. Soon it will be available on Google Play as well. All Dr. Web products for Android successfully detect and remove known modifications of Android.InfectionAds.1, so the trojan does not pose any threat to our users.
[Read more about Android.InfectionAds.1]
#Android, #trojan, #malware
03.04 March 2019 mobile malware review from Doctor Web
April 3, 2019
In March, Doctor Web reported a vulnerability in the mobile app, UC Browser, which can download new modules from third-party server. Cybercriminals could use this feature to infect Android smartphones and tablets. Additionally, malware analysts shared information about the Flexnet trojan that stole money from bank cards and mobile credit accounts. During March, other malicious applications were detected on Google Play.
PRINCIPAL TRENDS IN MARCH
- Detection of a vulnerability in UC Browser
- Distribution of banking trojans
- The detection of new malicious programs on Google Play
Mobile threat of the month
At the end of March, Doctor Web reported a vulnerability in the UC Browser app for Android, discovered by our malware analysts. This program downloaded additional plugins, bypassing Google Play servers and thus violating Google’s policies. Cybercriminals could interfere with the download and make the browser download and launch malicious files instead. Over 500,000,000 mobile users have been exposed to threats. See the details of this vulnerability in our virus library.
According to statistics collected by Dr.Web for Android
Android.Backdoor .682.originAndroid.Backdoor .2080- Trojans that execute commands from attackers and allow them to control infected mobile devices.
Android.RemoteCode .197.origin- Malicious application designed to download and execute arbitrary code.
Android.HiddenAds .659Android.HiddenAds .261.origin- Trojans designed to display intrusive advertisements. They are distributed as popular applications by other malicious programs, which in some cases covertly install them in the system catalog.
- Adware.Zeus.1
- Adware.Jiubang.2
- Adware.Toofan.1.origin
- Adware.Gexin.3.origin
- Unwanted program modules that incorporate themselves into Android applications and display obnoxious ads on mobile devices.
Tool.VirtualApk .1.origin- A potentially dangerous software platform that allows applications to run APK files without installing them.
Banking trojans for Android
Cybercriminals continue to distribute banking trojans based on the source code of the
Threats on Google Play
In March, we found more malicious programs on Google Play, including the trojans
In addition, our malware analysts identified more trojans of the
After installation and launch, they hide their icons and begin constantly overlaying ads over program windows and the operating system interface, making it difficult to work with the Android devices.
Users of Android devices are threatened by trojans not only distributed via malicious websites, but also via the official Google Play store. To protect smartphones and tablets, we recommend that you install Dr.Web for Android.
Your Android needs protection!
Use Dr.Web
- First Russian anti-virus for Android
- Over 140 million downloads—just from Google Play!
- Available free of charge for users who purchase Dr.Web home products
26.03 Hundreds of millions of UC Browser users for Android are threatened
March 26, 2019
As of now, UC Browser has been downloaded by over 500,000,000 Google Play users. Anyone who has installed this software may be in danger. Doctor Web has detected its hidden ability to download auxiliary components from the Internet. The browser receives commands from the command and control server and downloads new libraries and modules, which add new features and can be used to update the software.
For example, during our analysis, UC Browser downloaded an executable Linux library from a remote server. The library was not malicious; it is designed to work with MS Office documents and PDF files. Initially, this library was not in the browser. After downloading, the program saved the library to its directory and launched it for execution. Thus, the application is actually able to receive and execute code, bypassing the Google Play servers. This violates Google’s rules for software distributed in its app store. The current policy states that applications downloaded from Google Play cannot change their own code or download any software components from third-party sources. These rules were applied to prevent the distribution of modular trojans that download and launch malicious plug-ins. Such trojans include
A potentially dangerous updating feature has been present in the UC Browser since at least 2016. Although the application has not been seen distributing trojans or unwanted software, its ability to load and launch new and unverified modules poses a potential threat. It’s impossible to be sure that cybercriminals will never get ahold of the browser developer’s servers or use the update feature to infect hundreds of millions of Android devices.
The vulnerable feature of UC Browser can be used to perform man-in-the-middle attacks (MITM). To download new plug-ins, the browser sends a request to the command and control server and receives a link to file in response. Since the program communicates with the server over an unsecured channel (the HTTP protocol instead of the encrypted HTTPS), cybercriminals can hook the requests from the application. They can replace the commands with ones containing different addresses. This makes the browser download new modules from malicious server instead of its own command and control server. Since UC Browser works with unsigned plug-ins, it will launch malicious modules without any verification.
See below an example of such an attack, modeled by our virus analysts. The video shows a potential victim who downloads a PDF document via UC Browser and tries to view it. To open the file, the browser tries to download the corresponding plug-in from the command and control server. However, due to the MITM substitution, the browser downloads and launches a different library. This library then creates a text message that says, “PWNED!”.
Thus, MITM attacks can help cybercriminals use UC Browser to spread malicious plug-ins that perform a wide variety of actions. For example, they can display phishing messages to steal usernames, passwords, bank card details, and other personal data. Additionally, trojan modules will be able to access protected browser files and steal passwords stored in the program directory.
Read more about this vulnerability here.
The browser’s “younger brother”, the UC Browser Mini application, can also download untested components, bypassing Google Play servers. It has been equipped with this feature since at least December 2017. So far, over 100,000,000 Google Play users have downloaded the program, putting them all at risk. However, the above MITM attack will not work with UC Browser Mini, unlike UC Browser.
Upon detecting a dangerous feature in UC Browser and UC Browser Mini, Doctor Web specialists contacted the developer of both browsers, but they refused to comment on the matter. So our malware analysts then reported the case to Google, but as of the publication date of this article, both browsers are still available and can download new components, bypassing Google Play servers. Owners of Android devices should independently decide whether to continue using these programs or remove them and wait until they are updated to fix potential vulnerabilities.
Meanwhile, Doctor Web continues monitoring the situation.
Your Android needs protection!
Use Dr.Web
- First Russian anti-virus for Android
- Over 140 million downloads—just from Google Play!
- Available free of charge for users who purchase Dr.Web home products
21.03 Doctor Web: Android banker Flexnet uses computer games to steal money from users
March 21, 2019
Flexnet is based on the GM Bot Trojan, researched by Doctor Web malware analysts back in February 2015. The malicious app’s source code was published in 2016. Soon, the first versions of Flexnet were created thanks to everything achieved by GM Bot’s authors. Attacks against Android mobile devices using this Trojan continue happening to this day.
The cybercriminals distribute Flexnet Trojans via spam texting. In the messages, the potential victims are encouraged to follow the link and download some program or game. The Trojan disguises itself as applications such as Drug Vokrug (a dating and chatting app), GTA V, tools for Instagram and VKontakte account promotion, as well as other software.
Fig. 1. Example of software icons used by the Trojan.
When launched, the Trojan requests admin privileges, displaying a standard dialog box. If the victim grants the permissions, the Trojan falsely reports an error and removes its icon from the home screen to hide from the user so as not to be removed.
Fig. 2-3. An attempt to request admin privileges and a false error message.
Compared with modern Android bankers, Flexnet’s capabilities are quite limited. The Trojan is capable of hooking and sending text messages, as well as performing USSD requests. However, these functions are enough to steal money using various fraudulent means.
One of them is topping up the in-game accounts of popular computer games via SMS. First, the Trojan checks a user's bank card balance by sending an SMS request to the mobile banking service system. Then it hooks the response message with the account balance and transmits this information to cybercriminals. Next, the attackers request to top up the gaming account, indicating the victim’s phone number and the amount to transfer. The user then receives a text message with a verification code. The Trojan intercepts this message, transfers its contents to the cybercriminals, and finally they give the Trojan a command to send the verification code to confirm the transaction.
See below the example of money theft using this method:
Fig. 4. Top-up of Wargaming accounts. The Trojan hooks the messages from a bank’s billing system and, at the command of cybercriminals, sends a reply with a payment confirmation code to transfer RUB 2,475.
Other fraudulent schemes are implemented in a similar way. For example, the cybercriminals can pay for hosting using money from their victims’ mobile credit. To do this, the Trojan sends text messages with the necessary parameters to certain phone numbers. See below the example of such payment.
Fig. 5. Trojan texting the transfer amount (RUB 299 and RUB 1,000) and account names on the jino.ru hosting service to top up the balance of cybercriminals.
The attackers can steal money even if the victim does not have enough on the balance. They use the credit options provided by mobile carriers. As in other cases, the cybercriminals instruct the Trojan to send a text with the necessary parameters. Owners of the infected devices are oblivious to the money loss because the banker hides all suspicious messages.
Fig. 6. The fraudsters attempt to pay for the My.com service, but the amount on the victim’s mobile credit is not enough to do it. They command the Trojan to use the credit option and successfully perform the transfer. Thus, the device owner is left with a phone debt.
Additionally, the Trojan can transfer money from victims’ bank cards to cybercriminals’ accounts. However, financial institutions use specific algorithms to track suspicious transactions, so the probability of them being blocked is very high, while the above schemes allow the fraudsters to steal relatively small amounts for a long time and go unnoticed.
Another feature of Flexnet involves stealing confidential data. The cybercriminals can get ahold of accounts on social media, online stores, the websites of mobile carriers, and other online services. Knowing the victim’s mobile phone number, the cybercriminals try to log into their account. The service sends a text with a one-time verification code, which the Trojan hooks and sends to the attackers.
Fig. 7. Texts with one-time access codes of various services, hooked by the Trojan.
If the number used on the infected device is not registered with the target services, the cybercriminals can use it to register a new account. In the future, those compromised and newly created accounts can enter the black market and then be used to send spam and arrange phishing attacks.
With the assistance of the REG.ru registrar, several Flexnet command and control servers were blocked, and the cybercriminals no longer control some of the infected devices.
Doctor Web reminds owners of Android smartphones and tablets that software and games should only be installed from reliable sources such as Google Play. You are strongly advised to pay attention to the reviews of other users and use software from trusted developers.
Dr. Web for Android detects all known modifications of the Flexnet Trojan as parts of the
#Android, #banking_Trojan, #two_factor_authentication
Your Android needs protection
Use Dr.Web
- The first Russian Anti-virus for Android
- More than 140 million downloads on Google Play alone
- Free for users of Dr.Web home products
01.03 February 2019 mobile malware review from Doctor Web
March 1, 2019
The last winter month of 2019 was not a quiet time for users of Android devices. In mid-February, Doctor Web specialists found about 40 Trojans of the
PRINCIPAL TRENDS IN FEBRUARY
- The detection of new malicious programs on Google Play
Mobile threat of the month
Last month, Doctor Web’s malware analysts revealed 39 Trojans of the
The Trojans were constantly displaying ads, overlaying the interface of other programs and even the operating system. As a result, infected devices became very inconvenient to work with.
For more information about these malicious applications read the news article on our website.
According to statistics collected by Dr.Web for Android
Android.Backdoor .682.originAndroid.Backdoor .2080- Trojans that execute the commands of attackers and allow them to control infected mobile devices.
Android.RemoteCode .197.origin- A malicious application designed to download and execute arbitrary code.
Android.HiddenAds .261.originAndroid.HiddenAds .659- Trojans designed to display intrusive advertisements. They are distributed as popular applications by other malicious programs, which in some cases, covertly install them in the system catalog.
- Adware.Zeus.1
Adware.Patacore .1.originAdware.Patacore .168- Adware.Jiubang.2
- Android.Toofan.1.origin
- Unwanted program modules that incorporate themselves into Android applications and display obnoxious ads on mobile devices.
Threats on Google Play
Apart from the
Android users were also targeted by the Trojan
Another Trojan, dubbed
In addition, the Dr.Web virus database was updated with an entry for applications with the built-in unwanted
Several games turned out to contain other unwanted advertising modules, dubbed
We continue detecting more and more malicious and unwanted applications on Google Play, so owners of mobile devices running Android are advised to only install programs from well-known and trusted developers. In all cases, pay attention to the reviews of other users. To protect smartphones and tablets, we recommend you install Dr.Web for Android.
Your Android needs protection!
Use Dr.Web
- First Russian anti-virus for Android
- Over 140 million downloads—just from Google Play!
- Available free of charge for users who purchase Dr.Web home products
19.02 Doctor Web warns: Cybercriminals spread Android Trojans via Instagram
February 19, 2019
During February, malware analysts revealed 39 new modifications of the
The main function of
Since Trojans display banners almost continuously, cybercriminals quickly cover their expenses for promoting their software via popular online services.
To stay on smartphones and tablets for as long as possible, the
Almost all malware of the
Android users installed many of these malicious applications after viewing ads on Instagram and YouTube, where the cybercriminals promised functional and powerful photo and video processing tools. At first glance, the Trojans match the description and do not arouse suspicion among potential victims. However, apart from one or several basic functions, they contain nothing of what was declared. Here is what users complain about in the reviews:
An active promotional campaign set up by the cybercriminals attracts a large number of mobile device users and increases the number of downloads. Some of these Trojans even get featured in Google Play sections promoting new products and applications gaining popularity, which also increases the number of users that download the malware.
Information about all Trojans that our experts have found as of the publication date of this material is in the summary spreadsheet. However, since cybercriminals constantly create new
Application package name | Number of downloads |
---|---|
com.funshionstyle.ledcaller | 1 000 000+ |
com.uniokan.pipphotoframer | 50 000+ |
com.flextool.scanner.play | 100 000+ |
com.flextool.superfastscanner | 100 000+ |
com.piano.tiles.songs.black.white.game | 10 000+ |
com.pop.stars.pop.cube | 10 000+ |
com.mp3audio.musicplayer.fly.fun | 100 000+ |
com.picsart.photo.editor | 50 000+ |
com.loopshapes.infinite.puzzle | 100+ |
com.cdtushudw.brand.logo.expert | 10 000+ |
com.aardingw.chess.queen | 50 000+ |
com.particle.sand.box | 100+ |
checkers.online.classic.board.tactics | 500 000+ |
com.wind.pics.blur.editor | 1 000 000+ |
com.draughts.checkersnew | 50 000+ |
com.watermark.zooms.camera | 10 000+ |
com.photo.cut.out.studio | 1 000 000+ |
com.camera.easy.photo.beauty | 100 000+ |
com.camera.easy.photo.beauty.Pro | 10 000+ |
com.soon.ygy.photograph.camera | 500 000+ |
com.music.play.hi.cloud | 500 000+ |
com.scanfactory.smartscan | 100 000+ |
com.personalife.hdwallpaper | 10 000+ |
com.smartmob.minicleaner | 100 000+ |
com.beautylife.livepipcamera | 100 000+ |
com.callcolorshow.callflash | 10 000+ |
com.mobwontools.pixel.blur.cam | 1 000 000+ |
com.video.nin.cut.face | 100 000+ |
com.magicvcam.meet.photograph | 100 000+ |
com.best.blur.editor.photo | 100,000+ |
com.autocleaner.supercleaner | 10 000+ |
com.wallpapers.project.hd.hd3d.best.live | 10 000+ |
com.camera.selfie.beauty.candy.cam | 5+ |
com.wallpaper.hd3d.hd.lock.screen.best3d.best | 50 000+ |
com.selfie.beauty.candy.camera.pro | 1 000 000+ |
com.cam.air.crush | 1 000 000+ |
com.fancy.photo.blur.editor | 1 000 000+ |
com.photoeditor.background.change | 100 000+ |
com.eraser.ygycamera.background | 100 000+ |
Users are advised to perform a full scan of mobile devices with Dr.Web for Android and remove the Trojans that are detected.
Users of smartphones and tablets should be wary of ads on the Internet and avoid downloading all advertised software, even if it is distributed via Google Play. Only install applications from trusted developers and pay attention to the reviews from other users.
#Android, #fraud, #Google_Play, #Trojan
01.02 Doctor Web’s overview of malware detected on mobile devices in January 2019
February 1, 2019
In the past month, Android devices were targeted with a lot of malware. In early January, Doctor Web’s virus analysts investigated the Trojan
PRINCIPAL TRENDS IN JANUARY
- The detection of malicious programs on Google Play
- The detection of an Android spyware Trojan
Mobile threat of the month
In early January, the Dr.Web virus database was updated to detect the spyware
Upon command from its command and control server,
According to statistics collected by Dr.Web for Android
-
Android.Backdoor .682.origin - A Trojan that executes cybercriminals’ commands and helps them control infected mobile devices.
-
Android.RemoteCode .197.origin - A malicious application designed to download and execute arbitrary code.
Android.HiddenAds .261.originAndroid.HiddenAds .659- Trojans designed to display intrusive advertisements. They are distributed as popular applications by other malicious programs; which in some cases, covertly install themselves in the system catalog.
Android.Mobifun .4- A Trojan that downloads various applications.
- Adware.Zeus.1
Adware.AdPush .29.originAdware.Patacore .1.originAdware.Patacore .168- Adware.Jiubang.2
- Unwanted program modules that incorporate themselves into Android applications and display obnoxious ads on mobile devices.
Threats on Google Play
Apart from
In addition, our malware analysts investigated a variety of downloaders. Cybercriminals presented them as useful programs, such as currency converters, official banking applications, and other software. These Trojans were dubbed
One of those banking Trojans was
In late January, Doctor Web’s experts discovered new clicker Trojans from the family
The Doctor Web specialists continue monitoring the situation with mobile viruses and promptly update the Dr.Web virus database to detect and remove malicious and unwanted programs. Thus, smartphones and tablets with Dr.Web for Android are safe and secure.
Your Android needs protection
Use Dr.Web
- The first Russian Anti-virus for Android
- More than 140 million downloads on Google Play alone
- Free for users of Dr.Web home products
2018
28.12 Doctor Web: Mobile malware review for 2018
December 28, 2018
In the past year, Android mobile device owners were again targeted by many malicious and unwanted programs, many of which were distributed via Google Play. At the same time, the tendency noted in 2017 to use various means for disguising and hiding Trojans to make them harder to detect has noticeably increased.
One of the main threats to mobile device users over the past 12 months were Android bankers, attacking financial institution customers around the world. Malware that could download and run arbitrary code from the Internet posed a serious threat as well.
Virus writers were actively distributing Trojans to implement fraudulent schemes, as well as using other malicious apps to obtain illegal income. In addition, cybercriminals tried to launch mobile cryptocurrency mining and even used Trojan clippers to change the numbers of electronic wallets in the clipboard of Android devices.
The mobile firmware infection issue at the production stage remains relevant. In spring, Doctor Web virus analysts uncovered a Trojan embedded in the image of the Android operating system. More than 40 mobile device models were compromised.
Users were also threatened with malicious spyware throughout the year.
Principal trends of the year
- New detections of malicious and unwanted programs on Google Play
- Attempts of virus writers to hinder the detection of malware
- Banking Trojans attacking customers of financial institutions worldwide
- Trojans using Android Accessibility Service to automate malicious activities
- Spread of Trojan clippers capable of changing e-wallet numbers in clipboard
Most remarkable events
At the beginning of the year, information security specialists detected the spread of the
In March, Doctor Web reported a new case of detecting the
Attackers are increasingly using a variety of methods to prevent the detection of malicious and unwanted programs. In 2018, this trend continued. A popular way to reduce malware visibility is to use loaders. They can help keep Trojans and other dangerous software out of antivirus software’s reach for a longer time and cause less suspicion among potential victims. Using such loaders, cybercriminals can distribute various malware such as Trojan spyware.
In April, the
In August, we detected the
However, Trojan downloaders are increasingly used to distribute Android bankers. In July,
Later, several similar malicious programs were detected on Google Play. One of them was given the name
Loaders are used to infect mobile devices with other malware. In October, virus analysts detected the Trojan
Multi-component malicious applications are becoming increasingly common. Each of the modules performs certain functions, which allows attackers, if necessary, to expand the Trojans’ capabilities. This operation principle helps hinder threat detection. Virus writers can quickly update these plugins and add new ones, leaving the Trojan body with a minimum set of functions and making it less noticeable.
Doctor Web experts discovered this combination in February and dubbed it
After decryption and launch, the module downloaded another image with another hidden plugin, which loaded and launched the
Examples of images with encrypted modules of
For more information regarding this Trojan, refer to the news article on our website.
In August, Doctor Web analysts investigated the Trojan clipper
When copying the e-wallet number to clipboard,
Mobile malware landscape
According to Dr.Web’s detection statistics for Android products in 2018, Android devices were most often targeted by adware Trojans, malware that downloaded malicious and unwanted software, as well as Trojans that executed cybercriminal commands.
Android.Backdoor .682.origin- Trojan that executes cybercriminal commands to launch malicious activities.
Android.Mobifun .4- Representatives of a Trojan family designed to display unwanted ads.
Android.HiddenAds - Representatives of a Trojan family designed to display unwanted ads.
Android.DownLoader .573.origin- Malware that downloads applications indicated by virus writers.
Android.Packed .15893- Detects Trojans protected by a program packer.
Android.Xiny .197- Trojan primarily intended for downloading and removing applications.
- Android.Altamob.1.origin
- Malware that downloads applications indicated by virus writers.
Among the unwanted and potentially dangerous applications found on Android devices during the year, ad-displaying modules were the most common. Applications for downloading and installing various software were also detected on smartphones and tablets.
- Adware.Zeus.1
- Adware.Altamob.1.origin
- Adware.Jiubang
- Adware.Adtiming.1.origin
Adware.Adpush .601- Adware.SalmonAds.3.origin
- Adware.Gexin.2.origin
They were unwanted modules that software developers and virus writers had injected into applications to display aggressive advertising.
Tool.SilentInstaller .1.originTool.SilentInstaller .6.origin
Potentially dangerous programs designed to download and install other applications.
Banking Trojans
Banking Trojans are still a serious threat to mobile device owners. These malicious applications steal credentials to access the accounts of customers of financial institutions, bank card details, and other confidential data that can be used to steal money. Over the past 12 months, Dr.Web for Android detected over 110,000 of these Trojans on smartphones and tablets. The dynamics for Android banker detection is shown in the following graph:
When authors of the banking Trojan
In March, Doctor Web experts detected the
When launched,
In autumn, virus analysts investigated the banker
Later, our experts uncovered
Fraud
Cybercriminals are increasingly using malware for mobile Android devices for fraudulent campaigns. In 2018, we detected many of these Trojans. One of them is
Over the year, our specialists found other Trojans on Google Play that could load any webpage on the command of the command and control server. The list included
Cybercriminals also actively distributed the
Over the year, malware analysts discovered dozens of fraudulent applications
Prospects and trends
Next year mobile device users will again face attacks from banking Trojans and virus writers will continue improving their functionality. It is likely that more Android bankers will turn into multi-function malware capable of performing a wide range of tasks.
The number of fraudulent applications and advertising Trojans will increase also. Virus writers will hardly abandon attempts to make money on cryptocurrency using the computing power of Android devices. We also cannot eliminate the possibility of further cases of firmware infection in the future.
Cybercriminals will improve methods for circumventing antiviruses, as well as new restrictions and protective features built in the Android operating system. Rootkits and Trojans that could bypass these barriers are not out of the question. Malicious programs with new operating principles and new ways to obtain confidential data could emerge on the market. For example, they might use mobile device and eye-tracking techniques to obtain information about text being typed. Furthermore, new malware might use machine learning algorithms and other means of artificial intelligence for the benefit of attackers.
Your Android needs protection
Use Dr.Web
- The first Russian Anti-virus for Android
- More than 140 million downloads on Google Play alone
- Free for users of Dr.Web home products
28.12 Doctor Web’s overview of malware detected on mobile devices in December 2018
December 28, 2018
In early December, Brazilian Android device users were threatened by a banking Trojan that spread via Google Play. Some other malicious applications were detected in the official Android app store as well. At the end of December, Doctor Web experts discovered a new version of commercial spyware that collects masses of confidential information.
PRINCIPAL TRENDS IN DECEMBER
- Distribution of new dangerous banking Trojan among Brazilian users
- Detection of a new version of potentially dangerous spyware for surveilling mobile device users
- Detection of malicious and unwanted applications on Google Play
Mobile threat of the month
In early December, virus analysts investigated the banking Trojan,
Read more about this Trojan in the news article, published by Doctor Web.
According to statistics collected by Dr.Web for Android
Android.Backdoor .682.origin- A Trojan that executes cybercriminals’ commands and helps them control infected mobile devices.
Android.HiddenAds .261.originAndroid.HiddenAds .659- Trojans designed to display intrusive advertisements. They are distributed under the guise of popular applications by other malicious programs, which in some cases covertly install themselves in the system catalog.
Android.DownLoader .573.origin- A Trojan that downloads other malware applications.
Android.Mobifun .4- A Trojan that downloads various applications.
- Adware.Zeus.1
Adware.Patacore .1.originAdware.Adpush .2514- Adware.AdPush.29.origin
- Adware.Jiubang.2
- Unwanted program modules that incorporate themselves into Android applications and display obnoxious ads on mobile devices.
Threats on Google Play
A lot of malicious and unwanted programs were detected on Google Play over the month. The list includes the adware Trojans
We have also detected programs with the unwanted modules
Cybercriminals kept spreading fraudulent applications. The Dr.Web virus database has been updated to detect the Trojans
Virus analysts have also discovered the Trojan
Cyberespionage
Among the potentially dangerous programs detected in December was a new version of the commercial spyware
Android users are targeted by various malicious and unwanted programs, distributed both online and via Google Play. Apart from that, attackers can install malware themselves if they get physical access to mobile devices. To protect smartphones and tablets, we recommend users install Dr.Web for Android.
Your Android needs protection
Use Dr.Web
- The first Russian Anti-virus for Android
- More than 140 million downloads on Google Play alone
- Free for users of Dr.Web home products
06.12 Brazilian users’ mobile devices attacked by a banking Trojan
December 6, 2018
Cybercriminals were distributing
When launched,
When the user permits the Trojan to access accessibility features, it closes the window, starts the malicious service, and uses it to continue operating in the background.
Moreover, the malware uses the special features for self-defense, tracking a number of antiviruses and utilities. When they launch, it tries to close their windows by pressing the “back" button 4 times.
When the Banco Itaú is launched, the Trojan uses the accessibility feature to read the contents of its window and transfer information on the balance of the user's bank account to the attackers. It then navigates to account management in the application, where it copies and sends the iToken key, a security code used to verify electronic transactions, to the virus writers.
Upon startup of Bradesco, the Trojan reads the victim’s account information and tries to automatically login to it by entering the PIN code received from the command and control server.
Upon receiving a command to launch an SMS application, the Trojan opens it, reads and saves the text of the available messages and sends them to the server. It also recognizes the messages from CaixaBank S.A. and transmits them in a separate request.
Cybercriminals also use
See an example of such phishing pages below:
Confidential information, entered by the victim, is transmitted to the attackers, and then the Trojan closes the fraudulent window and re-launches the compromised application in order not to raise suspicion from the user for collapsing and closing the app.
Doctor Web recommends you install Android software with extra care, even if you obtain them from Google Play. Attackers can fake well-known software, as well as create seemingly harmless applications. To reduce the risk of installing a Trojan, you should pay attention to the name of the developer, the date when the app appeared on Google Play, the number of downloads, and reviews from other users. In addition, please use an antivirus.
All known modifications to the
#Android, #Google_Play, #banking_Trojan, #phishing
30.11 Doctor Web’s overview of malware detected on mobile devices in November 2018
November 30, 2018
In the last month of autumn 2018, Doctor Web’s malware analysts detected a new Android-targeting banking Trojan. It was being spread via Google Play and was attacking the customers of European financial institutions. Other Trojans were detected on Google Play in November, as were unwanted software programs.
PRINCIPAL TRENDS IN NOVEMBER
- The distribution of malicious and unwanted programs on Google Play
Mobile threat of the month
In mid-November, Doctor Web’s experts discovered the banking Trojan
Features of
- Distributed via Google Play;
- imitated the banking applications of Spanish, French, and German financial organizations;
- hid its icon from the app list on the home screen;
- contained an embedded game that would launch after users closed its window.
For more information regarding this Trojan, refer to this news article on our website.
According to statistics collected by Dr.Web for Android
Android.Backdoor .682.origin- A Trojan that executes cybercriminals’ commands and helps them control infected mobile devices.
Android.Mobifun .4- A Trojan that downloads various applications.
Android.HiddenAds .288.origin- A Trojan designed to display advertisements. It is distributed under the guise of popular apps by other malicious programs that in some instances covertly install it in the system directory.
Android.DownLoader .573.origin- A Trojan that downloads other malware applications.
Android.RemoteCode .183.origin- A malicious program designed to download and execute arbitrary code.
- Adware.Zeus.1
Adware.Adpush .2514- Adware.Patacore.1.origin
- Adware.Avazu.5.origin
- Adware.Gexin.2.origin
- Unwanted program modules incorporated into Android applications and designed to display obnoxious ads on mobile devices.
Threats on Google Play
In early November, on Google Play, Doctor Web’s virus analysts detected applications containing the unwanted adware modules
Later in the month, Doctor Web’s experts identified on Google Play other
In addition, attackers distributed the Trojan downloader
Google Play remains the most secure Android app resource. However, cybercriminals are still managing to use it to distribute malicious software. To protect their Android mobile devices, users are recommend to install Dr.Web for Android antivirus products.
Your Android needs protection
Use Dr.Web
- The first Russian Anti-virus for Android
- More than 135 million downloads on Google Play alone
- Free for users of Dr.Web home products
16.11 Banking Trojan attacks European users of Android devices
November 16, 2018
The Trojan, dubbed
Once launched by a user, the Trojan requests permission to manage and make phone calls and send and receive SMS. Android devices below version 6.0 automatically grant these permissions during the Trojan’s installation. See the below example of a request:
The phone number entered by the victim is transferred to the cloud database. The user is then shown a second dialog telling them to wait for “registration” confirmation. The dialog has a “Submit” button. When pressed, it launches a game built into the
If the Trojan was successful when it uploaded the information about the mobile device to the cloud, it hides its icon from the home screen and then automatically runs in the background whenever the infected smartphone or tablet is on.
All known modifications of
Your Android needs protection
Use Dr.Web
- The first Russian Anti-virus for Android
- More than 135 million downloads on Google Play alone
- Free for users of Dr.Web home products
31.10 Doctor Web’s overview of malware detected on mobile devices in October 2018
October 31, 2018
In October, information security specialists discovered an Android Trojan capable of executing C# scripts sent from a remote server, as well as downloading and launching malicious modules. More malicious applications were also detected on Google Play this month.
PRINCIPAL TRENDS IN OCTOBER
- The detection of malicious programs on Google Play
- Detection of an Android Trojan that could receive and compile a C# code from attackers to execute it on mobile devices
Mobile threat of the month
Doctor Web specialists have detected applications with the built-in downloader Trojan
The Trojans' unique features are as follows:
- they request administrative privileges to hinder their removal from the system;
- they hide the app icon from the list of programs on the main screen of the operating system;
- they download other Trojans disguised as system software and prompt the user to install them.
According to statistics collected by Dr.Web for Android
Android.Backdoor .682.originAndroid.Backdoor .1521- The Trojans that execute cybercriminals’ commands and help them to control infected mobile devices.
Android.HiddenAds .261.originAndroid.HiddenAds .288.origin- The Trojans are designed to display intrusive advertisements. They are distributed under the guise of popular applications by other malicious programs, which in some cases quietly install themselves in the system catalog.
Android.DownLoader .573.origin- A Trojan that downloads other malware applications.
- Adware.Zeus.1
- Adware.Gexin.2.origin
Adware.Adpush .2514- Adware.SalmonAds.3.origin
- Adware.Aesads.1.origin
- Unwanted program modules incorporated into Android applications and designed to display obnoxious ads on mobile devices.
Trojans on Google Play
At the beginning of the month, Doctor Web experts detected the Trojan
Later, security researchers detected the Trojan
In late October, Doctor Web analysts investigated the malware
Aside from that, the Dr.Web virus database was updated with entries to detect new malware
Other threats
Among the mobile malware detected in October was the Android banker
Cybercriminals distribute malicious programs to Android mobile devices via Google Play and fraudulent or hacked websites. To protect smartphones and tablets, it is recommended that users install Dr.Web anti-virus products for Android.
Your Android needs protection
Use Dr.Web
- The first Russian Anti-virus for Android
- More than 135 million downloads on Google Play alone
- Free for users of Dr.Web home products