{"id":84340,"date":"2017-06-01T12:18:43","date_gmt":"2017-06-01T06:48:43","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=84340"},"modified":"2017-06-02T13:26:29","modified_gmt":"2017-06-02T07:56:29","slug":"google-play-apps-hit-judy-malware","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/google-play-apps-hit-judy-malware\/","title":{"rendered":"Google Play apps hit by Judy Malware"},"content":{"rendered":"<p>It&#8217;s turning out to be a bad month for the digital world. While the world is recovering from the <a href=\"https:\/\/bit.ly\/2rQgldR\" target=\"_blank\">WannaCry Ransomware<\/a> outbreak, we now have a new malware on the loose and it is targeting Android devices. The malware is called Judy and it has infected around 41 apps in the Google Play store. More about this follows.<\/p>\n<p><strong>What is Judy and how does it work?<br \/>\n<\/strong>Judy is an auto-clicking adware. After it infects a device, it opens up web pages where it generates fraudulent clicks on advertisements to make money for the malware\u2019s creator. These clicks are generated in extensive amounts &#8211; more the clicks, more the money.<\/p>\n<p><strong>Google Play apps affected by Judy<br \/>\n<\/strong>About 41 apps developed by a Korean company called Kiniwini, seemed to have been spreading the Judy malware. The company is registered on Google Play as Enistudio corp.<\/p>\n<p><strong>How Quick Heal Mobile Security helps?<br \/>\n<\/strong>Quick Heal detects and blocks the Judy malware as <strong>Android.Ewind.AU<\/strong><\/p>\n<p><strong>How to stay safe from threats such as Judy<\/strong><\/p>\n<p>1. Google has removed the reported apps from the Play store. So, we can hope that the threat is gone. But just to be on a safer side, avoid downloading any apps developed by Enistudio for now.<\/p>\n<p>2. Install a reliable mobile security app like <a href=\"https:\/\/bit.ly\/18SRsx6\" target=\"_blank\">Quick Heal<\/a> that scans apps in real-time to detect and block such threats.<\/p>\n<p>3. It is important to check for user ratings and comments before installing any app. While you may get to see positive reviews, you might come across a few that may help you decide whether the app is worth installing or not.<\/p>\n<p>4. As a rule of thumb, avoid installing apps from unofficial, third-party app stores.<\/p>\n<p><strong>Technical Analysis of Judy Malware<\/strong><\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-84352 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/06\/Judy-1.1.jpg\" alt=\"judy-1-1\" width=\"632\" height=\"1253\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-1.1.jpg 1349w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-1.1-151x300.jpg 151w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-1.1-768x1523.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-1.1-197x390.jpg 197w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-1.1-789x1565.jpg 789w\" sizes=\"(max-width: 632px) 100vw, 632px\" \/>Fig 1<\/p>\n<p>The Judy malware relies on the communication with its Command and Control server (C&amp;C) for its operation. Once installed on the device, the malware connects with the server (fig 2). Once the connection is established, the server replies with the actual malicious payload. Fig 3 shows the code that the server sends in its reply to check if the app is installing on a device or an emulator. If it is on an emulator, the app does not get installed.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-84342 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/06\/Judy-2.png\" alt=\"judy-2\" width=\"795\" height=\"50\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-2.png 795w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-2-300x19.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-2-768x48.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-2-650x41.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-2-789x50.png 789w\" sizes=\"(max-width: 795px) 100vw, 795px\" \/>Fig 2. Connecting with the C&amp;C server<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-84349 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/06\/Judy-3-1.png\" alt=\"judy-3\" width=\"738\" height=\"76\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-3-1.png 872w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-3-1-300x31.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-3-1-768x79.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-3-1-650x67.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-3-1-789x81.png 789w\" sizes=\"(max-width: 738px) 100vw, 738px\" \/>Fig 3. Connecting for JSON response to check if the app is running\u00a0on\u00a0an emulator<\/p>\n<p><strong>Operation<\/strong><\/p>\n<p>1. Once installed, the infected app looks like any other ordinary app.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-84348 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/06\/Judy-4.png\" alt=\"judy-4\" width=\"524\" height=\"295\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-4.png 1280w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-4-300x169.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-4-768x432.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-4-650x366.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-4-789x444.png 789w\" sizes=\"(max-width: 524px) 100vw, 524px\" \/><br \/>\nFig 4<\/p>\n<p>2. At the bottom of the app, there is an option called <strong>shop<\/strong> to purchase different items.<\/p>\n<p>3. If the user clicks on the <strong>shop<\/strong> button, it shows multiple options to earn stars by purchasing or downloading apps, some of which are genuine (fig 6 &amp; 7).<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-84347 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/06\/Judy-5.png\" alt=\"judy-5\" width=\"565\" height=\"318\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-5.png 1280w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-5-300x169.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-5-768x432.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-5-650x366.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-5-789x444.png 789w\" sizes=\"(max-width: 565px) 100vw, 565px\" \/><br \/>\nFig 5. Options for downloading free stars<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-84346 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/06\/Judy-6.png\" alt=\"judy-6\" width=\"558\" height=\"314\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-6.png 1280w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-6-300x169.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-6-768x432.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-6-650x366.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-6-789x444.png 789w\" sizes=\"(max-width: 558px) 100vw, 558px\" \/><br \/>\nFig 6<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-84345 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/06\/Judy-7.png\" alt=\"judy-7\" width=\"581\" height=\"1033\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-7.png 1080w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-7-169x300.png 169w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-7-768x1365.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-7-219x390.png 219w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-7-789x1403.png 789w\" sizes=\"(max-width: 581px) 100vw, 581px\" \/><br \/>\nFig 7<\/p>\n<p>4. Selecting a <strong>Free Stars<\/strong> option shows a page which asks the user to download an app which will fetch them the free stars.<\/p>\n<p>5. If the user downloads one of these apps, the screen displays that they will receive free stars. But, in the background, the app opens multiple advertising URLs before downloading the actual app, to generate the fraudulent clicks which we had discussed earlier. The user, however, remains aloof to all these activities (fig 8).<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-84344\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/06\/Judy-8.png\" alt=\"judy-8\" width=\"791\" height=\"106\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-8.png 791w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-8-300x40.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-8-768x103.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-8-650x87.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/06\/Judy-8-789x106.png 789w\" sizes=\"(max-width: 791px) 100vw, 791px\" \/><br \/>\nFig 8<\/p>\n<p style=\"text-align: left\"><strong>Acknowledgment<\/strong><br \/>\nSubject Matter Expert<br \/>\nAnand Singh,\u00a0Gajanan Sopan Khond | Quick Heal Security Labs<\/p>\n<p style=\"text-align: left\">Sources:<br \/>\nhttps:\/\/www.bbc.com\/news\/technology-40092540<br \/>\nhttps:\/\/economictimes.indiatimes.com\/tech\/internet\/36-5-mn-android-users-may-have-been-infected-by-judy\/articleshow\/58898186.cms<br \/>\nhttps:\/\/www.theregister.co.uk\/2017\/05\/30\/android_app_judy_malware\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s turning out to be a bad month for the digital world. While the world is recovering from the WannaCry Ransomware outbreak, we now have a new malware on the loose and it is targeting Android devices. The malware is called Judy and it has infected around 41 apps in the Google Play store. More [&hellip;]<\/p>\n","protected":false},"author":29,"featured_media":84353,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[965,55,24],"tags":[1452,274,1451],"class_list":["post-84340","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-adware","category-android","category-malware","tag-auto-click-adware","tag-google-play","tag-judy-malware"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/84340"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=84340"}],"version-history":[{"count":6,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/84340\/revisions"}],"predecessor-version":[{"id":84359,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/84340\/revisions\/84359"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/84353"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=84340"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=84340"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=84340"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}