{"id":88125,"date":"2019-09-24T20:14:54","date_gmt":"2019-09-24T14:44:54","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=88125"},"modified":"2019-09-26T18:28:50","modified_gmt":"2019-09-26T12:58:50","slug":"quick-heal-reports-29-malicious-apps-10-million-downloads-google-play-store","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/quick-heal-reports-29-malicious-apps-10-million-downloads-google-play-store\/","title":{"rendered":"Quick Heal reports 29 malicious apps with 10 million+ downloads on Google Play Store"},"content":{"rendered":"<div>Quick Heal Security Labs reported\u00a029 malicious apps found on Google Play Store, which have a collective download count of more than 10 Millions. Google was quick enough to remove these malicious apps from Play Store immediately.\u00a0One of the Apps\u00a0from this set, named \u201c<strong><b>Multiapp multiple accounts simultaneously<\/b><\/strong>\u201d has crossed 5 million installs already.<\/div>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-88143 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/09\/play_screens-300x298.png\" alt=\"\" width=\"561\" height=\"557\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/09\/play_screens-300x298.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/09\/play_screens-150x150.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/09\/play_screens-393x390.png 393w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/09\/play_screens-70x70.png 70w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/09\/play_screens-45x45.png 45w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/09\/play_screens.png 586w\" sizes=\"(max-width: 561px) 100vw, 561px\" \/>\u00a0<em>\u00a0 Fig. 1<\/em>&#8211; <em>Malicious HiddAd Apps from Google Play Store<\/em><\/p>\n<p>From this set of 29 malicious Apps, 24 are from HiddAd\u00a0category. The HiddAd Apps hide their icon after first launch and create shortcut on Home Screen. Clear purpose of this action is that users should not be able to uninstall it by just dragging the icon. When users launch the App through the shortcut, these apps show full screen ads on device screen. Few of these Apps can show adds even when the device is in idle state and the App is not in active use. Most of these Apps are of Photography category and are similar to previous HiddAds found on Google Play Store. Fig. 1 shows screenshots\u00a0of malicious HiddAd Apps from Google Play Store.<\/p>\n<p>The remaining 5 Apps from above list are of Adware category and would generally get into your Android phones through advertisements. Users\u00a0see many advertisements every-time they visit social media sites like YouTube, Facebook, etc. which promote different mobile applications. Many a times, these promoted mobile applications boast about a lot of unbelievable functionalities like X-Ray scanning. We came across few advertisements of some interesting Android Apps which claim to offer functionality of X-ray scanning. When we explored the App further, we found out that two such apps have crossed 1 million + downloads already.<\/p>\n<p>Here is a screenshot of such an advertisement we came across on YouTube,\u00a0prompting users to download one of the magnifier application &#8211;<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-88139 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/09\/AD_promotion-300x221.png\" alt=\"\" width=\"326\" height=\"240\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/09\/AD_promotion-300x221.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/09\/AD_promotion.png 330w\" sizes=\"(max-width: 326px) 100vw, 326px\" \/><em>Fig. 2<\/em> &#8211; <em>Advertisement\u00a0screenshot from YouTube<\/em><\/p>\n<p>In this Advertisement, it claims that it can scan human body like X-ray scanning machine. But obviously, this app doesn\u2019t have any such functionality. We can guess that\u00a0many users are tricked into downloading this App and they end up with annoying advertisements. During our analysis, we found around 5 applications with similar functionalities.<strong><b>\u00a0<\/b><\/strong><\/p>\n<p><strong>Analysis of HiddAd malware Apps:\u00a0<\/strong><\/p>\n<p>HiddAd malware App hides its icon after installation and its first launch. It creates shortcut on Home Screen. We analyzed one of these HiddAd malware App in detail. It directly uses <em><i>setComponentEnabledSetting<\/i><\/em><em><i>\u00a0<\/i><\/em>method to hide its own icon, without any obfuscation. This is little different from most of the HiddAd malware which we analyzed earlier and they were using some obfuscation techniques to evade detections.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-88145 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/09\/shortcut_created-300x228.png\" alt=\"\" width=\"515\" height=\"391\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/09\/shortcut_created-300x228.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/09\/shortcut_created-514x390.png 514w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/09\/shortcut_created.png 577w\" sizes=\"(max-width: 515px) 100vw, 515px\" \/><em>\u00a0Fig. 3<\/em> &#8211;<em> Screenshot\u00a0of HiddAd activity<\/em><\/p>\n<p>This HiddAd App has following code to decide when to show Ads. The function name itself tells its purpose. The following code snippet clearly shows\u00a0that App installation time is saved in one variable and then depending on that value, it decides the exact time to show Ads.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-88140 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/09\/code1-300x84.png\" alt=\"\" width=\"743\" height=\"208\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/09\/code1-300x84.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/09\/code1-650x181.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/09\/code1-304x84.png 304w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/09\/code1.png 667w\" sizes=\"(max-width: 743px) 100vw, 743px\" \/><\/p>\n<p style=\"text-align: center\"><em>Fig. 4<\/em> &#8211; <em>code to decide Ad display time<\/em><\/p>\n<p>In one of these Apps, named \u201cFirst camera HD\u201d, malware author has used a different technique. In this apk, there is an encrypted file present in its \u201cassets\u201d directory. This file gets decrypted at runtime and it creates odex file (Optimized dex file) in \u201cdata\\data\\com.first.app.camera.spite\\files\\podex\\odexdir\u201d.<\/p>\n<p>Later it deletes this created odex file runtime. We analyzed this file by fetching it from our emulator and found that it has similar code. Below code snippet shows\u00a0how it decrypts and create odex file \u2013<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-88141 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/09\/code2-300x135.png\" alt=\"\" width=\"710\" height=\"320\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/09\/code2-300x135.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/09\/code2-650x293.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/09\/code2.png 667w\" sizes=\"(max-width: 710px) 100vw, 710px\" \/><\/p>\n<p style=\"text-align: center\"><em>Fig. 5<\/em> &#8211;<em> odex file creation<\/em><\/p>\n<p>Quick Heal Total Security for Mobile detects these applications as<strong><b>\u00a0Android.Hiddad.A<\/b><\/strong><\/p>\n<p><strong><b>Analysis of Adware Apps:<\/b><\/strong><\/p>\n<p>These Apps pretend to offer a functionality of magnifying the view, but in reality these Apps just show heavy Advertisement on user\u2019s mobile, eventually draining phone battery and causing heavy data usage and productivity loss.<\/p>\n<p>Right after the launch, these applications open camera and show various options like flash-light, gallery, etc. But when user chooses an option, these apps start full-screen Ads, with no option to close or skip. Initially there is no way to close these Ads and it takes considerable time to show Close Ad button. These Ads are continuous and annoying. Even if user gets a chance to close one Ad, it will again open another Ad immediately and won\u2019t allow to use the real application functionalities.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-88146 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/09\/shows_ad-300x120.png\" alt=\"\" width=\"803\" height=\"321\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/09\/shows_ad-300x120.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/09\/shows_ad.png 625w\" sizes=\"(max-width: 803px) 100vw, 803px\" \/><\/p>\n<p style=\"text-align: center\"><em>Fig. 6<\/em> &#8211; <em>Screenshots of Adware activity<\/em><\/p>\n<p>From the user reviews, it seems that user is trapped\/lured in installing these Apps.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-88144 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/09\/reviews-300x228.png\" alt=\"\" width=\"615\" height=\"467\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/09\/reviews-300x228.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/09\/reviews.png 493w\" sizes=\"(max-width: 615px) 100vw, 615px\" \/><\/p>\n<p style=\"text-align: center\"><em>Fig. 7<\/em> &#8211; <em>User reviews<\/em><\/p>\n<p>Quick Heal Total Security for Mobile detects these applications under the Adware category as <strong><b>Android.Magnify.A (Adware)<\/b><\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-88142 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/09\/IOc-300x211.png\" alt=\"\" width=\"788\" height=\"554\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/09\/IOc-300x211.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/09\/IOc-554x390.png 554w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/09\/IOc.png 665w\" sizes=\"(max-width: 788px) 100vw, 788px\" \/><\/p>\n<p style=\"text-align: center\"><em>Fig. 8 &#8211; IOCs<\/em><\/p>\n<p>&nbsp;<\/p>\n<blockquote>\n<p align=\"justify\"><strong><span style=\"color: #7e0021\"><span style=\"font-family: Calibri, sans-serif\"><span style=\"font-size: medium\"><i>Threat actors are continuously trying to find new ways to enter into the user\u2019s device and earn money through advertisements. So, user should not fall prey for this and should not install any random mobile application coming from social platforms blindly. Rather, user should check App Developer\u2019s information\u00a0and\u00a0reviews before downloading any app.<\/i><\/span><\/span><\/span><\/strong><\/p>\n<\/blockquote>\n<p><strong><b>Tips to stay safe from Android malware:<\/b><\/strong><\/p>\n<ul>\n<li>Check an app\u2019s description before you download it.<\/li>\n<li>Check the app developer\u2019s name and their website. If the name sounds strange or odd, you have all the reasons to suspect it.<\/li>\n<li>Go through the reviews and ratings of the app. But, note that these can also be faked.<\/li>\n<li>Avoid downloading apps from third-party app stores.<\/li>\n<li>Always keep \u2018Unknown Sources\u2019 disabled. Enabling this option allows installation of apps from unknown sources.<\/li>\n<li>Most importantly, verify app permissions before installing any app even from official stores such as Google Play.<\/li>\n<li>Use a reliable mobile antivirus (like Quick Heal Total Security), that can prevent fake, malicious apps, adware, etc. from getting installed on your phone.<\/li>\n<li>Limit yourself to known apps from known developers and keep only those apps on mobile that are really needed.<\/li>\n<\/ul>\n<p align=\"justify\">Although Quick Heal&#8217;s Security Lab is constantly on the lookout for malicious activities happening against Mobile Devices, prevention is always better than cure. Our modern world has absolutely brought mobile devices at the forefront of how we conduct our day to day lives.<\/p>\n<p align=\"justify\">Communication, e-commerce, entertainment, logistics, even office work is all being conducted today via mobile devices. Evidently then, any type of breach to mobile devices personally used will bring life to a standstill, create panic and cause extreme inconvenience. To avoid this unpleasant scenario leverage on Quick Heal\u2019s enterprise-grade <a href=\"https:\/\/www.quickheal.co.in\/home-users\/quick-heal-total-security-for-android\" target=\"_blank\">Total Mobile Device Protection for Android<\/a> product,  and safeguard your valuable mobile devices.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Quick Heal Security Labs reported\u00a029 malicious apps found on Google Play Store, which have a collective download count of more than 10 Millions. Google was quick enough to remove these malicious apps from Play Store immediately.\u00a0One of the Apps\u00a0from this set, named \u201cMultiapp multiple accounts simultaneously\u201d has crossed 5 million installs already. \u00a0\u00a0 Fig. 1&#8211; [&hellip;]<\/p>\n","protected":false},"author":61,"featured_media":88126,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[55,1653,285,24,109],"tags":[],"class_list":["post-88125","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-android","category-antivirus","category-applications","category-malware","category-youtube"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/88125"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/61"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=88125"}],"version-history":[{"count":36,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/88125\/revisions"}],"predecessor-version":[{"id":88173,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/88125\/revisions\/88173"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/88126"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=88125"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=88125"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=88125"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}