{"id":89493,"date":"2021-01-12T18:23:31","date_gmt":"2021-01-12T12:53:31","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=89493"},"modified":"2023-09-20T15:47:38","modified_gmt":"2023-09-20T10:17:38","slug":"you-might-get-hacked-before-getting-vaccinated","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/you-might-get-hacked-before-getting-vaccinated\/","title":{"rendered":"You might get hacked before getting vaccinated"},"content":{"rendered":"<p>COVID-19 is a stark reminder of longstanding inequities in our societies, and how policies need to pay specific attention to protect and lift the less advantaged in society. It also applies to the privacy policy, device protection and general awareness before installing any application. Such awareness is crucial because miserable people out there are still looking to take advantage of such a pandemic that has already turned our lives upside down.<\/p>\n<p>A renowned mobile application <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=nic.goi.aarogyasetu\" target=\"_blank\" rel=\"noopener noreferrer\">Arogya Setu<\/a> launched by Government of India for easy contact tracing of people during the Covid-19 pandemic has more than 100 million downloads now. Malware authors could not sit back and let this opportunity slip out of their hands. They misused the name \u2018Aarogya Setu\u2019 to plant malicious apps into the end user\u2019s phone. Quick Heal collected many applications from various sources that impersonated the original Aarogya Setu App as mentioned in a previous <a href=\"https:\/\/blogs.quickheal.com\/sure-right-aarogya-setu-app-phone\/\" target=\"_blank\" rel=\"noopener noreferrer\">Quick Heal blog<\/a>.<\/p>\n<p>Many fake Arogya Setu apps that we found were Spyware using Spynote RAT.<\/p>\n<p>Another set of applications which we came across were patched versions of the official Aarogya Setu application version 1.04, created by patching the official app with the package name \u201c<em>xrcpryfabq.peotrafpop<\/em>\u201d that contains Metasploit code.<\/p>\n<p>Similarly, much other malware could be put inside the official Arogya Setu app to create a look-alike, such as Droppers, Bankers, Fakeavs, Key-loggers, Spyware, Ransomware and many more out of which one more group found and detected by Quick Heal was a Trojan-Dropper.<\/p>\n<p>For detailed information visit <a href=\"https:\/\/blogs.quickheal.com\/sure-right-aarogya-setu-app-phone\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/blogs.quickheal.com\/sure-right-aarogya-setu-app-phone\/<\/a><\/p>\n<p>We have been hearing about many vaccines out of which few are potentially effective. Now when people have started talking about vaccination, <a href=\"https:\/\/metro.co.uk\/2020\/12\/28\/fake-nhs-covid-19-vaccine-texts-are-circulating-dont-fall-for-them-13815735\/\" target=\"_blank\" rel=\"noopener noreferrer\">scammers started sending fake messages<\/a> wherein, they send links that take users to fraudulent websites, or they ask for personal details and payment information, or they just lure people into replying to that text message that may cost them a fortune.<\/p>\n<p>Whereas India is running down a different phase.<\/p>\n<h2>Get yourself registered on CoWIN<\/h2>\n<p>It feels like we have been fighting Covid-19 since ages, but now we have come to the point where potential vaccines are approved by WHO. The USA has already started vaccinating from December 14, 2020, and India is about to start vaccinating its people in different phases. The online space is rife with lots of speculations around how this phase-wise vaccination would work for masses in India. Few claim that Indian Govt is planning to launch a new app named CoWIN to record data of individuals and use this data later during vaccination. The CoWIN app will be a free downloadable mobile application that will help record vaccine data.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89497 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/01\/Picture3-650x215.png\" alt=\"\" width=\"650\" height=\"215\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Picture3-650x215.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Picture3-300x99.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Picture3.png 763w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>Though CoWIN is not yet ready and not launched, malware authors have already rolled up their sleeves to put their malware inside this upcoming application or impersonate it. We found a fake app named \u201cCoWIN App\u201d with the package name \u201cmobi.androapp.co.c9160\u201d, the developer is \u201cPuzzlersWorld\u201d.<\/p>\n<figure id=\"attachment_89507\" aria-describedby=\"caption-attachment-89507\" style=\"width: 227px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-89507\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/01\/Picture4-1.png\" alt=\"Fig.1 CoWIN App\" width=\"227\" height=\"389\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Picture4-1.png 227w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Picture4-1-175x300.png 175w\" sizes=\"(max-width: 227px) 100vw, 227px\" \/><figcaption id=\"caption-attachment-89507\" class=\"wp-caption-text\">Fig.1 CoWIN App<\/figcaption><\/figure>\n<p>It has different tabs, but none of them has any functionality. The tabs only show news thread as shown in fig.7 on every tab, but when it is installed on rooted device and the user clicks on \u201cAndroid app\u201d tab it opens the URL \u201c<a href=\"https:\/\/androapp.mobi\/appCreator\/apk\/1872658795fd87db658b8d3.66541642.apk\" target=\"_blank\" rel=\"noopener noreferrer\">xxxx:\/\/androapp.mobi\/appCreator\/\/apk\/1872658795fd87db658b8d3.66541642.apk<\/a>\u201d in chrome that asks to download that application as a new app or as an update to the existing app, for which we will have to enable chrome to install unknown apps as discussed earlier.<\/p>\n<figure id=\"attachment_89500\" aria-describedby=\"caption-attachment-89500\" style=\"width: 607px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89500\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/01\/Picture1-607x390.png\" alt=\"Fig.2 Downloading apk file \" width=\"607\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Picture1-607x390.png 607w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Picture1-300x193.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Picture1.png 629w\" sizes=\"(max-width: 607px) 100vw, 607px\" \/><figcaption id=\"caption-attachment-89500\" class=\"wp-caption-text\">Fig.2 Downloading apk file<\/figcaption><\/figure>\n<figure id=\"attachment_89501\" aria-describedby=\"caption-attachment-89501\" style=\"width: 587px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89501\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/01\/Picture2-587x390.png\" alt=\"Fig. 3 Asking for permission to install unknown apps \" width=\"587\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Picture2-587x390.png 587w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Picture2-300x199.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/Picture2.png 599w\" sizes=\"(max-width: 587px) 100vw, 587px\" \/><figcaption id=\"caption-attachment-89501\" class=\"wp-caption-text\">Fig. 3 Asking for permission to install unknown apps<\/figcaption><\/figure>\n<p>There are many reasons for creating fake apps elaborated in <a href=\"https:\/\/quickheal.co.in\/documents\/technical-paper\/The_Evolution_of_Fake_Apps.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Quick Heal\u2019s technical paper<\/a>, one of which is a mobile advertisement. Many fakeapps show ads aggressively to generate more revenue in less time. This app is no exception, we found ad modules that create the Ad URL.<\/p>\n<figure id=\"attachment_89522\" aria-describedby=\"caption-attachment-89522\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89522\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/01\/combined_img-2-650x66.png\" alt=\"Fig. 4 Creating ad URL\" width=\"650\" height=\"66\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/combined_img-2-650x66.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/combined_img-2-300x30.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/combined_img-2-768x78.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/combined_img-2-1536x156.png 1536w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/combined_img-2-789x80.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/combined_img-2.png 1841w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-89522\" class=\"wp-caption-text\">Fig. 4 Creating ad URL<\/figcaption><\/figure>\n<p>It is downloading the video of specific resolution and length.<\/p>\n<figure id=\"attachment_89524\" aria-describedby=\"caption-attachment-89524\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89524\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/01\/download_assets-1-650x144.png\" alt=\"Fig. 5 Downloading ad video.\" width=\"650\" height=\"144\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/download_assets-1-650x144.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/download_assets-1-300x67.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/download_assets-1-768x171.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/download_assets-1-1536x341.png 1536w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/download_assets-1-789x175.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/download_assets-1.png 1743w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-89524\" class=\"wp-caption-text\">Fig. 5 Downloading ad video.<\/figcaption><\/figure>\n<p>It also keeps updating the list of ads, that it uses to show to the user.<\/p>\n<figure id=\"attachment_89518\" aria-describedby=\"caption-attachment-89518\" style=\"width: 476px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-89518\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/01\/force_update_ad.png\" alt=\"Fig. 6 Force updating the ad list\" width=\"476\" height=\"76\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/force_update_ad.png 476w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/force_update_ad-300x48.png 300w\" sizes=\"(max-width: 476px) 100vw, 476px\" \/><figcaption id=\"caption-attachment-89518\" class=\"wp-caption-text\">Fig. 6 Force updating the ad list<\/figcaption><\/figure>\n<p>Arogya Setu app and CoWIN App falls under the category of \u201cFakeApps follow Social Trends\u201d where they are making use of the current situation and deceiving people.<\/p>\n<p>This is just the start, several malicious apps are about to come along with the launch of official CoWIN app, and they might use several other tricks to get into target device either via Google Play Store, Appstore or any other means such as websites, clickjacking, sharing of links via instant messaging apps, emails or SMS, or via direct file transmission. But we need to be aware of tricks that are already discovered and follow certain instructions before installing any application on our system.<\/p>\n<h2><strong>Indicator of compromise<\/strong><\/h2>\n<table>\n<tbody>\n<tr>\n<td width=\"259\">Package Name<\/td>\n<td width=\"342\">MD5<\/td>\n<\/tr>\n<tr>\n<td width=\"259\">mobi.androapp.co.c9160<\/td>\n<td width=\"342\">52f21a04e4deba639863bd8e277698b4<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>Most people install applications from Google Play Store on Android devices and Appstore in iOS devices, and they [Google Play store, Appstore] do apply some security measures to prevent these malicious applications from entering their store. However, one way or another malware authors find their way to reach their targets either through these platforms or any other website, and how people reach those websites is another story among which sharing link via WhatsApp, email, SMS are common ways. Complete application files could also be shared directly through instant messaging apps like Whatsapp, Facebook messenger, Hike and many more. In such cases, the user is prompted for permission to install apps from unknown sources, which the user needs to allow from the settings as shown below.<\/p>\n<figure id=\"attachment_89505\" aria-describedby=\"caption-attachment-89505\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89505\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/01\/1.special_app_access-w782-650x377.png\" alt=\"Fig.7 permission to install apps from website\" width=\"650\" height=\"377\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/1.special_app_access-w782-650x377.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/1.special_app_access-w782-300x174.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/1.special_app_access-w782-768x445.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/01\/1.special_app_access-w782.png 782w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-89505\" class=\"wp-caption-text\">Fig.7 permission to install apps from website<\/figcaption><\/figure>\n<p>On devices running Android 7.0 Nougat or earlier:\u00a0<strong>Settings-&gt;Security-&gt;allow installation from unknown sources<\/strong>.<\/p>\n<p>And this is where the user becomes prone to a myriad of exploits, as malicious applications that could have been detected malicious and filtered by Google Play Store policy has now found its way to enter the end user\u2019s device. Hence by mentioning all those tricks used by threat actors and motto that drives their actions to deceive people by preying on their fears, this blog here is trying to help understand how a simple application that looks so benign could be so monstrous, how malware is put even inside official apps like Arogya Setu and CoWIN. We intend to keep our fellow citizens aware and safe by helping them inculcate sanitary practices before installing any app and following certain tips to stay safe, mentioned below.<\/p>\n<h2>How to stay safe<\/h2>\n<p>1.Download Applications only from trusted sources like Google Play Store.<\/p>\n<p>2.<a href=\"https:\/\/blogs.quickheal.com\/how-to-identify-fake-apps-in-the-google-play-store\/\" target=\"_blank\" rel=\"noopener noreferrer\">Learn<\/a> how to identify fake apps in Google Play Store<\/p>\n<p>3.Do not click on alien links received through messages or any other social media platforms.<\/p>\n<p>4.Turn off installation from unknown source option<\/p>\n<p>5. Read the pop-up messages you get from Android system before Accepting\/Allowing any new permissions.<\/p>\n<p>6. Malicious developers spoof original Application names and Developer names. So, make sure you are downloading genuine apps only. Often app descriptions contain typos and grammatical mistakes. Check the developer\u2019s website if a link is available on the app\u2019s webpage. Avoid using it if anything looks strange or odd.<\/p>\n<p>7. Reviews and ratings can be fake but still reading user reviews of the app and the experience of existing users can be helpful. Pay attention to reviews with low ratings.<\/p>\n<p>8. Check download count of the app \u2014 popular apps have very high download counts. But do note that some fakeapps have been downloaded thousands or even millions of times before they were discovered.<\/p>\n<p>9. Avoid downloading apps from third-party app stores or links provided in SMSs, emails, or WhatsApp messages. Also, avoid installing apps that are downloaded after clicking on an advertisement.<\/p>\n<p>10. Use a trusted anti-virus like Quick Heal Mobile Security to <a href=\"https:\/\/blogs.quickheal.com\/28-fake-apps-removed-google-play-store-post-quick-heal-security-lab-reports\/\" target=\"_blank\" rel=\"noopener noreferrer\">stay safe from Android malware<\/a>.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>COVID-19 is a stark reminder of longstanding inequities in our societies, and how policies need to pay specific attention to protect and lift the less advantaged in society. It also applies to the privacy policy, device protection and general awareness before installing any application. Such awareness is crucial because miserable people out there are still [&hellip;]<\/p>\n","protected":false},"author":83,"featured_media":89494,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1725,1739],"tags":[1765,1766,218,667],"class_list":["post-89493","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-coronavirus","category-cybersecurity","tag-arogya-setu","tag-cowin","tag-google","tag-ios"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89493"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=89493"}],"version-history":[{"count":18,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89493\/revisions"}],"predecessor-version":[{"id":89527,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89493\/revisions\/89527"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/89494"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=89493"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=89493"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=89493"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}