When users browsed the Turkish alternative app store CepKutusu.com and proceeded to download an app, the “Download now” button led to banking malware instead of the desired app. A few weeks after ESET researchers turned to the store’s operator with the discovery of the attack, the store ceased the malicious activity.
Interestingly, although ESET researchers found the misdirection from a legitimate app to the malicious one to be general – meaning that every single app was set to be replaced with the banking malware, the crooks behind the campaign added an exception.
>See also: Defending against fileless malware
Probably to increase the chance to stay longer under the radar, they introduced a seven-day window of not serving malware after a malicious download. In practice, after the user downloads the infected app, a cookie is set to prevent the malicious system from prevailing, leading to the user being served clean links for next seven days. After this period passes, the user gets redirected to malware once they try to download any application from the store.
The malicious app distributed by the store at the time of the investigation was remotely controlled banking malware capable of intercepting and sending SMS, displaying fake activity, as well as downloading and installing other apps.
When installed, the malware doesn’t mimic the app the user intended to install. Instead, it imitates Flash Player.
To gain more insight on this attack and its wider implications, Lukáš Štefanko, Malware Researcher at ESET – who specialises in Android malware and who discovered the malware-distributing app store – discusses this discovery.
An app store serving its customers with malware on a mass scale – that sounds like a big threat. On the other hand, serving Flash Player instead of whatever customers wanted – that’s a rather thin disguise… What’s your take on this?
First, let me say that this is the first time I’ve seen an entire Android market infected like that. Within the Windows ecosystem and in browsers, this technique is known to have been used for some time but in the Android ecosystem, it’s really a new attack vector.
>See also: New malware represents biggest threat to critical infrastructure
As for the impact, what we saw in this particular case was most probably a test. The crooks misused their control of the app store in the simplest manner. Replacing the links to all apps with a link to a single malicious app requires virtually no effort – but it also gives the store’s customers a fair chance to detect the scam. If you got lured into downloading a popular game and ended up with Flash Player instead… I think you’d uninstall it straight away and report the issue, right?
This might explain why we have seen only a few hundred infections.
From this point of view, it doesn’t sound like a big deal… ?
Well, like I said, it was probably a test. I can imagine a scenario in which the crooks who control the store’s back end append a malicious functionality to each of the apps in the store. Serving those interested in a particular game with a trojanised version of that game… That would remove the biggest red flag and the number of victims might rise significantly.
As for the attribution of this attack – have you found any traces?
There are three possible scenarios here: an app store built with the intention to spread malware; a legitimate app store turned malicious by an employee with bad intentions; and a legitimate app store becoming a victim of a remote attacker.
>See also: How does advanced malware act like AI?
As for scenarios two and three, I would think that such an attack wouldn’t go unnoticed by a legitimate store. User complaints, suspicious server logs and changes in code should be sufficient indicators for its operators….
The more that the malware was being distributed via the store for weeks. Also of interest in this regard is that we contacted the store operators with our findings but haven’t received any reaction.
How to protect yourself
Štefanko suggests the following:
• If possible, always favor downloading apps from official app stores. This piece of advice is infinitely repeated for a good reason – there’s no guarantee of any security measures in alternative app stores, making them a great place for malware authors to spread their “work”, and not just via single malicious apps, but also on a mass scale, as illustrated in this case.
• Be cautious when downloading content from the internet. Pay attention to anything suspicious in file name, size and extension – this is where many threats can still be recognized and avoided in time.
• Use a reliable mobile security solution to protect you from the latest threats. As for the threat hidden in the alternative app store, ESET detects it as Android/Spy.Banker.IE and prevents it from getting downloaded.
The UK’s largest conference for tech leadership, Tech Leaders Summit, returns on 14 September with 40+ top execs signed up to speak about the challenges and opportunities surrounding the most disruptive innovations facing the enterprise today. Secure your place at this prestigious summit by registering here