Jump to content
  • Android apps with spyware installed 421 million times from Google Play

    alf9872000

    • 187 views
    • 3 minutes
     Share


    • 187 views
    • 3 minutes

    A new Android malware distributed as an advertisement SDK has been discovered in multiple apps, many previously on Google Play and collectively downloaded over 400 million times.

     

    Security researchers at Dr. Web discovered the spyware module and tracked it as 'SpinOk,' warning that it can steal private data stored on users' devices and send it to a remote server.

     

    The antivirus company says SpinkOk demonstrates a seemingly legitimate behavior, using minigames that lead to "daily rewards" to spark user interest.

     

    "On the surface, the SpinOk module is designed to maintain users' interest in apps with the help of mini games, a system of tasks, and alleged prizes and reward drawings," explains Doctor Web's report.

     

    In the background, though, the trojan SDK checks the Android device's sensor data (gyroscope, magnetometer) to confirm that it's not running in a sandboxed environment, commonly used by researchers when analyzing potentially malicious Android apps.

     

    The app then connects to a remote server to download a list of URLs opened used to display expected minigames.

     

    While the minigames are displayed to the apps' users as expected, Dr. Web says that in the background, the SDK is capable of additional malicious functionality, including listing files in directories, searching for particular files, uploading files from the device, or copying and replacing clipboard contents.

     

    The file exfiltration functionality is particularly concerning as it could expose private images, videos, and documents.

     

    In addition, the clipboard modification functionality code allows the SDK's operators to steal account passwords and credit card data, or hijack cryptocurrency payments to their own crypto wallet addresses.

     

    Dr. Web claims this SDK was found in 101 apps that were downloaded for a cumulative total of 421,290,300 times from Google Play, with the most downloaded listed below:

     

    • Noizz: video editor with music (100,000,000 downloads)
    • Zapya – File Transfer, Share (100,000,000 downloads; Dr. Web says the trojan module was present in version 6.3.3 to version 6.4 and is no longer present in current version 6.4.1)
    • VFly: video editor&video maker (50,000,000 downloads)
    • MVBit – MV video status maker (50,000,000 downloads)
    • Biugo – video maker&video editor (50,000,000 downloads)
    • Crazy Drop (10,000,000 downloads)
    • Cashzine – Earn money reward (10,000,000 downloads)
    • Fizzo Novel – Reading Offline (10,000,000 downloads)
    • CashEM: Get Rewards (5,000,000 downloads)
    • Tick: watch to earn (5,000,000 downloads)

     

    All but one of the above apps have been removed from Google Play, indicating that Google received reports about the malicious SDK and removed the offending apps until the developers submitted a clean version.

     

    A complete list of the apps reportedly using the SDK can be found on Dr. Web's site.

     

    It is unclear if the publishers of the trojanized apps were deceived by the SDK's distributor or knowingly included it in their code, but these infections commonly result from a supply-chain attack from a third party.

     

    If you use any of the apps listed above, you should update to the latest version available via Google Play, which should be clean.

     

    If the app isn't available on Android's official app store, it is recommended to uninstall them immediately and scan your device with a mobile antivirus tool to ensure that any spyware leftovers are removed.

     

    BleepingComputer has reached out to Google for a statement on this massive infection base, but a comment wasn't available by publication time.

     

    User Feedback

    Recommended Comments

    There are no comments to display.



    Join the conversation

    You can post now and register later. If you have an account, sign in now to post with your account.
    Note: Your post will require moderator approval before it will be visible.

    Guest
    Add a comment...

    ×   Pasted as rich text.   Paste as plain text instead

      Only 75 emoji are allowed.

    ×   Your link has been automatically embedded.   Display as a link instead

    ×   Your previous content has been restored.   Clear editor

    ×   You cannot paste images directly. Upload or insert images from URL.


  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...