Karamjit Posted September 9, 2015 Share Posted September 9, 2015 Victims might be facing a huge phone bill next monthThe Android.Trojan.MKero.A malware is making a comeback in Androidland, and this time around, hackers found a method to bundle it with legitimate apps, capable of bypassing Google's Bouncer app scanning system. While the malware was first detected in 2014 and was mainly distributed to users installing Android apps from unverified sources, Bitdefender is now reporting on several instances of the trojan being found distributed via the official Google Play Store. This time around, the malware is packed inside various Android games, and after infecting users it secretly subscribes them to premium SMS services, all without the user having to take any actions. Using humans to bypass to CAPTCHA filtersAccording to Bitdefender's researchers, the malware uses a clever and complex set of procedures that allows it to bypass various security mechanisms put in place by the premium SMS services to prevent fraud. First, once on the infected device, the malware starts communicating with a C&C server, from where the URL of a target premium subscription website is loaded. Android.Trojan.MKero.A then moves on to extract the CAPTCHA image from the subscription form, image which it sends to antigate.com, a Web service that relies on humans to solve image-to-text CAPTCHAs. (How ironic!) After receiving the CAPTCHA's solution from antigate.com, the malware subscribes the user to the service, and after receiving, parsing and extracting the confirmation code from an SMS message, it enters the code on the target website, effectively subscribing the user to the premium service. Attackers are probably members of various affiliate programsThe purpose of infecting users with Android.Trojan.MKero.A and then subscribing them to these kind of services is simple. The attacker is probably is participating in various affiliates programs in relation to those services, and has monetary gains from each user it brings in. "Considering the malware has been built with convert capabilities to operate completely silent on the victim’s Android device, user detection and removal is extremely difficult," says Bitdefender's Liviu Arsene, who recommends using a mobile antivirus client to perform regular scans of your devices. Checking your mobile and data bill on regular intervals should also be a good idea, since increased costs that come out of nowhere can be a sign of a malware infection. Bitdefender's staff has identified 7 infected gaming apps on Google's Play Store, all of which have been removed in the meantime. From Link to comment Share on other sites More sharing options...
dMog Posted September 9, 2015 Share Posted September 9, 2015 yea like i would ever pay my cell provider any fees that resulted because i got an infected phone... :ph34r: Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.