News

Android malware downloaded 50k-100k times before being pulled

Tastes malicious

Android malware downloaded 50k-100k times before being pulled
|

Just when you thought all of Google's drives to improve security on its Google Play Store were paying dividends, here comes a story on probably the biggest malware attack recorded on the platform to date.

Symantec researcher Irfan Asrar has found a piece of malicious code (now labelled 'Android.Dropdialer') that was hidden in fake apps with names of popular games like Super Mario Bros. and the bizarre Grand Theft Auto 3 Moscow.

This particular Trojan then staggered its payload delivery, thus remaining undetected by Google until only very recently.

Back attack

In that time, there were 50k-100k downloads of the trojan. The infected phones would first off download an APK called Activator, then send out an SMS to a premium-rate number, and finally prompt the user to uninstall Activator once complete.

"What is most interesting about this Trojan is the fact that the threat managed to stay on Google Play for such a long time," Asrar says on the Symantec blog.

"Our suspicion is that this was probably due to the remote payload employed by this Trojan."

The moral of the story: Trojans can't enter your phone if you don't download dodgy apps. Oh, and always watch out for apps requesting odd permissions such as 'send SMS messages'.

Boy Genius Report
Will Wilson
Will Wilson
Will's obsession with gaming started off with sketching Laser Squad levels on pads of paper, but recently grew into violently shouting "Tango Down!" at random strangers on the street. He now directs that positive energy into his writing (due in no small part to a binding court order).