{"id":10879,"date":"2017-12-18T08:30:52","date_gmt":"2017-12-18T16:30:52","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/12\/18\/news-4651\/"},"modified":"2017-12-18T08:30:52","modified_gmt":"2017-12-18T16:30:52","slug":"news-4651","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/12\/18\/news-4651\/","title":{"rendered":"Loapi \u2014 this Trojan is hot!"},"content":{"rendered":"<p><strong>Credit to Author: Anna Markovskaya| Date: Mon, 18 Dec 2017 15:35:09 +0000<\/strong><\/p>\n<p>Virus writers are creating all sorts of unpleasantness for Android device owners. We all know about the theft of personal data that later turns up on the black market. And about money leaking out of credit cards. But what about a Trojan that can make your device literally go up in smoke? Well, <a target=\"_blank\" href=\"https:\/\/securelist.com\/jack-of-all-trades\/83470\/\">it&#8217;s here<\/a>.<a target=\"_blank\" href=\"https:\/\/d1srlirzdlmpew.cloudfront.net\/wp-content\/uploads\/sites\/92\/2017\/12\/18101731\/loapi-trojan-featured.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d1srlirzdlmpew.cloudfront.net\/wp-content\/uploads\/sites\/92\/2017\/12\/18101731\/loapi-trojan-featured-1024x672.jpg\" alt=\"\" width=\"1024\" height=\"672\" class=\"aligncenter size-large wp-image-20512\" \/><\/a><\/p>\n<h2>How does jack-of-all-trades Loapi operate<\/h2>\n<p>Users pick up the Loapi Trojan by clicking on an ad banner and downloading a fake AV or adult-content app (the most likely vehicles for this Trojan). After installation, Loapi demands administrator rights \u2014 and it doesn&#8217;t take no for an answer; notification after notification appears on the screen until the desperate user finally gives in and taps OK.<\/p>\n<p>If the smartphone owner later tries to deprive the app of administrator rights, the Trojan locks the screen and closes the settings window. And if the user tries to download apps that genuinely protect the device (for example, a real AV, not a fake one), Loapi declares them to be malware and demands their removal. Another notification to that effect pops up endlessly, until the user throws in the towel.<\/p>\n<div id=\"attachment_20513\" style=\"max-width: 1034px\" class=\"wp-caption aligncenter\"><a target=\"_blank\" href=\"https:\/\/d1srlirzdlmpew.cloudfront.net\/wp-content\/uploads\/sites\/92\/2017\/12\/18101729\/loapi-hidden-in-apps.jpeg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d1srlirzdlmpew.cloudfront.net\/wp-content\/uploads\/sites\/92\/2017\/12\/18101729\/loapi-hidden-in-apps-1024x536.jpeg\" alt=\"\" width=\"1024\" height=\"536\" class=\"size-large wp-image-20513\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">Icons of fake apps in which Loapi conceals itself<\/p>\n<\/div>\n<p>Because of Loapi&#8217;s modular structure, it can switch functions on the fly at a remote server&#8217;s command, downloading and installing the necessary add-ons all by itself. Let&#8217;s take a look at some consequences of an encounter with the new Trojan.<\/p>\n<h3>1. Unwanted ads<\/h3>\n<p>Loapi relentlessly plagues the owner of the infected smartphone with banner and video ads. This module of the Trojan can also download and install other apps, visit links, and open pages in Facebook, Instagram, and VKontakte \u2014 apparently to drive up various ratings.<\/p>\n<h3>2.\u00a0Paid subscriptions<\/h3>\n<p>Another module of the Trojan can sign up users to paid services. Such subscriptions usually need to be confirmed by SMS \u2014 but that doesn&#8217;t stop Loapi either. It has yet another special module that sends a text message to the required number, and does so secretly. What&#8217;s more, all messages (both outgoing and incoming) are immediately deleted.<\/p>\n<h3>3.\u00a0DDoS attacks<\/h3>\n<p>The Trojan can turn your phone into a zombie and hijack it to use in <a target=\"_blank\" href=\"https:\/\/securelist.com\/threats\/dos-denial-of-service-attack-glossary\/\">DDoS attacks<\/a> against Web resources. To do so, it uses a built-in proxy server and sends HTTP requests from the infected device.<\/p>\n<h3>4.\u00a0Cryptomining<\/h3>\n<p>Loapi also uses smartphones to mine Monero tokens. It is this activity that can overheat your device as a result of the prolonged operation of the processor at maximum load. During our research, the battery of the test smartphone overcooked 48 hours after the device was infected.<a target=\"_blank\" href=\"https:\/\/d1srlirzdlmpew.cloudfront.net\/wp-content\/uploads\/sites\/92\/2017\/12\/18101727\/loapi-battery-overheat-photo.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d1srlirzdlmpew.cloudfront.net\/wp-content\/uploads\/sites\/92\/2017\/12\/18101727\/loapi-battery-overheat-photo.jpg\" alt=\"\" width=\"960\" height=\"600\" class=\"aligncenter size-full wp-image-20511\" \/><\/a><\/p>\n<h3>5. Downloading new modules<\/h3>\n<p>Now for the most interesting bit. At the command of a remote center, the malware can download new modules \u2014 that is, adapt to any new cash-out strategy its creators develop. For example, one day it might transform into ransomware, spyware, or a banking Trojan. In the code of the current version, our experts discovered functions that have yet to be deployed and are clearly intended for use further down the line.<\/p>\n<h2>How to protect yourself from the Loapi Trojan<\/h2>\n<p>As is often the case, prevention is better than cure. To avoid swallowing the malware bait, observe some simple rules.<\/p>\n<ul>\n<li>Install apps only from official stores. Google Play has a dedicated team responsible for catching mobile malware. Trojans do occasionally infiltrate official stores, but the chances of encountering one there are far lower than on dubious sites.<\/li>\n<li>Disable the installation of apps from unknown sources for added security. To do so, in <em>Settings<\/em> go to <em>Security<\/em> and ensure that the <em>Unknown sources<\/em> check box is not selected.<\/li>\n<\/ul>\n<p> <input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic\" \/> <\/p>\n<ul>\n<li>Don&#8217;t install what you don&#8217;t really need. As a general rule, the fewer applications you install, the more secure your device is.<\/li>\n<li>Get a reliable and proven AV for Android and regularly scan your device with it. Even free applications, such as the basic version of <a target=\"_blank\" href=\"https:\/\/app.appsflyer.com\/com.kms.free?pid=smm&amp;c=ww_kdaily\">Kaspersky Internet Security for Android<\/a>, offer good protection.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/loapi-trojan\/20510\/\" target=\"bwo\" >https:\/\/blog.kaspersky.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Anna Markovskaya| Date: Mon, 18 Dec 2017 15:35:09 +0000<\/strong><\/p>\n<p>The new Loapi Trojan will recruit your smartphone for DDoS attacks, bombard it with ads, or use it to mine cryptocurrency, making it red-hot.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10425,10378],"tags":[10462,14147,10514,16992,15902,10438,12269],"class_list":["post-10879","post","type-post","status-publish","format-standard","hentry","category-kaspersky","category-security","tag-android","tag-cryptocurrencies","tag-ddos","tag-loapi","tag-miners","tag-threats","tag-trojans"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10879","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10879"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10879\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10879"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10879"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10879"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}