{"id":10881,"date":"2017-12-18T09:10:27","date_gmt":"2017-12-18T17:10:27","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/12\/18\/news-4653\/"},"modified":"2017-12-18T09:10:27","modified_gmt":"2017-12-18T17:10:27","slug":"news-4653","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/12\/18\/news-4653\/","title":{"rendered":"Mobile Menace Monday: upping the ante on Adups"},"content":{"rendered":"<p><strong>Credit to Author: Nathan Collier| Date: Mon, 18 Dec 2017 16:00:00 +0000<\/strong><\/p>\n<p>Adups is back on our radar. The same China-based company caught\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2016\/11\/mobile-menace-monday-adups-old-and-new\/\" target=\"_blank\" rel=\"noopener\">collecting an abundance of user data and creating a backdoor<\/a> on mobile devices in 2016 has another malicious card to throw down. This time, it&#8217;s an auto installer we detect as Android\/PUP.Riskware.Autoins.Fota.<\/p>\n<h3>We thought they cleaned up their act<\/h3>\n<p>When the headlines about Adups came out in 2016, it forced the company to update a component known under the package name <em>com.adups.fota.\u00a0<\/em>The new version was clean of wrongdoing, and we all went about on our collective our ways.<\/p>\n<p>However, it appears there was a lingering component we overlooked. It comes with the package names <em>com.adups.fota.sysoper<\/em> and <em>com.fw.upgrade.sysoper<\/em>, appears in the app list as <em>UpgradeSys<\/em>, and has the filename <em>FWUpgradeProvider.apk.<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-20896 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/Adups1-600x103.jpg\" alt=\"\" width=\"600\" height=\"103\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/Adups1-600x103.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/Adups1-300x51.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/Adups1.jpg 720w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<h3>They call it FWUpgradeProvider<\/h3>\n<p>An auto-installer is only threatening if it has system-level rights, which (unfortunately), <em>FWUpgradeProvider<\/em> does. &#8220;How?&#8221;\u00a0you may ask. Because it comes <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/03\/mobile-menace-monday-preinstalled-adware-and-sometimes-worse\/\" target=\"_blank\" rel=\"noopener\">preinstalled on various devices<\/a>. Thus, by default it has system level privileges. Essentially, this allows it to install and\/or update apps without a user&#8217;s knowledge or consent.<\/p>\n<p>The trend of preinstalled PUP\/malware has been on the rise. Historically, these cases were isolated to budget mobile devices bought from online stores. However, with <em>FWUpgradeProvider<\/em>, there are reports of it being installed on phones bought from legitimate phone carriers in countries such as the UK.<\/p>\n<h3>Cannot remove, cannot disable<\/h3>\n<p>Preinstalled system apps cannot be removed from a mobile device. Therefore, full remediation is not possible with anti-malware scanners. However, it is possible to disable these systems apps. <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=org.malwarebytes.antimalware\" target=\"_blank\" rel=\"noopener\">Malwarebytes for Android<\/a> walks you through how to disable a system app that it detects as PUP\/malware. No big deal, right? Well, here\u2019s the kicker. Recently, it was brought to our attention by many frustrated customers that\u00a0<em>FWUpgradeProvider <\/em>cannot, I repeat, <strong>CANNOT<\/strong>, be disabled.<\/p>\n<p> <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/12\/mobile-menace-monday-upping-the-ante-on-adups-fwupgradeprovider\/#gallery-20895-1-slideshow\">Click to view slideshow.<\/a> <\/p>\n<h3>Now what!?<\/h3>\n<p>Well friends, we\u2019re working on it. It used to be that the only choice users had was to <a href=\"https:\/\/en.wikipedia.org\/wiki\/Rooting_(Android)\" target=\"_blank\" rel=\"noopener\">root<\/a> their mobile device\u2014a risky practice that could lead to permanently destroying a device if done incorrectly.<\/p>\n<p>However, we may have found a method that can disable <em>FWUpgradeProvider<\/em> (and other preinstalled apps) without rooting. This method uses a PC tool called <a href=\"https:\/\/forum.xda-developers.com\/android\/software\/debloater-remove-carrier-bloat-t2998294\" target=\"_blank\" rel=\"noopener\">Debloater<\/a>. This tool was created by the powerful <a href=\"https:\/\/www.xda-developers.com\/\" target=\"_blank\" rel=\"noopener\">XDA Developers<\/a> forum user\u00a0<a href=\"https:\/\/forum.xda-developers.com\/member.php?u=3178012\" target=\"_blank\" rel=\"external nofollow noopener\">gatesjunior<\/a>. The tool uses an exploit found in versions 4.x.x of the Android OS, which luckily is what many phones with <em>FWUpgradeProvider<\/em> are running. For a full tutorial, see <a href=\"https:\/\/forums.malwarebytes.com\/topic\/216616-disabling-adups-via-debloater-fwupgradeproviderapk\/\" target=\"_blank\" rel=\"noopener\">Disabling Adups via Debloater<\/a> posted on our support forum.<\/p>\n<h3>Deep breaths<\/h3>\n<p>Regretfully, the solution listed above isn\u2019t much of a solution\u2014it hasn&#8217;t fully been tested and we can&#8217;t guarantee it won&#8217;t cause damage to the mobile device. Consequently, we understand that many users are not comfortable attempting this method.<\/p>\n<p>As it stands, <em>FWUpgradeProvider <\/em>is categorized as a PUP\/Riskware. PUP, or <a href=\"https:\/\/blog.malwarebytes.com\/101\/2016\/02\/how-to-avoid-potentially-unwanted-programs\/\" target=\"_blank\" rel=\"noopener\">Potentially Unwanted Program<\/a>, means that it is not malware, and therefore not as threatening. Riskware means that it\u2019s something that could be potentially risky. Yes, it does have auto-installing capabilities. Rest assured, though, that if anything truly malicious installs on your device, we will detect it.<\/p>\n<p>So, if you\u2019re asking yourself if you need to replace the phone you just bought, the answer is <em>no<\/em>. As a standalone app, <em>FWUpgradeProvider <\/em>is not a threat. It\u2019s the potential to install other more dangerous apps that prompts us to detect. Hopefully, bringing public attention to this will once again alert Adups to clean things up. If not, we will remain vigilant of any malicious apps it may try to install.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/12\/mobile-menace-monday-upping-the-ante-on-adups-fwupgradeprovider\/\">Mobile Menace Monday: upping the ante on Adups<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/12\/mobile-menace-monday-upping-the-ante-on-adups-fwupgradeprovider\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Nathan Collier| Date: Mon, 18 Dec 2017 16:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/12\/mobile-menace-monday-upping-the-ante-on-adups-fwupgradeprovider\/' title='Mobile Menace Monday: upping the ante on Adups'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/12\/FeaturedImage_Ante-on-Adups.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Adups, the same China-based company caught\u00a0collecting an abundance of user data and creating a backdoor on mobile devices in 2016, has another trick up its sleeve.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/mobile\/\" rel=\"category tag\">Mobile<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/adups\/\" rel=\"tag\">adups<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/android\/\" rel=\"tag\">Android<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/com-adups-fota-sysoper\/\" rel=\"tag\">com.adups.fota.sysoper<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/com-fw-upgrade-sysoper\/\" rel=\"tag\">com.fw.upgrade.sysoper<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/fwupgradeprovider\/\" rel=\"tag\">FWUpgradeProvider<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mobile\/\" rel=\"tag\">Mobile<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/triple-m\/\" rel=\"tag\">triple m<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/upgradesys\/\" rel=\"tag\">UpgradeSys<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/12\/mobile-menace-monday-upping-the-ante-on-adups-fwupgradeprovider\/' title='Mobile Menace Monday: upping the ante on Adups'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/12\/mobile-menace-monday-upping-the-ante-on-adups-fwupgradeprovider\/\">Mobile Menace Monday: upping the ante on Adups<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[16993,10462,16994,16995,4503,16996,10554,10556,16997],"class_list":["post-10881","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-adups","tag-android","tag-com-adups-fota-sysoper","tag-com-fw-upgrade-sysoper","tag-cybercrime","tag-fwupgradeprovider","tag-mobile","tag-triple-m","tag-upgradesys"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10881","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10881"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10881\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10881"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10881"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10881"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}