{"id":11409,"date":"2018-02-07T12:10:05","date_gmt":"2018-02-07T20:10:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/02\/07\/news-5180\/"},"modified":"2018-02-07T12:10:05","modified_gmt":"2018-02-07T20:10:05","slug":"news-5180","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/02\/07\/news-5180\/","title":{"rendered":"Bogus hack apps hack users back for cryptocash"},"content":{"rendered":"<p><strong>Credit to Author: Nathan Collier| Date: Wed, 07 Feb 2018 19:30:00 +0000<\/strong><\/p>\n<p>Recently, we discovered a gold\u2026er\u2026APK mine of fake hacking apps. The &#8220;legitimate&#8221; versions of hack apps are intended to hack\u00a0<em>other\u00a0<\/em>apps in order to get something for free.\u00a0Although it\u2019s unclear what exactly these fake apps claim to hack,\u00a0the real hack job is done to unsuspecting users.<\/p>\n<h3>Search and you will find<\/h3>\n<p><strong>Disclaimer:<\/strong>\u00a0 I, and Malwarebytes, do not recommend the process I\u2019m about to outline below. Be that as it may, I\u2019m also not na\u00efve and know people do this all the time. In order to demonstrate the pitfalls of such an approach, I\u2019ll lay it all out for you.<\/p>\n<p>Say you want a hack for a particular app. Obviously, you aren\u2019t going to find such a hack on Google Play. So you fire up your favorite search engine and type in something like <em>&lt;app name&gt; hack apk.\u00a0<\/em>In this example, let\u2019s use<em> Lyft hack apk\u2014<\/em><a href=\"https:\/\/www.lyft.com\/\">Lyft<\/a> being, of course, the popular on-demand transportation company<em>. <\/em>There, right at the top of the results, is the link to the hack app you desire. You decide to play it<em> safe <\/em>and navigate to the source domain rather than the direct link to the hack app. It\u2019s a clean but simply looking website called androidapk.world.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-21380 size-medium\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/website1-169x300.png\" alt=\"\" width=\"169\" height=\"300\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/website1-169x300.png 169w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/website1-338x600.png 338w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/website1.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/p>\n<p>Convinced that such a clean-looking site has to be legitimate, you proceed to the Lyft hack app.<\/p>\n<p> <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/02\/bogus-hack-apps-hack-users-back-for-cryptocash\/#gallery-21379-1-slideshow\">Click to view slideshow.<\/a> <\/p>\n<p>Complete with app screenshots, description of the app (stolen from Google Play), a FAQ, and a How to Install section, it looks promising. There is even a long list of tags so it can be easily searched\u2014which is how you navigated there in the first place. You roll the dice and click <em>Download APK\u2026<\/em><\/p>\n<h3>A bad roll of the dice<\/h3>\n<p>After install, you open the app and get a message that states you need to install one of three apps listed to unlock premium content.<\/p>\n<p> <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/02\/bogus-hack-apps-hack-users-back-for-cryptocash\/#gallery-21379-2-slideshow\">Click to view slideshow.<\/a> <\/p>\n<p>At this point, I suspect that a seasoned user would conclude that the jig is up and rush to uninstall, but let\u2019s just play this out anyway. The first link for <em>Castle Clash <\/em>redirects you to the legit Google Play version of the game\u2014okay, easy enough.\u00a0 The second link for <em>Final Fantasy XV <\/em>redirects to a broken link\u2014fail. The third and final link for <em>AppMatch Survey<\/em> redirects to a dreaded, but harmless survey that ends in, once again, installing an app from Google Play.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-21387 size-medium\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/app3-169x300.png\" alt=\"\" width=\"169\" height=\"300\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/app3-169x300.png 169w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/app3-338x600.png 338w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/app3.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/p>\n<p>Besides the failed link, all the redirects equal a small payout to the evil doers if an app is installed. Thus the &#8220;run it for 30 seconds&#8221; disclaimer pop-up.<\/p>\n<p>After installing said app, and still no hack app and\/or premium content, you should be ready to uninstall this bogus hack job. Good luck finding the app&#8217;s shortcut icon though, because it doesn\u2019t exist. Luckily, it\u2019s not too hard to find in your apps list.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-21388\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/apps_list-169x300.png\" alt=\"\" width=\"169\" height=\"300\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/apps_list-169x300.png 169w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/apps_list-338x600.png 338w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/apps_list.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/p>\n<p>In reality, I\u2019m a little disappointed and confused that the malware developers didn\u2019t hide their efforts more thoroughly. But hey, it\u2019s good news if you did unsuspectingly install it. Hopefully if you did install, you go through the steps to uninstall in leu of the missing shortcut. However, there is going to be small percentage that don\u2019t bother and forget about its existence\u2014which is exactly what the bad actors are &#8220;banking&#8221; on. (Pun intended. Wait for it&#8230;)<\/p>\n<h3>Oh, mine!<\/h3>\n<p>So far, the attempts to dupe users seem bush league. Meanwhile, the true malicious intent has been running in the background all along. During the entire process of clicking through redirect links, the user may notice their mobile device being a tad slow. That\u2019s because a <a href=\"https:\/\/www.investopedia.com\/terms\/b\/bitcoin-mining.asp\">bitcoin miner<\/a> has been running the whole time. Under the Java class <em>com.coinhiveminer.CoinHive <\/em>is a <a href=\"https:\/\/getmonero.org\/\">Monero<\/a> JavaScript miner. Thus, we classify this bogus hack app as Android\/Trojan.CoinMiner.kki.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-21389\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/code-300x105.jpg\" alt=\"\" width=\"300\" height=\"105\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/code-300x105.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/code-600x210.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/code-470x165.jpg 470w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/code.jpg 1493w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<h3>Just a dish of adware<\/h3>\n<p>As if things couldn&#8217;t get worse, this fake hack app also comes with adware. Not surprising, as we are seeing a trend of <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/11\/new-trojan-malware-discovered-google-play\/\" target=\"_blank\" rel=\"noopener\">adware being added to various malware variants<\/a> as way to gain extra revenue. This particular adware serves ad pop-ups, as seen below.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-21390\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/popup-169x300.png\" alt=\"\" width=\"169\" height=\"300\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/popup-169x300.png 169w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/popup-338x600.png 338w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/popup.png 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/p>\n<h3>Snake eyes<\/h3>\n<p>At the beginning of this blog post, I mentioned that I was not na\u00efve to the fact that people willingly install hack apps. I ask you, dear readers, to not be na\u00efve as well. Trying to find workarounds to get apps for free that are otherwise paid apps on Google Play is a gamble. The odds are against you by going to third-party app stores to install apps for free, or finding hack apps like the one described above.\u00a0 This roll of the dice ends in snake eyes.<\/p>\n<p>In the scenario above, I\u2019m not sure how anything is being <em>hacked <\/em>from the aforementioned Lyft Hack app. As a matter of fact, this should be the first clue something is fishy. As with anything in life, use your best judgment when installing apps onto your mobile device. Consequently, installing an app from a shady app store, even if it does look legit, could cost you. Stay safe out there!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/02\/bogus-hack-apps-hack-users-back-for-cryptocash\/\">Bogus hack apps hack users back for cryptocash<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/02\/bogus-hack-apps-hack-users-back-for-cryptocash\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Nathan Collier| Date: Wed, 07 Feb 2018 19:30:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/02\/bogus-hack-apps-hack-users-back-for-cryptocash\/' title='Bogus hack apps hack users back for cryptocash'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/featured_Hacked-by-a-hack-1.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Recently, we discovered a gold mine of fake hack apps that mine for Monero cryptocurrency and serve up annoying adware.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/mobile\/\" rel=\"category tag\">Mobile<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/adware\/\" rel=\"tag\">adware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/android\/\" rel=\"tag\">Android<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/coin-hive\/\" rel=\"tag\">coin hive<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/coin-miners\/\" rel=\"tag\">coin miners<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hack\/\" rel=\"tag\">hack<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hack-app\/\" rel=\"tag\">hack app<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mobile\/\" rel=\"tag\">Mobile<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trojan\/\" rel=\"tag\">trojan<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/02\/bogus-hack-apps-hack-users-back-for-cryptocash\/' title='Bogus hack apps hack users back for cryptocash'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/02\/bogus-hack-apps-hack-users-back-for-cryptocash\/\">Bogus hack apps hack users back for cryptocash<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10468,10462,15897,17204,4503,4980,17452,10554,10833],"class_list":["post-11409","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-adware","tag-android","tag-coin-hive","tag-coin-miners","tag-cybercrime","tag-hack","tag-hack-app","tag-mobile","tag-trojan"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11409","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11409"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11409\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11409"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11409"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11409"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}