{"id":14963,"date":"2019-03-29T08:10:09","date_gmt":"2019-03-29T16:10:09","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/03\/29\/news-8712\/"},"modified":"2019-03-29T08:10:09","modified_gmt":"2019-03-29T16:10:09","slug":"news-8712","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/03\/29\/news-8712\/","title":{"rendered":"Awakening the beast: BatMobi adware"},"content":{"rendered":"<p><strong>Credit to Author: Nathan| Date: Fri, 29 Mar 2019 15:00:00 +0000<\/strong><\/p>\n<p>On February 12, a patron of the <a href=\"https:\/\/forums.malwarebytes.com\/\" target=\"_blank\" rel=\"noopener\">Malwarebytes Forum<\/a> alerted us of an issue with ad redirects that seemed to come out of nowhere. An outcry from other commenters filled the forum thread, all experiencing the same redirects to the same exact websites. Our web protection team traced the offending websites back to the culprit\u2014the adware known as BatMobi.<\/p>\n<h3>What is BatMobi?<\/h3>\n<p>BatMobi is an Advertisement Software Development Kit (Ad SDK), which is essentially a software library that connects applications to ad networks. Developers insert Ad SDKs into their apps&#8217; code to gain revenue through ads. Thus, they can offer their apps for free and still make money. Most variants of BatMobi were clean and safe to use\u2014until recently.<\/p>\n<p>Based on a Reddit post about the sudden web redirects on January 21, it appears these &#8220;clean&#8221; versions of BatMobi turned into mobile adware around mid January. Adware is a subcategory of <a href=\"https:\/\/blog.malwarebytes.com\/threats\/mobile-pup\/\" target=\"_blank\" rel=\"noopener\">Potentially Unwanted Programs (PUPs)<\/a>, which means it hangs around the fringes of bad behavior and often results in poor user experiences. Furthermore, BatMobi has always had a slightly more aggressive version we consider low-level adware. We detect this as <a href=\"https:\/\/blog.malwarebytes.com\/detections\/android-adware-batmobi\/\" target=\"_blank\" rel=\"noopener\">Android\/Adware.BatMobi<\/a>.<\/p>\n<h3>Triggered by Google Play<\/h3>\n<p>An interesting component of this newly seen BatMobi variant is the location in which it was popping up ads\u2014Google Play. Forum patrons verified the ads were popping up whenever an app was updating or installing in Google Play. BatMobi is using\u00a0<a href=\"https:\/\/developer.chrome.com\/multidevice\/android\/customtabs\" target=\"_blank\" rel=\"noopener\">Chrome Custom Tabs<\/a>\u00a0within its code to open websites in Google Play whenever it was triggered by these events. Although the websites being redirected to are relatively safe sites, they are an unwanted nuisance for the user\u2014exactly what we consider adware.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"27578\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/03\/awaking-the-beast-adware-batmobi\/attachment\/1-56\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/1.png\" data-orig-size=\"1080,1920\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"1\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/1-169x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/1-338x600.png\" class=\"aligncenter size-medium wp-image-27578\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/1-169x300.png\" alt=\"\" width=\"169\" height=\"300\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/1-169x300.png 169w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/1-338x600.png 338w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/1.png 1080w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/p>\n<h3>Tracking down the beast<\/h3>\n<p>Usually, pinpointing the source of an adware app on a customer&#8217;s device is simple, especially when knowing the adware variant, as in this case. Thanks to all the great Malwarebytes forum participants, I had a large set of data to work with in the form of what we call Apps Reports.<\/p>\n<p>This is a list of apps along with data about their MD5, package name, and other components to assist tracking down infections. Even with all the data, finding BatMobi was a nightmare: It hides deep within an app&#8217;s code, in different apps on each user&#8217;s device, and no other mobile anti-malware vendors detect it. Nevertheless, I was able to make some headway and find a couple of patterns of infection. Here were my findings.<\/p>\n<h4>Uptodown<\/h4>\n<p>The search started with the third-party app store Uptodown. More specifically, apps that download videos from YouTube, such as\u00a0Videoder, Video Downloader, Snaptube, and TubeMate were delivering ads to users the most.\u00a0These apps all come with hidden versions of BatMobi.\u00a0 Removing these apps solved the issue for many, but still it persisted for others.<\/p>\n<p> <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/03\/awaking-the-beast-adware-batmobi\/#gallery-27577-1-slideshow\">Click to view slideshow.<\/a> <\/p>\n<h4>Mi Mobile<\/h4>\n<p>Another component that further complicates detecting and removing BatMobi is that we found it on apps <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/01\/the-new-landscape-of-preinstalled-mobile-malware-malicious-code-within\/\" target=\"_blank\" rel=\"noopener\">pre-installed<\/a> on Mi Mobile devices\u2014specifically,\u00a0the Xiaomi Redmi Note 5. The infected apps are as listed:<\/p>\n<p>Package name:<em> com.mi.android.globalpersonalassistant <\/em><br \/> App name:<em> App vault\u00a0<\/em><\/p>\n<p>Package name:<em> com.android.providers.downloads.ui \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/em><br \/> App name:<em> Downloads<\/em><\/p>\n<p>Please note that not all versions of these apps have BatMobi nor do all Xiaomi Redmi Note 5 devices\u2014only a select few.\u00a0 Detections are in place in <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=org.malwarebytes.antimalware\" target=\"_blank\" rel=\"noopener\">Malwarebytes for Android<\/a> to alert users of its presence.<\/p>\n<p>If you are having issues with adware on pre-installed apps, you can <a href=\"https:\/\/forums.malwarebytes.com\/topic\/216616-removal-instructions-for-adups\/\" target=\"_blank\" rel=\"noopener\">follow our removal instructions for disabling or uninstalling<\/a>.<\/p>\n<p><strong>Warning:<\/strong>\u00a0Make sure to read\u00a0<strong>Restoring apps onto the device (without factory reset)\u00a0<\/strong>in the rare case you need to revert\/restore apps.<\/p>\n<p>Use this\/these command(s) during step 7 under\u00a0<strong>Uninstalling Adups via ADB command line\u00a0<\/strong>to remove:<\/p>\n<p><em>adb shell pm uninstall -k &#8211;user 0 com.mi.android.globalpersonalassistant<br \/> adb shell pm uninstall -k &#8211;user 0\u00a0com.android.providers.downloads.ui<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"27581\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/03\/awaking-the-beast-adware-batmobi\/attachment\/3-37\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/3.png\" data-orig-size=\"717,869\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"3\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/3-248x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/3-495x600.png\" class=\"aligncenter size-medium wp-image-27581\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/3-248x300.png\" alt=\"\" width=\"248\" height=\"300\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/3-248x300.png 248w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/3-495x600.png 495w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/3.png 717w\" sizes=\"auto, (max-width: 248px) 100vw, 248px\" \/><\/p>\n<h4>Still unknowns<\/h4>\n<p>Even after finding two dominant sources of the Batmobi infection, there are still cases left unsolved. You see, as suddenly as the ads appeared, they abruptly stopped in early March.\u00a0 Without active cases to see if removing apps will remediate or not, finding these deeply hidden BatMobi variants has become nearly impossible. I\u2019m confident that there are versions still on Google Play, but finding them now is searching for a needle in millions of haystacks.<\/p>\n<h3>The scary reality of Ad SDKs<\/h3>\n<p>Technically, since these hidden BatMobi variants no longer trigger ads inappropriately, they are no longer considered adware. I suppose that&#8217;s the good news. My assumption is that BatMobi made a change on their servers without warning, thus triggering the ads in January. But we don&#8217;t know why there was an abrupt stop in March. What happened? Maybe an overwhelming amount of complaints to BatMobi caused a change of heart?<\/p>\n<p>This all leaves us with an uneasy feeling about Ad SDKs. It highlights their power to switch from clean and safe to adware overnight. It&#8217;s a scary reality to have code lay dormant in legitimate apps that can turn malicious so quickly. I reiterate that yes, these website redirects were to relatively safe sites, but the potential for worse is present.<\/p>\n<h3>Developers beware<\/h3>\n<p>The last thing a developer wants is for their app to be on an anti-malware scanner&#8217;s adware list without warning. In the past, we have seen ad companies clearly move from legitimate to serving adware, becoming overly aggressive with data collection and\/or aggressively pushing ad content, as in the case above. However, in those cases it was easy to make a clear cut distinction of the cause of infection. This time, its much more unclear which components were causing the issue, and so much is still left unknown.<\/p>\n<p>Unfortunately, finding an Ad SDK that developers can trust is an ongoing challenge. All we can say is do your research and choose wisely. If an Ad SDK has any variants that are considered adware, as with BatMobi, it\u2019s a wise decision to stay clear.<\/p>\n<p>Stay safe out there!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/03\/awaking-the-beast-adware-batmobi\/\">Awakening the beast: BatMobi adware<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/03\/awaking-the-beast-adware-batmobi\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Nathan| Date: Fri, 29 Mar 2019 15:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/03\/awaking-the-beast-adware-batmobi\/' title='Awakening the beast: BatMobi adware'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/Featured_BatMobi.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>BatMobi is an Advertisement Software Developer Kit (Ad SDK) that was once clean and safe to use, but suddenly began serving adware in January. Learn more about this elusive threat, including how to clean it off pre-installed apps on mobile devices.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/mobile\/\" rel=\"category tag\">Mobile<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/adware\/\" rel=\"tag\">adware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/android\/\" rel=\"tag\">Android<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/batmobi\/\" rel=\"tag\">BatMobi<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mobile\/\" rel=\"tag\">Mobile<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mobile-adware\/\" rel=\"tag\">mobile adware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/website-redirects\/\" rel=\"tag\">website redirects<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/03\/awaking-the-beast-adware-batmobi\/' title='Awakening the beast: BatMobi adware'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/03\/awaking-the-beast-adware-batmobi\/\">Awakening the beast: BatMobi adware<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10468,10462,21410,4503,10554,15870,21411],"class_list":["post-14963","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-adware","tag-android","tag-batmobi","tag-cybercrime","tag-mobile","tag-mobile-adware","tag-website-redirects"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14963","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14963"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14963\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14963"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14963"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14963"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}