{"id":16171,"date":"2019-08-27T06:30:11","date_gmt":"2019-08-27T14:30:11","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/08\/27\/news-9914\/"},"modified":"2019-08-27T06:30:11","modified_gmt":"2019-08-27T14:30:11","slug":"news-9914","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/08\/27\/news-9914\/","title":{"rendered":"Malicious Android app had more than 100 million downloads in Google Play"},"content":{"rendered":"<p><strong>Credit to Author: Kaspersky Team| Date: Tue, 27 Aug 2019 13:33:34 +0000<\/strong><\/p>\n<p>Kaspersky researchers recently found malware in an app called CamScanner, a phone-based PDF creator that includes OCR (optical character recognition) and has more than 100 million downloads in Google Play. Various resources call the app by slightly different names such as CamScanner \u2014 Phone PDF Creator and CamScanner-Scanner to scan PDFs.<\/p>\n<p> <a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/08\/27060958\/camscanner-malicious-android-app-featured.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-28157\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/08\/27060958\/camscanner-malicious-android-app-featured.jpg\" alt=\"\" width=\"1460\" height=\"958\" \/><\/a> <\/p>\n<p>Official app stores such as Google Play are usually considered a safe haven for downloading software. Unfortunately, nothing is 100% safe, and from time to time malware distributors <a href=\"https:\/\/www.kaspersky.com\/blog\/dresscode-android-trojan\/13219\/\" target=\"_blank\" rel=\"noopener noreferrer\">manage to sneak their apps into Google Play<\/a>.<\/p>\n<p>The problem is that even such a powerful company as Google can&#8217;t thoroughly check millions of apps. Keep in mind that most of the apps are updated regularly, so Google Play moderators&#8217; jobs are never done.<\/p>\n<p>CamScanner was actually a legitimate app, with no malicious intensions whatsoever, for quite some time. It used ads for monetization and even allowed in-app purchases. However, at some point, that changed, and recent versions of the app shipped with an advertising library containing a malicious module.<\/p>\n<p> <input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic\" \/> <\/p>\n<p>Kaspersky products detect this module as Trojan-Dropper.AndroidOS.Necro.n, which we have observed in some apps preinstalled on Chinese smartphones. As the name suggests, the module is a <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/trojan-droppers\/\" target=\"_blank\" rel=\"noopener noreferrer\">Trojan Dropper<\/a>. That means the module extracts and runs another malicious module from an encrypted file included in the app&#8217;s resources. This &#8220;dropped&#8221; malware, in turn, is a Trojan Downloader that downloads more malicious modules depending on what its creators are up to at the moment.<\/p>\n<p>For example, an app with this malicious code may show intrusive ads and sign users up for paid subscriptions.<\/p>\n<p>Some users of the CamScanner app have already spotted suspicious behavior and left reviews on the app&#8217;s Google Play page with warnings to avoid the app.<\/p>\n<p>Kaspersky researchers <a href=\"https:\/\/securelist.com\/dropper-in-google-play\/92496\/\" target=\"_blank\" rel=\"noopener noreferrer\">examined a recent version of the app<\/a> and found the malicious module there. We reported our findings to Google, and the app was promptly removed from Google Play.<\/p>\n<p>It looks like app developers got rid of the malicious code with the latest update of CamScanner. Keep in mind, though, that versions of the app vary for different devices, and some of them may still contain malicious code.<\/p>\n<p>What we can learn from this story is that any app \u2014 even one from an official store, even one with a good reputation, and even one with millions of positive reviews and a big, loyal user base \u2014can turn into malware overnight. Every app is just one update away from a major change. To make sure you never find yourself in such trouble, use a <a href=\"https:\/\/app.appsflyer.com\/com.kms.free?pid=smm&#038;c=ww_kdailyplaceholder\" target=\"_blank\">reliable antivirus for Android app<\/a> and scan your smartphone from time to time. (The paid version of <a href=\"https:\/\/app.appsflyer.com\/com.kms.free?pid=smm&#038;c=ww_kdailyplaceholder\" target=\"_blank\">Kaspersky Internet Security for Android<\/a> scans automatically.)<\/p>\n<p> <input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic-2\" \/> <br \/><a href=\"https:\/\/www.kaspersky.com\/blog\/camscanner-malicious-android-app\/28156\/\" target=\"bwo\" >https:\/\/blog.kaspersky.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Kaspersky Team| Date: Tue, 27 Aug 2019 13:33:34 +0000<\/strong><\/p>\n<p>Kaspersky researchers found malware in CamScanner, a text recognition app that was downloaded more than 100 million times from Google Play.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10425,10378],"tags":[10468,10462,8816,22743,11268,32,22744,10438,12269],"class_list":["post-16171","post","type-post","status-publish","format-standard","hentry","category-kaspersky","category-security","tag-adware","tag-android","tag-apps","tag-camscanner","tag-google-play","tag-news","tag-paid-subscriptions","tag-threats","tag-trojans"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16171","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16171"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16171\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16171"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16171"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16171"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}