{"id":10361,"date":"2017-11-08T10:10:19","date_gmt":"2017-11-08T18:10:19","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/11\/08\/news-4134\/"},"modified":"2017-11-08T10:10:19","modified_gmt":"2017-11-08T18:10:19","slug":"news-4134","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/11\/08\/news-4134\/","title":{"rendered":"Phony WhatsApp used Unicode to slip under Google&#8217;s radar"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Wed, 08 Nov 2017 17:13:12 +0000<\/strong><\/p>\n<p>After <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/10\/more-trouble-in-google-play-land\/\" target=\"_blank\" rel=\"noopener\">a troubling week for Google<\/a> not so long ago, the company is under the spotlight once more for missing another app that, <a href=\"https:\/\/www.reddit.com\/r\/Android\/comments\/7ahujw\/psa_two_different_developers_under_the_same_name\/\" target=\"_blank\" rel=\"noopener\">after further investigations by several members of Reddit<\/a>, was found laden with adware.<\/p>\n<p>This app, which was called &#8220;Update WhatsApp Messenger,&#8221; used the logo and\u00a0developer name\u00a0of the\u00a0real\u00a0WhatsApp app\u2014two elements that a user familiar with the app expects to see. However, the developer name for this bogus app had an extra space at the end, so it looked like this:<\/p>\n<p style=\"text-align: center\"><code>WhatsApp, Inc.<em>{space}<\/em><\/code><\/p>\n<p>To\u00a0aid users in realizing this deception, Redditor Megared17 posted <a href=\"https:\/\/www.reddit.com\/r\/Android\/comments\/7ahujw\/psa_two_different_developers_under_the_same_name\/dpa43l7\/\" target=\"_blank\" rel=\"noopener\">snapshots<\/a> of a code section belonging to the real WhatsApp and the fake app to compare the two. We have reproduced\u00a0the shots below for your convenience.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20429 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/script-comparison.png\" alt=\"\" width=\"522\" height=\"308\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/script-comparison.png 522w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/script-comparison-300x177.png 300w\" sizes=\"auto, (max-width: 522px) 100vw, 522px\" \/><\/p>\n<p>That bit in the box is the percent coding equivalent of a blank space, which translates to U+00A0, the Unicode value of a\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Non-breaking_space\" target=\"_blank\" rel=\"noopener\">no-break space<\/a>. Although this is something our normal eyes may have a difficult time spotting, many decried that Google&#8217;s scanner should have quickly picked this up.<\/p>\n<hr \/>\n<p style=\"text-align: center\"><em>Read: <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/10\/out-of-character-homograph-attacks-explained\/\" target=\"_blank\" rel=\"noopener\">Out of character: Homograph attacks explained<\/a><\/em><\/p>\n<hr \/>\n<p>Once downloaded and installed,\u00a0Redditor Dextersgenius <a href=\"https:\/\/www.reddit.com\/r\/Android\/comments\/7ahujw\/psa_two_different_developers_under_the_same_name\/dpa4ste\/\" target=\"_blank\" rel=\"noopener\">pointed out<\/a> that &#8220;Update WhatsApp Messenger&#8221; hid from users by &#8220;not having a title and having a blank icon,&#8221; which he then supplemented with screenshots that we also reproduced below.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20430 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/app-app.png\" alt=\"\" width=\"800\" height=\"436\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/app-app.png 800w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/app-app-300x164.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/app-app-600x327.png 600w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>From Dextersgenius&#8217;s testing, they also pointed to a <a href=\"https:\/\/i.imgur.com\/fECrjn3.png\" target=\"_blank\" rel=\"noopener\" data-rel=\"lightbox-0\" title=\"\">piece of code<\/a> that indicated this bogus app appears to access a hardcoded\u00a0<em>bit.ly<\/em> shortened URL that presumably\u00a0downloads an update APK named <em>whatsapp.apk.<\/em>\u00a0Upon closer inspection, however, the <em>bit.ly<\/em> URL led to another shortened URL\u2014this time Google&#8217;s URL shortener, <em>goo.gl<\/em>\u2014that then led to a Google search result for a WhatsApp Messenger APK file.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20431 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/shortlong.png\" alt=\"\" width=\"900\" height=\"850\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/shortlong.png 900w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/shortlong-300x283.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/shortlong-600x567.png 600w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/p>\n<p>Essentially, users are told to &#8220;Look for the APK file from these search results. It&#8217;s got to be in one of them!&#8221; No updates are sent to the phones at all, so they&#8217;re just left with a PUP\u00a0app.<\/p>\n<p>&#8220;Users need to be more vigilant,&#8221; advised Armando Orozco, Lead for the Mobile Protection Team at Malwarebytes. &#8220;If they want to update WhatsApp, they need to use the update mechanism in the Play Store app, not a secondary app.&#8221;<\/p>\n<p>Apart from reading app reviews for any reports of questionable behavior, it also pays for users to check the link to the developer of the app, which might have helped catch\u00a0&#8220;Update WhatsApp Messenger&#8221; and possibly lessen the number of affected devices.<\/p>\n<p>Stay safe!<\/p>\n<p>Other related post(s):<\/p>\n<ul>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2016\/11\/fake-whatsapp-email-comes-as-a-billing-alert\/\" target=\"_blank\" rel=\"noopener\">Fake WhatsApp email comes as a billing alert<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2014\/02\/whatsapp-hack-promises-messages-delivers-pups\/\" target=\"_blank\" rel=\"noopener\">WhatsApp hack promises messages, delivers PUPs<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2014\/02\/whatsapp-spam-campaign-leads-to-malware\/\" target=\"_blank\" rel=\"noopener\">WhatsApp spam campaign leads to malware<\/a><\/li>\n<\/ul>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2017\/11\/phoney-whatsapp-used-unicode-to-slip-under-googles-radar\/\">Phony WhatsApp used Unicode to slip under Google&#8217;s radar<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2017\/11\/phoney-whatsapp-used-unicode-to-slip-under-googles-radar\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Wed, 08 Nov 2017 17:13:12 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2017\/11\/phoney-whatsapp-used-unicode-to-slip-under-googles-radar\/' title='Phony WhatsApp used Unicode to slip under Google's radar'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/pexels-photo-46924.jpeg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>After a troubling week for Google not so long ago, the company is under the spotlight once more for missing a phony Whatsapp that, after further investigation by several members of Reddit, was found laden with adware.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/social-engineering-cybercrime\/\" rel=\"category tag\">Social engineering<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/adware\/\" rel=\"tag\">adware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/app-store\/\" rel=\"tag\">App Store<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/fake-whatsapp\/\" rel=\"tag\">fake whatsapp<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/google-play\/\" rel=\"tag\">Google Play<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/social-media\/\" rel=\"tag\">social media<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/unicode\/\" rel=\"tag\">unicode<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/whatsapp\/\" rel=\"tag\">whatsapp<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2017\/11\/phoney-whatsapp-used-unicode-to-slip-under-googles-radar\/' title='Phony WhatsApp used Unicode to slip under Google's radar'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2017\/11\/phoney-whatsapp-used-unicode-to-slip-under-googles-radar\/\">Phony WhatsApp used Unicode to slip under Google&#8217;s radar<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10468,16484,10464,11268,10497,10510,1932,16485,10440],"class_list":["post-10361","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-adware","tag-app-store","tag-fake-whatsapp","tag-google-play","tag-security-world","tag-social-engineering","tag-social-media","tag-unicode","tag-whatsapp"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10361","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10361"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10361\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10361"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10361"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10361"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}