{"id":11465,"date":"2018-02-13T09:10:23","date_gmt":"2018-02-13T17:10:23","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/02\/13\/news-5236\/"},"modified":"2018-02-13T09:10:23","modified_gmt":"2018-02-13T17:10:23","slug":"news-5236","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/02\/13\/news-5236\/","title":{"rendered":"Kotlin-based malicious apps penetrate Google market"},"content":{"rendered":"<p><strong>Credit to Author: Gleb Malygin| Date: Tue, 13 Feb 2018 16:00:00 +0000<\/strong><\/p>\n<p>An open-source programming language, <a href=\"https:\/\/kotlinlang.org\/\" target=\"_blank\" rel=\"noopener\">Kotlin<\/a> is a fully-supported official programming language for Android. Google boasts that Kotlin contains safety features in order to make apps &#8220;healthy by default.&#8221; Many apps are already built with Kotlin,\u00a0from the hottest startups to Fortune 500 companies. (Twitter, Uber, Pinterest)<\/p>\n<p>Concise while being expressive, Kotlin reduces the amount of boilerplate code needed to create an app\u2014which makes it much safer.\u00a0However, as revealed by Trend Micro researchers, the first samples of Android malware\u00a0created using <a href=\"https:\/\/kotlinlang.org\/\" target=\"_blank\" rel=\"noopener\">Kotlin<\/a>\u00a0were found on Google Play. Introducing: Swift Cleaner, a utility tool built with Kotlin that claims to clean and optimize Android devices.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-21098 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/kotlin_pic_1.png\" alt=\"\" width=\"219\" height=\"339\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/kotlin_pic_1.png 706w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/kotlin_pic_1-194x300.png 194w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/kotlin_pic_1-388x600.png 388w\" sizes=\"auto, (max-width: 219px) 100vw, 219px\" \/><\/p>\n<p>This malicious app is capable of remote command execution, can steal personal information, carry out <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/click-fraud\/\" target=\"_blank\" rel=\"noopener\">click fraud<\/a>, and sign users up to premium SMS subscription services without their permission. So much for safe.<\/p>\n<h3 class=\"r\">Analyze this<\/h3>\n<p>Subsequently, after launching Swift Cleaner, the first thing the malware does is call\u00a0<em>PspManager.initSDK, <\/em>check the phone number, and send an SMS message to the particular number that is given by the C&amp;C server. The app initiates this to check for a SIM card presence and if mobile carrier services are available.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-21261\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/Screen-Shot-2018-01-17-at-13.38.29_1-600x27.png\" alt=\"\" width=\"600\" height=\"27\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/Screen-Shot-2018-01-17-at-13.38.29_1-600x27.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/Screen-Shot-2018-01-17-at-13.38.29_1-300x14.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/Screen-Shot-2018-01-17-at-13.38.29_1.png 819w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Upon server interaction, the malicious part of the app launches URL forwarding and click fraud activities.\u00a0Click fraud is an illegal practice that occurs when individuals click on a website&#8217;s advertisements (either banner ads or paid text links) to increase the payable number of clicks to the advertiser. In our case, the app clicks on a URL, which leads you to a survey. At the end of the survey, you are given an opportunity to get some free services if you click on the claim link. By clicking the button, you will then be redirected to another possibly malicious website.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-21262\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/Untitled.png\" alt=\"\" width=\"1000\" height=\"53\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/Untitled.png 1387w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/Untitled-300x16.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/Untitled-600x32.png 600w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/p>\n<p>Meanwhile, Swift Cleaner collects personal information from the infected mobile device, such as the International Mobile Equipment Identity (IMEI), International Mobile Subscriber Identity (IMSI), and information about the SIM card. The stolen information is then encrypted and sent to the remote Command and Control (C&amp;C) server.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-21247 size-full\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/kotlin_pic_2_1-1.png\" alt=\"\" width=\"1023\" height=\"460\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/kotlin_pic_2_1-1.png 1023w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/kotlin_pic_2_1-1-300x135.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/kotlin_pic_2_1-1-600x270.png 600w\" sizes=\"auto, (max-width: 1023px) 100vw, 1023px\" \/><\/p>\n<p>There are services that run in the background in order to communicate with a C&amp;C server. Swift Cleaner compromises one of these services: the Wireless Application Protocol (WAP).\u00a0WAP is a technical standard for accessing information over a mobile wireless network.<\/p>\n<p>The app is using WAP in conjunction with JavaScript in order to bolt on <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2015\/02\/logging-in-and-captcha\/\" target=\"_blank\" rel=\"noopener\">CAPTCHA<\/a> bypass functionality, using mobile data and analyzing the image base64 code. CAPTCHA images are parsed and cracked, and the image data will later be uploaded to the C&amp;C server. This data is needed to train the\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Artificial_neural_network\" target=\"_blank\" rel=\"noopener\">neural network.<\/a>\u00a0Later on, all the image samples will be useful for finding the best match for each character of the new upcoming CAPTCHA.<\/p>\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-21206 size-full\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/Screen-Shot-2018-01-17-at-16.08.34.png\" alt=\"\" width=\"1137\" height=\"106\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/Screen-Shot-2018-01-17-at-16.08.34.png 1137w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/Screen-Shot-2018-01-17-at-16.08.34-300x28.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/Screen-Shot-2018-01-17-at-16.08.34-600x56.png 600w\" sizes=\"auto, (max-width: 1137px) 100vw, 1137px\" \/><\/h3>\n<h3>Premium SMS service<\/h3>\n<p>The Swift Cleaner malware also uploads information about the user\u2019s service provider\u00a0along with login information and similar sensitive data to the C&amp;C server. This can automatically sign users up for a premium SMS service, which will cost money.<\/p>\n<p style=\"padding-left: 30px\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-21207 size-full\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/Screen-Shot-2018-01-17-at-16.07.54.png\" alt=\"\" width=\"1266\" height=\"102\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/Screen-Shot-2018-01-17-at-16.07.54.png 1266w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/Screen-Shot-2018-01-17-at-16.07.54-300x24.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/Screen-Shot-2018-01-17-at-16.07.54-600x48.png 600w\" sizes=\"auto, (max-width: 1266px) 100vw, 1266px\" \/><\/p>\n<p style=\"padding-left: 30px\">Premium rate SMS is a way of mobile billing where user pays for a premium service by either receiving or sending a message. There are two ways this billing service works:<\/p>\n<ol>\n<li>Mobile Originated (MO): where the mobile user pays to send a message (used for once-off services, such as competitions)<\/li>\n<li>Mobile Terminated (MT): where the mobile user pays to receive a message (used for subscription services)<\/li>\n<\/ol>\n<p>Our example app uses the premium SMS MO service, and redirects users to webpages where they can select to send a message.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-21266\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/Screen-Shot-2018-01-17-at-13.38.28_1.png\" alt=\"\" width=\"800\" height=\"186\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/Screen-Shot-2018-01-17-at-13.38.28_1.png 1700w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/Screen-Shot-2018-01-17-at-13.38.28_1-300x70.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/Screen-Shot-2018-01-17-at-13.38.28_1-600x139.png 600w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<h3>Neverending story<\/h3>\n<p>As of now, Google has removed the fake Swift Cleaner apps carrying this new malware from the Play Store. However, even if Google states that their protection is on a high level, there appears to be no fail-proof way to stop malware from entering the Play store. By using a quality mobile anti-malware scanner as second layer of protection, you can stay safe even when Google Play Protect fails. We (as always) recommend <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=org.malwarebytes.antimalware\" target=\"_blank\" rel=\"noopener\">Malwarebytes for Android<\/a>. Stay safe out there!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/mobile\/2018\/02\/mobile-menace-monday-first-kotlin-developed-malicious-app\/\">Kotlin-based malicious apps penetrate Google market<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/mobile\/2018\/02\/mobile-menace-monday-first-kotlin-developed-malicious-app\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Gleb Malygin| Date: Tue, 13 Feb 2018 16:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/mobile\/2018\/02\/mobile-menace-monday-first-kotlin-developed-malicious-app\/' title='Kotlin-based malicious apps penetrate Google market'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/shutterstock_732616711.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>New malicious apps appear in Google Play abusing Kotlin, the &#8220;safest&#8221; official programming language for the Android.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/malware\/\" rel=\"category tag\">Malware<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/mobile\/\" rel=\"category tag\">Mobile<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/android\/\" rel=\"tag\">Android<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/google-play\/\" rel=\"tag\">Google Play<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/kotlin\/\" rel=\"tag\">kotlin<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware\/\" rel=\"tag\">malware<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/mobile\/2018\/02\/mobile-menace-monday-first-kotlin-developed-malicious-app\/' title='Kotlin-based malicious apps penetrate Google market'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/mobile\/2018\/02\/mobile-menace-monday-first-kotlin-developed-malicious-app\/\">Kotlin-based malicious apps penetrate Google market<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10462,4503,11268,17502,3764,10554],"class_list":["post-11465","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-android","tag-cybercrime","tag-google-play","tag-kotlin","tag-malware","tag-mobile"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11465","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11465"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11465\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11465"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11465"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}