Smartphone shopaholic - harlan4096 - 10 January 20
Quote:
Have you ever noticed strange reviews of Google Play apps that look totally out of place? Their creators might give it five stars, while dozens of users rate it with just one, and in some cases the reviews seem to be talking about some other program entirely.
If so, you may be unknowingly acquainted with the work of Trojan-Dropper.AndroidOS.Shopper.a.
How Shopper.a works
Cybercriminals use Trojan-Dropper.AndroidOS.Shopper.a to boost certain app’s rating and increase the number of installations and registrations. All this can be used, among other things, to dupe advertisers. What’s more, the Trojan can display advertising messages on the infected device, create shortcuts to ad sites, and perform other actions.
Back to the suspicious reviews, Trojan-Dropper.AndroidOS.Shopper.a. can open Google Play (or another app store), install several programs, and write fake user reviews of them. To make user not notice anything untoward, the installation window is concealed by the app’s “invisible” window. The lack of installation rights from third-party sources is no obstacle to the Trojan — it gives itself the requisite permissions through AccessibilityService. This service is intended by Google to facilitate the use of smartphones for people with disabilities, but in the hands of cybercriminals it poses a serious threat to device owners. With permission to use it, the malware has almost limitless possibilities for interacting with the system interface and apps. For instance, it can intercept data displayed on the screen, click buttons, and emulate user gestures.
Masked as a system app, the malware misleads the user by using the system icon and the name ConfigAPKs. Our eye was caught by the app’s heavy obfuscation and suspicious use of AccessibilityService.
Trojan-Dropper.AndroidOS.Shopper.a was most widespread in Russia, where the largest share of infected users (28.46%) was recorded in October – November 2019. Second place went to Brazil (18.70%) and third to India (14.23%).
Technical details
At startup, after the screen is unlocked, the app decrypts and downloads the payload.
Then the Trojan collects information about victim’s device (country, network type, vendor, smartphone model, email address, IMEI, IMSI), and forwards it to the cybercriminal server at:
http://api.adsnative123[.]com/search.php?sid=1001&sdk_v=A1.5.0&geo=PK&network=WIFI&time=1567059364545&lang=en&udid=dc9c9a616665e073&unkown=true&pname=com.cleaner.qefey.kslr&size=800_561&osv=4.4.2&gaid=6fa818cc-7a9d-4e4d-a6c9-69179c3c2490&anum=8&s_udid=&native=2&key=…
In response, it receives a set of commands...
Depending on the commands, Shopper.a can:
* Open links received from the remote server in an invisible window (whereby the malware verifies that the user is connected to a mobile network).
* After a certain number of screen unlocks, hide itself from the apps menu.
* Check the availability of AccessibilityService rights and, if not granted, periodically issue a phishing request to the user to provide them.
* Disable Google Play Protect.
* Create shortcuts to advertised sites in the apps menu.
* Download apps from the third-party “market” Apkpure[.]com and install them.
* Open advertised apps on Google Play and “click” to install them.
* Replace shortcuts to installed apps with shortcuts to advertised sites.
* Post fake reviews supposedly from the Google Play user.
* Show ads when the screen is unlocked.
* Register users through their Google or Facebook accounts in the following apps:
...
Continue Reading
|