100,000 Chinese Android users owned by trojan

Powered by SC Magazine
 

Downloads movies, buys apps and captures CAPTCHA.

One hundred thousand Chinese Android users have been infected with a trojan that is circulating over at least nine app stores.

Researchers found the trojan was capable of downloading paid apps from China Mobile’s Android app store and place phone calls, leading to exorbitant bills.

The trojan was able to exploit the store’s payments workflow to buy apps without alerting users.

It first changed the victim’s Access Point Name to CMWAP to bypass the need to login to the store, which was prompted from other APNs. It then simulated the target clicking on a paid app.

A purchase verification token sent from China Mobile to the victim was intercepted and entered into a prompt within the store, confirming the payment.

TrustGo Security Labs, which discovered the malware, said it could also purchase videos.

Any CAPTCHA image challenges prompted during the attack were uploaded to a remote server for manual verification.

The trojan was identified hidden within packages:

  • com.mediawoz.goweather
  • com.mediawoz.gotq
  • com.mediawoz.gotq1
  • cn.itkt.travelskygo
  • cn.itkt.travelsky
  • com.funinhand.weibo
  • sina.mobile.tianqitong
  • com.estrongs.android.pop

TrustGo posted the malcode used to hijack the payments process.

Copyright © SC Magazine, Australia


100,000 Chinese Android users owned by trojan
 
 
 
Top Stories
Matching databases to Linux distros
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
Who'd have picked a BlackBerry for the Internet of Things?
[Blog] BlackBerry has a more secure future in the physical world.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 704

Vote