#BlackHat: Researchers upload dangerous app to Google Play store

Powered by SC Magazine
 

Google's Bouncer beat by legit JavaScript trick.

View larger image View larger image View larger image

See all pictures here »

Two researchers demonstrated how they were able to push a malicious information-stealing app onto Google Play, even while Google's Bouncer custom malware scanner is watching.

They circumvented the Bouncer automated scanner with a JavaScript trick that transformed a benign Android app into a malicious one on Google Play.

Black Hat 2012 coverage

Nicholas Percoco and Sean Schulte of Trustwave Spider Labs developed a benevolent app called “SMS Bloxer,” which looked like other SMS blocker apps on the market.

In order to ensure regular users didn't accidentally download the app, Trustwave also priced it at $49.95, in stark contrast to similar apps, which were usually $2 or less, or free.

SMS Bloxer lived on Google Play for two weeks and didn't get flagged by Bouncer for that entire period of time. At its worst, the app was capable of  stealing contacts, SMS messages, and photos.

It could harvest information about the device or force a web page to load, the researchers said. It could also launch a denial-of-service attack.

“Google never flagged it,” Percoco said.

The internet giant, recognising that malicious applications were becoming a growing problem, introduced Bouncer in February.

Google must have realized reacting was a losing battle and some kind of app review was needed, hence Bouncer, Schulte said. There wasn't a lot of information available publicly about the technology or how it worked, which piqued Trustwave's curiosity, Percoco said.

“We wanted to test the bounds of what it's capable of," Percoco said.

The team created a benign app that just reported back to Trustwave whenever it was executed, and made it past Bouncer and onto Google Play. The team had determined Bouncer's IP address by this time, and modified the test app to act maliciously only if it was executed outside Bouncer. 

To avoid detection, the team used  the JavaScript bridge, a “legitimate” workaround supported by Android, Percoco said.

The bridge lets developers remotely add new  features to a program using JavaScript, or changing the look and feel of an app by modifying the HTML, without having to go back through the entire app approval or update process. Facebook and LinkedIn use this method for their apps, Percoco said.

Trustwave used the JavaScript bridge to add increasingly malicious capabilities to the app. Bouncer scanned the app repeatedly, but never noticed the new malicious features. Only when the team tweaked the app to execute every second did Bouncer notice it and suspend the developer account, Percoco said.

Trustwave shared its findings with Google, and Percoco said the company was a “great organization to work with." A Google spokesperson could not be reached for comment by SCMagazine.com.

This article originally appeared at scmagazineus.com

Copyright © SC Magazine, US edition


 
 
 
Top Stories
Parliament passes law to let ASIO tap entire internet
Greens effort to limit devices fails.
 
Business-focused Windows 10 brings back the Start menu
Microsoft skips 9 for the "greatest enterprise platform ever".
 
Feeling Shellshocked?
Stay up to date with patching for the Bash bug.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest articles on BIT Latest Articles from BIT
Constantly rushing to the printer to stop other people seeing your printouts?
Sep 24, 2014
Lexmark's latest family of small-business printers include a feature that lets you stop anyone ...
This 4G smartphone costs $219
Sep 3, 2014
It's possible to spend a lot less on a smartphone if you're prepared to go with a brand you ...
Looking for storage? Seagate has five new small business NAS devices
Aug 22, 2014
Seagate has announced a new portfolio of Networked Attached Storage (NAS) solutions specifically ...
Run a small business in western Sydney?
Aug 15, 2014
This event might be of interest if you're looking to meet other people with a similar interest ...
Buying a tablet? Microsoft's Surface Pro 3 goes on sale this month
Aug 8, 2014
Microsoft has announced its Surface Pro 3 will go on sale in Australia on 28 August from ...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  5%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1384

Vote