100,000 Chinese Android users owned by trojan

By
Follow google news

Downloads movies, buys apps and captures CAPTCHA.

One hundred thousand Chinese Android users have been infected with a trojan that is circulating over at least nine app stores.

100,000 Chinese Android users owned by trojan

Researchers found the trojan was capable of downloading paid apps from China Mobile’s Android app store and place phone calls, leading to exorbitant bills.

The trojan was able to exploit the store’s payments workflow to buy apps without alerting users.

It first changed the victim’s Access Point Name to CMWAP to bypass the need to login to the store, which was prompted from other APNs. It then simulated the target clicking on a paid app.

A purchase verification token sent from China Mobile to the victim was intercepted and entered into a prompt within the store, confirming the payment.

TrustGo Security Labs, which discovered the malware, said it could also purchase videos.

Any CAPTCHA image challenges prompted during the attack were uploaded to a remote server for manual verification.

The trojan was identified hidden within packages:

  • com.mediawoz.goweather
  • com.mediawoz.gotq
  • com.mediawoz.gotq1
  • cn.itkt.travelskygo
  • cn.itkt.travelsky
  • com.funinhand.weibo
  • sina.mobile.tianqitong
  • com.estrongs.android.pop

TrustGo posted the malcode used to hijack the payments process.

Got a news tip for our journalists? Share it with us anonymously here.

Copyright © SC Magazine, Australia

Tags:

Most Read Articles

Researchers find critical vulnerabilities in cloud-based password managers

Researchers find critical vulnerabilities in cloud-based password managers

Service NSW launches Digital ID pilot

Service NSW launches Digital ID pilot

Services Australia describes fraud, debt-related machine learning use cases

Services Australia describes fraud, debt-related machine learning use cases

Windows Secure Boot certificates expire in June, Microsoft warns

Windows Secure Boot certificates expire in June, Microsoft warns

Log In

  |  Forgot your password?