One hundred thousand Chinese Android users have been infected with a trojan that is circulating over at least nine app stores.

Researchers found the trojan was capable of downloading paid apps from China Mobile’s Android app store and place phone calls, leading to exorbitant bills.
The trojan was able to exploit the store’s payments workflow to buy apps without alerting users.
It first changed the victim’s Access Point Name to CMWAP to bypass the need to login to the store, which was prompted from other APNs. It then simulated the target clicking on a paid app.
A purchase verification token sent from China Mobile to the victim was intercepted and entered into a prompt within the store, confirming the payment.
TrustGo Security Labs, which discovered the malware, said it could also purchase videos.
Any CAPTCHA image challenges prompted during the attack were uploaded to a remote server for manual verification.
The trojan was identified hidden within packages:
- com.mediawoz.goweather
- com.mediawoz.gotq
- com.mediawoz.gotq1
- cn.itkt.travelskygo
- cn.itkt.travelsky
- com.funinhand.weibo
- sina.mobile.tianqitong
- com.estrongs.android.pop
TrustGo posted the malcode used to hijack the payments process.