Android Malware Being Delivered Via Ad Networks

  /     /     /  
Publicated : 22/11/2024   Category : security


Android Malware Being Delivered Via Ad Networks


Attackers are using mobile ad network software installed on smartphones to push malicious JavaScript and take control of devices.



Beware active attacks that are using mobile advertising networks to deliver malware thats able to fully compromise Android devices.
So warned researchers at next-generation firewall vendor Palo Alto, who said theyve discovered a series of attacks that have been serving up malicious code by hacking into an ad networks software development kit (SDK). Developers add these SDKs to their Android apps to tie into mobile advertising networks and earn referral fees.
The malware recovered by Palo Alto compromises an Androids SMS capabilities, allowing attackers to send and receive SMS messages without the users knowledge. Attackers have used that functionality to sign people up for
premium SMS services
that drain subscribers accounts and enrich the service operators -- typically the attackers themselves or their business partners. The SMS communications channel also gives attackers basic command-and-control functionality, meaning they could use compromised devices as part of a bigger Android botnet.
[ Google Play can be a tough neighborhood. Read
Google Play: Beware Android Adware Infestation
. ]
The Android mobile ad network attacks are unusual because the majority of online attacks today either target browser vulnerabilities as a stepping stone to installing malware or rely on phishing attacks and tricking users into executing malicious attachments. But by targeting an ad-network SDK, hackers can enjoy direct access to the device. Thats kind of a built-in backdoor into the application, and when a mobile ad network starts serving bad content, it shifts to become a botnet that is suddenly serving malicious content, explained Wade Williamson, a senior security analyst at Palo Alto, speaking by phone. But the difference is theres no exploit needed, no bait and switch needed, because you already have this hook built into the application.
The threat mirrors the use of
ad networks to create browser-based botnets
. That vulnerability was detailed earlier this month at the Black Hat information security conference in Las Vegas by WhiteHat Security CTO Jeremiah Grossman, and Matt Johansen, who manages the firms threat research center. The pair demonstrated how a would-be attacker could create a fake online advertisement with malicious JavaScript embedded, which would allow them to connect hundreds or thousands of PCs at once to a targeted website, thus creating a denial of service.
But the threat discovered by Palo Alto differs in two significant ways: First, attackers dont need to place a fake advertisement. Instead, they can simply hack into an advertising network, and thats assuming its not a network that they -- or their business partners -- dont already control. Second, Palo Altos researchers werent theorizing. To date, theyve seen seven infections, all in Asia, that have resulted from hacking into mobile advertising networks. The company, which builds Android APK file security check software, said none of the malware it recovered was recognized as such by
Android antivirus scanners
.
The ad-network-delivered malware recovered by Palo Alto is stealthy and doesnt attempt to trick a user into installing it immediately. The malware itself was smart enough so that once it was delivered through the ad network, it wouldnt pop up and say, User, do you want to install me? said Williamson. It would just sit there and run in current memory, and it could do that, because think of how rarely we do a hard reset on our phones.
How can attackers who inject malicious code directly into Android devices via ad-network SDKs be stopped? One approach would be to
sandbox all Android (APK) files
so they cant touch other apps or unapproved device functionality. Another remedy might be to have Google not only vouch for the health of an app, as it does when
offering them via Google Play
, but instead maintain health checks for any advertising networks that the app touches.
In other words, Google could provide an approved ecosystem seal, said Williamson. The challenge, I think, is that almost no one who buys mobile apps understands how that app relies on the ad network for its financial security, he said. So its going to require some user education into why an approved ad network matters.
Unfortunately, not all mobile ad networks can be trusted. In April, for example, Marc Rogers, principal security researcher at Lookout Mobile Security, reported finding BadNews, which masquerades as an innocent, if somewhat aggressive advertising network, according to a
blog
he posted at the time. All told, Lookout found 32 different apps from four different developer accounts that included the BadNews SDK and were available for download from Google Play.
This is one of the first times that weve seen a malicious distribution network clearly posing as an ad network, Rogers said at the time. Because its challenging to get malicious bad code into Google play, the authors of BadNews created a malicious advertising network as a front that would push malware out to infected devices at a later date in order to pass the app scrutiny.

Last News

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Android Malware Being Delivered Via Ad Networks