Article 51AJM Google Play's Malicious App Problem Infects 1.7 Million More Devices

Google Play's Malicious App Problem Infects 1.7 Million More Devices

by
martyb
from SoylentNews on (#51AJM)

Fnord666 writes:

Google Play, the company's official repository for Android apps, has once again been caught hosting fraudulent and potentially malicious apps, with the discovery of more than 56 apps-many of them for children-that were installed on almost 1.7 million devices.

Tekya is a family of malware that generates fraudulent clicks on ads and banners delivered by agencies including Google's AdMob, AppLovin', Facebook, and Unity. To give the clicks the air of authenticity, the well-obfuscated code causes infected devices to use Android's "MotionEvent" mechanism to imitate legitimate user actions. At the time that researchers from security firm Check Point discovered them, the apps went undetected by VirusTotal and Google Play Protect. Twenty-four of the apps that contained Tekya were marketed to children. Google removed all 56 of the apps after Check Point reported them.

The discovery "highlights once again that the Google Play Store can still host malicious apps," Check Point researchers Israel Wernik, Danil Golubenko, and Aviran Hazum wrote in a post published on Tuesday. "There are nearly 3 million apps available from the store, with hundreds of new apps being uploaded daily-making it difficult to check that every single app is safe. Thus, users cannot rely on Google Play's security measures alone to ensure their devices are protected."

To make the malicious behavior harder to detect, the apps were written in native Android code-typically in the C and C++ programming languages. Android apps usually use Java to implement logic. The interface of that language provides developers with the ease of accessing multiple layers of abstraction. Native code, by contrast, is implemented in a much lower level. While Java can easily be decompiled-a process that converts binaries back into human-readable source code-it's much harder to do this with native code.

Source: ArsTechnica

Original Submission

Read more of this story at SoylentNews.

External Content
Source RSS or Atom Feed
Feed Location https://soylentnews.org/index.rss
Feed Title SoylentNews
Feed Link https://soylentnews.org/
Feed Copyright Copyright 2014, SoylentNews
Reply 0 comments