Saturday, May 18, 2024

8 Malicious Applications in Google Play Store Infects 50,000 Android Users to Steal Data and Generate Illegitimate Revenue

A new clicker malware found in Google play dubbed Haken aims to gain control over the affected devices and to generate illegitimate profit.

Checkpoint researchers observed the new malware family while looking for another clicker malware BearClod.

The Haken malware is capable of exfiltrating sensitive user data from the infected device and also subscribes to premium services.

Eight such apps caught distributing the malware in the Google play store, altogether downloaded for more than 50,000 times.

Haken Clicker Malware

To perform clicking malware utilizes the native code and injection to Facebook and AdMob libraries while communicating to the server.

The first entry point for the backdoored app is Haken clicker receiver called ‘BaseReceiver’ which seeks permission from the user to make the application run once the device is started.

According to Checkpoint report “the BaseReceiver loads a library kagu-lib which calls a method called ‘startTicks’ which after inspection calls the method ‘clm’ from ‘com/google/android/gms/internal/JHandler.”

This particular class registered two workers and a timer, one worker communicates with the C&C server to download the configuration and process it.

The second worker triggered by the timer, responsible for “injects code into the Ad-related Activity classes of well-known Ad-SDK’s like Google’s AdMob and Facebook”.

By injecting the clicking functionality the attackers able to mimic the user clicks to generate illegitimate revenue.

The affected apps have been reported to Google by Checkpoint and the affected applications removed from Google play.

Following are the apps

Package NameInstallsSha256,000+381620b5fc7c3a2d73e0135c6b4ebd91e117882f804a4794f3a583b3b0c19bc5

Google announced that nearly 600 apps removed from the Google Play Store and banned from ad monetization platforms.

These apps are removed for showing disruptive ads that displayed to users in unexpected ways and for out-of-context ads in which developers serve ads even if the user not active with the application.

Follow us on TwitterLinkedinFacebook for Daily cyber security & hacking news updates.


Latest articles

Norway Recommends Replacing SSLVPN/WebVPN to Stop Cyber Attacks

A very important message from the Norwegian National Cyber Security Centre (NCSC) says that...

New Linux Backdoor Attacking Linux Users Via Installation Packages

Linux is widely used in numerous servers, cloud infrastructure, and Internet of Things devices,...

ViperSoftX Malware Uses Deep Learning Model To Execute Commands

ViperSoftX malware, known for stealing cryptocurrency information, now leverages Tesseract, an open-source OCR engine,...

Santander Data Breach: Hackers Accessed Company Database

Santander has confirmed that there was a major data breach that affected its workers...

U.S. Govt Announces Rewards up to $5 Million for North Korean IT Workers

The U.S. government has offered a prize of up to $5 million for information...

Russian APT Hackers Attacking Critical Infrastructure

Russia leverages a mix of state-backed Advanced Persistent Threat (APT) groups and financially motivated...

Millions Of IoT Devices Vulnerable To Attacks Leads To Full Takeover

Researchers discovered four significant vulnerabilities in the ThroughTek Kalay Platform, which powers 100 million...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Live API Attack Simulation

94% of organizations experience security problems in production APIs, and one in five suffers a data breach. As a result, cyber-attacks on APIs increased from 35% in 2022 to 46% in 2023, and this trend continues to rise.
Key takeaways include:

  • An exploit of OWASP API Top 10 vulnerability
  • A brute force ATO (Account Takeover) attack on API
  • A DDoS attack on an API
  • Positive security model automation to prevent API attacks

Related Articles