Google has tried to eliminate malicious apps from its Android platform on the Google Play Store, but certain apps slide by Google’s security team, like Fleeceware. Fleeceware is a malicious application that tricks users into paying excessive amounts of money for simple apps with functionality that’s available free elsewhere. These apps have been installed nearly 600 million times on over 100 million devices, according to a Sophos report.
Fleeceware is successful on the Google Play Store (rather than the Apple App Store) because it takes advantage of a business model widely used in the ecosystem, allowing users to download and use apps for a short trial period without paying. However, when the trial expires, if the user who installs one of these apps hasn’t both uninstalled the application and informed the app developer that they’re through with the app, the app developer charges the user. This model is similar to “free trial” offers, putting the responsibility of canceling the services on the user.
These apps pose a number of annoyances for those getting “fleeced,” researchers said. Not only do they get charged exorbitant amounts of money with very little reward, “there’s little recourse” if they want a refund after realizing they’ve been charged because Google Play Store policies are “significantly less consumer-friendly” than ones from typical U.S. credit-card companies, they said.
The Android application, Color Message, has been found to house the “Joker” malware. Joker malware is a persistent threat that’s been around since 2017, hiding itself within legitimate-seeming, common application types like games, messengers, photo editors, translators, and wallpapers, many of them aimed at children. But once installed, Joker apps subscribe victims to unwanted, paid premium services controlled by the attackers, a type of billing fraud that researchers categorize as “fleeceware.” Oftentimes the victim doesn’t realize they’re being charged until the phone bill arrives.
In the worst cases, Fleeceware apps (that contain malware) exfiltrate contact lists, device information, and can hide their icons from the home screen. This happens to be the case with the previous ‘Color Message’ attack, where the application appeared to be making connections to Russian servers.
Malicious Joker apps are commonly found outside of the official Google Play store, but they’ve continued to skirt Google Play’s protections. One of the ways Joker does this is through lightweight development and constant code changes. The most recent version of the malware also takes advantage of a legitimate developer tool called Flutter to evade both device-based security and app-store protections. Flutter is an open-source app development kit designed by Google that allows developers to craft unique apps for mobile, web, and desktop from a single codebase. The use of Flutter to code mobile applications is a common approach and one that traditional scanners see as harmless.
“Due to the commonality of Flutter, even malicious application code will look legitimate and clean, whereas many scanners are looking for disjointed code with errors or improper assemblies,” explained Zimperium researchers in an analysis published in July.
First, if you have an Android and own ‘Color Message’, delete the app immediately and follow the instructions below to cancel your subscription to avoid becoming a victim of fraud. Users can also check for other applications they may be subscribed to, by following these instructions for Google or Apple accounts:
It’s important to always be sure you’re installing a safe application on your devices. Always check reviews, the country of origin of the application, and the reputation of the developers. Additionally, these recommendations below will help you and your business stay secure with the various threats you may face on a day-to-day basis:
Most of these recommendations are built into CyberHoot. With CyberHoot you can govern, train, assess, and test your employees. Visit CyberHoot.com and sign up for our services today. At the very least continue to learn by enrolling in our monthly Cybersecurity newsletters to stay on top of current cybersecurity updates.
Sources:
Malicious Joker App Scores Half-Million Downloads on Google Play – ThreatPost
‘Fleeceware’ Apps Downloaded 600M Times from Google Play – ThreatPost
Additional Reading:
Hacker Lexicon: What Is Fleeceware, and How Can You Protect Yourself?
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...
Read moreA recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.