Google introduced Bouncer to limit malware in their marketplace but someone found a new whole in the system which passes the Bouncer app. Hit the jump to see which app could infect your phone.
+TatWZA
X
Shotta Dru on Google+
Even though Google recently introduced a malware-blocking system called Bouncer to keep the Android Market safe from malicious software, crafty spammers and fraudsters are still managing to find ways around the restrictions to get their software onto users’ phones. The latest example? A malware program disguised, innocuously, as an Android app called “any_name.apk.†And it appears the malware is using Facebook’s app on Android phones in order to spread.
The software was discovered by security firm Sophos, which came across the malware after receiving a Facebook friend request. When checking out the user’s profile, the researcher, Vanja Svajcer, found a link posted to the requester’s Facebook profile page that, when clicked, directed the browser to a webpage which started an automatic download of an unknown software application to the device.
The software installed and downloaded immediately, without any request for authorization or input from the end user. However, although Svajcer doesn’t mention this in his analysis, for software to automatically install from outside the Google Android Market, the phone’s default settings must have been changed. Typically, Android phones are shipped with a setting switched on that prevents mobile apps from installing from sources besides the official Android Market. Many savvy Android users switch this setting off, though, because they enjoy the freedom that Android provides in discovering apps from alternative app stores and download locations – like the treasure trove that is the XDA Developers forum, for example.
Unfortunately, malware like this is the nasty side effect. And there’s nothing Bouncer can do about it. The link the researcher clicked did not appear to be an APK file by nature of its URL, just a typical website. And it was placed into the user’s About Me section on Facebook, as if it was a link to that person’s homepage.
Of course, many folks would simply ignore a friend request from someone they didn’t know, but curiosity often gets the better of us. (Do I know them? Did we meet at some point, and I forgot?) One errant click, and oops, you’re infected.
In this particular case, the malware in question appears to be a program designed to earn money for fraudsters through premium rate phone services, a scam popular outside the U.S. for the most part, which involves having unsuspecting users send out text messages to premium rate numbers (those that charge). The scammers, who are operating the numbers, end up collecting the money from the victims’ accounts.
The app attempts to associate itself with the Opera browser, and an encrypted configuration file contains the dialing codes for all the supported countries where the premium rate numbers are hosted.
As a side note: a few days later, the researcher visited the same URL, but was directed to an all-new website where another APK file was automatically downloaded (hilariously called “allnew.apkâ€). This one was functionally similar, but different on the binary level, indicating it was a new variant of the same malware.
Maybe it’s time for Android’s Bouncer guy to get pre-installed on handsets, too?