Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 2 April, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Parrot Copter and Viking Jump apps hide malware in Google Play

by The Gurus
May 13, 2016
in Editor's News
Share on FacebookShare on Twitter

Thanks to Anna Szalay of SophosLabs for her behind-the-scenes work on this article.
Security researchers at Check Point blogged earlier this week about an Android malware family they dubbed the Viking Horde.
The name comes from one of the apps in the bunch, a game called Viking Jump.
The game looks vaguely interesting at first sight, like an eclectic variant of Flappy Bird with Dark Ages helmets and swords set in America some time before European settlement.
As far as we can tell, however, the game is as good as unplayably useless, and serves merely as a basic visual “cover story” that justifies having an app at all.
Nevertheless, Viking Jump had racked up more than 50,000 downloads by the time Check Point looked at it, only to find that it had a lot more behind its smokescreen of recklessly leaping Scandinavian warriors lost in time.
The app serves as a vehicle for a range of malware components, including the ability to download additional executable code; to reactivate the malware if you try to uninstall the app; and to activate a web proxy (web interceptor) to keep track of and modify your browsing.
Hidden web proxies that can be controlled remotely can be used for a range of crooked activities, from surveillance and data theft to ad-click fraud.
Inside Viking Jump
On decompiling the app, some of the added code modules might pique the interest of security researchers, such as Stephen Ericson’s RootShell component.
Stericson is a well-known developer in the Android ecosystem, perhaps best known for his Busybox port that brings a raft of handy Unix command line tools to your phone.
Developers, Android hackers and other enthusiastic tinkerers probably know Stericson’s name well, but you wouldn’t expect to see RootShell, no matter how handy it might be for an Android rooting enthusiast, in a game of the Viking Jump variety.
That warning sign, however, wasn’t enough to stop this and numerous other apps with similar malicious content getting through security verification and into the Google Play Store.
Other malicious apps included the much cooler looking game Parrot Copter (we admit we haven’t tried it), an app claiming to be a Wi-Fi strength meter, and Memory Booster (that one is supposed to optimise your phone’s RAM, not to train your brain).
The other apps, fortunately, were a bit of a flop for the crooks: they clocked up 1000-5000 installs each on average, with Parrot Copter apparently ending up with in the lowest possible Google Play category, with just 1-5 users.
Cleaning up Google Play
The point is, though, that no matter how unpopular a malicious app might turn out to be, malware isn’t supposed to make it into Google Play in the first place.
Check Point reported the offending files to Google last week (2016-05-05), but SophosLabs found that Viking Jump was still available yesterday (2016-05-10).
Ironically, that was the app with the most credibility, given its installation count.
So, we decided to report it as well, presumably along with other researchers surprised by Google’s slow response after Check Point’s article.
The good news is that Viking Jump has now been removed.
From the rather unfinished look of the app, with some malicious-looking components added to the app but never called, it’s possible that the crooks were more interested in the verification process than in the malware infections that ultimately resulted.
For all we know, they may have been carrying out tests to see what sort of coding tricks would get caught, and which would slip past Google’s verification, as part of a “learning how to game the Play Store” process.
What to do?
Even though Google Play was found wanting in this case, we still strongly recommend that you stick to it as much as you can.
Even if Google Play sometimes contains malware, there has historically been only a tiny fraction compared to some of the “off-market” download sites out there, some of which seem to pride themselves on being unvetted, unverified, uncensored and frequently unsafe.
So, our three primary tips for Android app security are:

  • Install patches for your device as soon as they are available. (Sadly, for some devices, that’s rarely or never.)
  • Use a product such as Sophos Free Antivirus and Security to keep an eye out for malware, dodgy websites, adware and other potentially unwanted apps.
  • Turn off Allow installation of apps from unknown sources in the Android security settings if you can.

And, remember, if there’s an app you like but you’re in any doubt, why not just leave it out?

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

A Kernel backdoor affects gadgets shipped by a popular Chinese ARM maker

Next Post

Embracing IPisation now to trust the connect devices of our future

Recent News

Data Privacy Day: Securing your data with a password manager

For Cybersecurity, the Tricks Come More Than Once a Year

March 31, 2023
cybersecurity training

Only 10% of workers remember all their cyber security training

March 30, 2023
Pie Chart, Purple

New API Report Shows 400% Increase in Attackers

March 29, 2023
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato Networks Recognised as Leader in Single-Vendor SASE Quadrant Analysis

March 29, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information