February 26, 2015 By Jaikumar Vijayan 2 min read

A new Android malware tool spotted by security vendor AVG earlier this month has served another reminder on the dangers of downloading mobile applications from insecure third-party app stores.

Stealthy Thief

The malicious software is designed to fool Android smartphone users into thinking their devices have been shut down, when the devices actually remain powered on and open to abuse. The malware can be used to spy on the owner, steal data from the device, take pictures and perform other surreptitious acts without tipping off the user.

Researchers at AVG reported seeing the Android malware being distributed through several Chinese application stores for Android. Around 10,000 phones are believed to be infected by the Android malware so far.

Android Malware Shutdown Process

The malware, which affects Android KitKat and older versions of Google’s mobile operating system, basically works by hijacking the device shutdown process. According to AVG’s description of the problem, a phone infected with the malware displays seemingly authentic shutdown animations and text when the user presses the power button.

After going through what appears to be a normal shutdown routine, the screen goes dark and the phone appears to be off. In reality, the malware gains root-level access and injects itself into a process that is invoked when a user presses and then releases the power button. In order to fool users into thinking the phone is really switched off, the malware also hooks into some broadcast services so functions such as recording calls or transmitting messages can be done stealthily.

“Most of us have seen Hollywood movies where hackers trace and spy on mobile devices, even though they are switched off,” AVG noted in its blog. “Like most things in spy movies, we disregard it as fiction.” However, this newly discovered Android malware challenges that perception.

AVG did not offer any explanation on the vulnerability the malware exploits to gain root-level access on compromised devices.

A Familiar Problem

The new threat highlights the problems users can run into when using third-party stores to download mobile applications, particularly for Android. According to Forbes, 97 percent of all mobile malware is currently on Android systems. An overwhelming majority of the malware is distributed through doctored or outright malicious applications hosted on third-party mobile application stores.

In many cases, cybercriminals infect popular programs in these application stores with malicious software that users unwittingly download on their devices alongside the legitimate software. For instance, popular Android game applications hosted by third-party application stores often contain hidden malware users download onto their system when acquiring the game application.

Online stores such as Mumayi, eoeMarket, Android159 and liqucn host a relatively high number of malicious programs, according to a Forbes analysis of the state of Android malware. Google Play’s store, on the other hand, accounts for less than 0.1 percent of malicious Android applications. This means users who only download apps via the Google Play store often face fewer security problems.

Google, too, has contributed to the problem by making its applications relatively hard to obtain via the Google Play Store in certain geographies. The countries where software developers can actually sell their applications through Google Play remain relatively low, forcing users in such regions to go find the applications they want via risky third-party download sites.

Image Source: iStock

More from

Remote access risks on the rise with CVE-2024-1708 and CVE-2024-1709

4 min read - On February 19, ConnectWise reported two vulnerabilities in its ScreenConnect product, CVE-2024-1708 and 1709. The first is an authentication bypass vulnerability, and the second is a path traversal vulnerability. Both made it possible for attackers to bypass authentication processes and execute remote code.While ConnectWise initially reported that the vulnerabilities had proof-of-concept but hadn’t been spotted in the wild, reports from customers quickly made it clear that hackers were actively exploring both flaws. As a result, the company created patches for…

Evolving red teaming for AI environments

2 min read - As AI becomes more ingrained in businesses and daily life, the importance of security grows more paramount. In fact, according to the IBM Institute for Business Value, 96% of executives say adopting generative AI (GenAI) makes a security breach likely in their organization in the next three years. Whether it’s a model performing unintended actions, generating misleading or harmful responses or revealing sensitive information, in the AI era security can no longer be an afterthought to innovation.AI red teaming is emerging…

What we can learn from the best collegiate cyber defenders

3 min read - This year marked the 19th season of the National Collegiate Cyber Defense Competition (NCCDC). For those unfamiliar, CCDC is a competition that puts student teams in charge of managing IT for a fictitious company as the network is undergoing a fundamental transformation. This year the challenge involved a common scenario: a merger. Ten finalist teams were tasked with managing IT infrastructure during this migrational period and, as an added bonus, the networks were simultaneously attacked by a group of red…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today