August 28, 2019 By David Bisson 2 min read

A PDF creator app potentially served a Trojan to more than 100 million Android users via downloads on the Google Play store.

In summer 2019, the CamScanner – Phone PDF Creator app caught the attention of Kaspersky Lab. The program had generated more than 100 million downloads through the Google Play store, but in July and August, it began to receive negative user reviews suggesting the presence of unwanted features.

Upon a closer look, security researchers discovered that the app used an advertising library that contained a malicious dropper at the time of analysis. This dropper, detected by Kaspersky as Trojan-Dropper.AndroidOS.Necro.n, decrypted and executed malicious code contained within the mutter.zip file in the app’s resources. The dropper then decrypted a configuration file, revealing several locations from which it could download and then execute an additional module as its malicious payload.

After Kaspersky reported its findings to Google, the app was promptly removed from the app marketplace.

Malware Hiding on the Google Play Store

Trojan-Dropper.AndroidOS.Necro.n isn’t the only malware family that’s been found on the Google Play store. In April 2019, for instance, Check Point detected a clicker malware family, dubbed PreAMo, that generated more than 90 million downloads across six apps available on the Play store.

That was just two months before ESET discovered several apps available for download on Google’s official app marketplace that were capable of stealing one-time passwords in SMS-based two-factor authentication (2FA) messages without achieving the proper permissions. And in August 2019, Trend Micro detected adware hidden within 85 photography and gaming apps that had registered a combined total of 8 million downloads on the Google Play store.

How to Defend Against Mobile App Threats

Security professionals can help defend their organizations against threats like Necro.n by following mobile security best practices, which include keeping devices up to date with the latest software patches and restricting app downloads to only trusted developers on official app marketplaces. Companies should also use a unified endpoint management (UEM) tool to monitor all devices for suspicious activity and automatically remediate suspicious behavior.

More from

Cloud Threat Landscape Report: AI-generated attacks low for the cloud

2 min read - For the last couple of years, a lot of attention has been placed on the evolutionary state of artificial intelligence (AI) technology and its impact on cybersecurity. In many industries, the risks associated with AI-generated attacks are still present and concerning, especially with the global average of data breach costs increasing by 10% from last year.However, according to the most recent Cloud Threat Landscape Report released by IBM’s X-Force team, the near-term threat of an AI-generated attack targeting cloud computing…

Testing the limits of generative AI: How red teaming exposes vulnerabilities in AI models

4 min read - With generative artificial intelligence (gen AI) on the frontlines of information security, red teams play an essential role in identifying vulnerabilities that others can overlook.With the average cost of a data breach reaching an all-time high of $4.88 million in 2024, businesses need to know exactly where their vulnerabilities lie. Given the remarkable pace at which they’re adopting gen AI, there’s a good chance that some of those vulnerabilities lie in AI models themselves — or the data used to…

FBI, CISA issue warning for cross Apple-Android texting

3 min read - CISA and the FBI recently released a joint statement that the People's Republic of China (PRC) is targeting commercial telecommunications infrastructure as part of a significant cyber espionage campaign. As a result, the agencies released a joint guide, Enhanced Visibility and Hardening Guidance for Communications Infrastructure, with best practices organizations and agencies should adopt to protect against this espionage threat. According to the statement, PRC-affiliated actors compromised networks at multiple telecommunication companies. They stole customer call records data as well…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today