August 28, 2019 By David Bisson 2 min read

A PDF creator app potentially served a Trojan to more than 100 million Android users via downloads on the Google Play store.

In summer 2019, the CamScanner – Phone PDF Creator app caught the attention of Kaspersky Lab. The program had generated more than 100 million downloads through the Google Play store, but in July and August, it began to receive negative user reviews suggesting the presence of unwanted features.

Upon a closer look, security researchers discovered that the app used an advertising library that contained a malicious dropper at the time of analysis. This dropper, detected by Kaspersky as Trojan-Dropper.AndroidOS.Necro.n, decrypted and executed malicious code contained within the file in the app’s resources. The dropper then decrypted a configuration file, revealing several locations from which it could download and then execute an additional module as its malicious payload.

After Kaspersky reported its findings to Google, the app was promptly removed from the app marketplace.

Malware Hiding on the Google Play Store

Trojan-Dropper.AndroidOS.Necro.n isn’t the only malware family that’s been found on the Google Play store. In April 2019, for instance, Check Point detected a clicker malware family, dubbed PreAMo, that generated more than 90 million downloads across six apps available on the Play store.

That was just two months before ESET discovered several apps available for download on Google’s official app marketplace that were capable of stealing one-time passwords in SMS-based two-factor authentication (2FA) messages without achieving the proper permissions. And in August 2019, Trend Micro detected adware hidden within 85 photography and gaming apps that had registered a combined total of 8 million downloads on the Google Play store.

How to Defend Against Mobile App Threats

Security professionals can help defend their organizations against threats like Necro.n by following mobile security best practices, which include keeping devices up to date with the latest software patches and restricting app downloads to only trusted developers on official app marketplaces. Companies should also use a unified endpoint management (UEM) tool to monitor all devices for suspicious activity and automatically remediate suspicious behavior.

More from

Change Healthcare discloses $22M ransomware payment

3 min read - UnitedHealth Group CEO Andrew Witty found himself answering questions in front of Congress on May 1 regarding the Change Healthcare ransomware attack that occurred in February. During the hearing, he admitted that his organization paid the attacker's ransomware request. It has been reported that the hacker organization BlackCat, also known as ALPHV, received a payment of $22 million via Bitcoin.Even though they made the ransomware payment, Witty shared that Change Healthcare did not get its data back. This is a…

Phishing kit trends and the top 10 spoofed brands of 2023

4 min read -  The 2024 IBM X-Force Threat Intelligence Index reported that phishing was one of the top initial access vectors observed last year, accounting for 30% of incidents. To carry out their phishing campaigns, attackers often use phishing kits: a collection of tools, resources and scripts that are designed and assembled to ease deployment. Each phishing kit deployment corresponds to a single phishing attack, and a kit could be redeployed many times during a phishing campaign. IBM X-Force has analyzed thousands of…

How I got started: AI security researcher

4 min read - For the enterprise, there’s no escape from deploying AI in some form. Careers focused on AI are proliferating, but one you may not be familiar with is AI security researcher. These AI specialists are cybersecurity professionals who focus on the unique vulnerabilities and threats that arise from the use of AI and machine learning (ML) systems. Their responsibilities vary, but key roles include identifying and analyzing potential security flaws in AI models and developing and testing methods malicious actors could…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today