February 26, 2015 By Jaikumar Vijayan 2 min read

A new Android malware tool spotted by security vendor AVG earlier this month has served another reminder on the dangers of downloading mobile applications from insecure third-party app stores.

Stealthy Thief

The malicious software is designed to fool Android smartphone users into thinking their devices have been shut down, when the devices actually remain powered on and open to abuse. The malware can be used to spy on the owner, steal data from the device, take pictures and perform other surreptitious acts without tipping off the user.

Researchers at AVG reported seeing the Android malware being distributed through several Chinese application stores for Android. Around 10,000 phones are believed to be infected by the Android malware so far.

Android Malware Shutdown Process

The malware, which affects Android KitKat and older versions of Google’s mobile operating system, basically works by hijacking the device shutdown process. According to AVG’s description of the problem, a phone infected with the malware displays seemingly authentic shutdown animations and text when the user presses the power button.

After going through what appears to be a normal shutdown routine, the screen goes dark and the phone appears to be off. In reality, the malware gains root-level access and injects itself into a process that is invoked when a user presses and then releases the power button. In order to fool users into thinking the phone is really switched off, the malware also hooks into some broadcast services so functions such as recording calls or transmitting messages can be done stealthily.

“Most of us have seen Hollywood movies where hackers trace and spy on mobile devices, even though they are switched off,” AVG noted in its blog. “Like most things in spy movies, we disregard it as fiction.” However, this newly discovered Android malware challenges that perception.

AVG did not offer any explanation on the vulnerability the malware exploits to gain root-level access on compromised devices.

A Familiar Problem

The new threat highlights the problems users can run into when using third-party stores to download mobile applications, particularly for Android. According to Forbes, 97 percent of all mobile malware is currently on Android systems. An overwhelming majority of the malware is distributed through doctored or outright malicious applications hosted on third-party mobile application stores.

In many cases, cybercriminals infect popular programs in these application stores with malicious software that users unwittingly download on their devices alongside the legitimate software. For instance, popular Android game applications hosted by third-party application stores often contain hidden malware users download onto their system when acquiring the game application.

Online stores such as Mumayi, eoeMarket, Android159 and liqucn host a relatively high number of malicious programs, according to a Forbes analysis of the state of Android malware. Google Play’s store, on the other hand, accounts for less than 0.1 percent of malicious Android applications. This means users who only download apps via the Google Play store often face fewer security problems.

Google, too, has contributed to the problem by making its applications relatively hard to obtain via the Google Play Store in certain geographies. The countries where software developers can actually sell their applications through Google Play remain relatively low, forcing users in such regions to go find the applications they want via risky third-party download sites.

Image Source: iStock

More from

Cybersecurity dominates concerns among the C-suite, small businesses and the nation

4 min read - Once relegated to the fringes of business operations, cybersecurity has evolved into a front-and-center concern for organizations worldwide. What was once considered a technical issue managed by IT departments has become a boardroom topic of utmost importance. With the rise of sophisticated cyberattacks, the growing use of generative AI by threat actors and massive data breach costs, it is no longer a question of whether cybersecurity matters but how deeply it affects every facet of modern operations.The 2024 Allianz Risk…

Autonomous security for cloud in AWS: Harnessing the power of AI for a secure future

3 min read - As the digital world evolves, businesses increasingly rely on cloud solutions to store data, run operations and manage applications. However, with this growth comes the challenge of ensuring that cloud environments remain secure and compliant with ever-changing regulations. This is where the idea of autonomous security for cloud (ASC) comes into play.Security and compliance aren't just technical buzzwords; they are crucial for businesses of all sizes. With data breaches and cyber threats on the rise, having systems that ensure your…

Adversarial advantage: Using nation-state threat analysis to strengthen U.S. cybersecurity

4 min read - Nation-state adversaries are changing their approach, pivoting from data destruction to prioritizing stealth and espionage. According to the Microsoft 2023 Digital Defense Report, "nation-state attackers are increasing their investments and launching more sophisticated cyberattacks to evade detection and achieve strategic priorities."These actors pose a critical threat to United States infrastructure and protected data, and compromising either resource could put citizens at risk.Thankfully, there's an upside to these malicious efforts: information. By analyzing nation-state tactics, government agencies and private enterprises are…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today