February 26, 2015 By Jaikumar Vijayan 2 min read

A new Android malware tool spotted by security vendor AVG earlier this month has served another reminder on the dangers of downloading mobile applications from insecure third-party app stores.

Stealthy Thief

The malicious software is designed to fool Android smartphone users into thinking their devices have been shut down, when the devices actually remain powered on and open to abuse. The malware can be used to spy on the owner, steal data from the device, take pictures and perform other surreptitious acts without tipping off the user.

Researchers at AVG reported seeing the Android malware being distributed through several Chinese application stores for Android. Around 10,000 phones are believed to be infected by the Android malware so far.

Android Malware Shutdown Process

The malware, which affects Android KitKat and older versions of Google’s mobile operating system, basically works by hijacking the device shutdown process. According to AVG’s description of the problem, a phone infected with the malware displays seemingly authentic shutdown animations and text when the user presses the power button.

After going through what appears to be a normal shutdown routine, the screen goes dark and the phone appears to be off. In reality, the malware gains root-level access and injects itself into a process that is invoked when a user presses and then releases the power button. In order to fool users into thinking the phone is really switched off, the malware also hooks into some broadcast services so functions such as recording calls or transmitting messages can be done stealthily.

“Most of us have seen Hollywood movies where hackers trace and spy on mobile devices, even though they are switched off,” AVG noted in its blog. “Like most things in spy movies, we disregard it as fiction.” However, this newly discovered Android malware challenges that perception.

AVG did not offer any explanation on the vulnerability the malware exploits to gain root-level access on compromised devices.

A Familiar Problem

The new threat highlights the problems users can run into when using third-party stores to download mobile applications, particularly for Android. According to Forbes, 97 percent of all mobile malware is currently on Android systems. An overwhelming majority of the malware is distributed through doctored or outright malicious applications hosted on third-party mobile application stores.

In many cases, cybercriminals infect popular programs in these application stores with malicious software that users unwittingly download on their devices alongside the legitimate software. For instance, popular Android game applications hosted by third-party application stores often contain hidden malware users download onto their system when acquiring the game application.

Online stores such as Mumayi, eoeMarket, Android159 and liqucn host a relatively high number of malicious programs, according to a Forbes analysis of the state of Android malware. Google Play’s store, on the other hand, accounts for less than 0.1 percent of malicious Android applications. This means users who only download apps via the Google Play store often face fewer security problems.

Google, too, has contributed to the problem by making its applications relatively hard to obtain via the Google Play Store in certain geographies. The countries where software developers can actually sell their applications through Google Play remain relatively low, forcing users in such regions to go find the applications they want via risky third-party download sites.

Image Source: iStock

More from

Cloud Threat Landscape Report: AI-generated attacks low for the cloud

2 min read - For the last couple of years, a lot of attention has been placed on the evolutionary state of artificial intelligence (AI) technology and its impact on cybersecurity. In many industries, the risks associated with AI-generated attacks are still present and concerning, especially with the global average of data breach costs increasing by 10% from last year.However, according to the most recent Cloud Threat Landscape Report released by IBM’s X-Force team, the near-term threat of an AI-generated attack targeting cloud computing…

Testing the limits of generative AI: How red teaming exposes vulnerabilities in AI models

4 min read - With generative artificial intelligence (gen AI) on the frontlines of information security, red teams play an essential role in identifying vulnerabilities that others can overlook.With the average cost of a data breach reaching an all-time high of $4.88 million in 2024, businesses need to know exactly where their vulnerabilities lie. Given the remarkable pace at which they’re adopting gen AI, there’s a good chance that some of those vulnerabilities lie in AI models themselves — or the data used to…

FBI, CISA issue warning for cross Apple-Android texting

3 min read - CISA and the FBI recently released a joint statement that the People's Republic of China (PRC) is targeting commercial telecommunications infrastructure as part of a significant cyber espionage campaign. As a result, the agencies released a joint guide, Enhanced Visibility and Hardening Guidance for Communications Infrastructure, with best practices organizations and agencies should adopt to protect against this espionage threat. According to the statement, PRC-affiliated actors compromised networks at multiple telecommunication companies. They stole customer call records data as well…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today