February 26, 2015 By Jaikumar Vijayan 2 min read

A new Android malware tool spotted by security vendor AVG earlier this month has served another reminder on the dangers of downloading mobile applications from insecure third-party app stores.

Stealthy Thief

The malicious software is designed to fool Android smartphone users into thinking their devices have been shut down, when the devices actually remain powered on and open to abuse. The malware can be used to spy on the owner, steal data from the device, take pictures and perform other surreptitious acts without tipping off the user.

Researchers at AVG reported seeing the Android malware being distributed through several Chinese application stores for Android. Around 10,000 phones are believed to be infected by the Android malware so far.

Android Malware Shutdown Process

The malware, which affects Android KitKat and older versions of Google’s mobile operating system, basically works by hijacking the device shutdown process. According to AVG’s description of the problem, a phone infected with the malware displays seemingly authentic shutdown animations and text when the user presses the power button.

After going through what appears to be a normal shutdown routine, the screen goes dark and the phone appears to be off. In reality, the malware gains root-level access and injects itself into a process that is invoked when a user presses and then releases the power button. In order to fool users into thinking the phone is really switched off, the malware also hooks into some broadcast services so functions such as recording calls or transmitting messages can be done stealthily.

“Most of us have seen Hollywood movies where hackers trace and spy on mobile devices, even though they are switched off,” AVG noted in its blog. “Like most things in spy movies, we disregard it as fiction.” However, this newly discovered Android malware challenges that perception.

AVG did not offer any explanation on the vulnerability the malware exploits to gain root-level access on compromised devices.

A Familiar Problem

The new threat highlights the problems users can run into when using third-party stores to download mobile applications, particularly for Android. According to Forbes, 97 percent of all mobile malware is currently on Android systems. An overwhelming majority of the malware is distributed through doctored or outright malicious applications hosted on third-party mobile application stores.

In many cases, cybercriminals infect popular programs in these application stores with malicious software that users unwittingly download on their devices alongside the legitimate software. For instance, popular Android game applications hosted by third-party application stores often contain hidden malware users download onto their system when acquiring the game application.

Online stores such as Mumayi, eoeMarket, Android159 and liqucn host a relatively high number of malicious programs, according to a Forbes analysis of the state of Android malware. Google Play’s store, on the other hand, accounts for less than 0.1 percent of malicious Android applications. This means users who only download apps via the Google Play store often face fewer security problems.

Google, too, has contributed to the problem by making its applications relatively hard to obtain via the Google Play Store in certain geographies. The countries where software developers can actually sell their applications through Google Play remain relatively low, forcing users in such regions to go find the applications they want via risky third-party download sites.

Image Source: iStock

More from

How will the Merck settlement affect the insurance industry?

3 min read - A major shift in how cyber insurance works started with an attack on the pharmaceutical giant Merck. Or did it start somewhere else?In June 2017, the NotPetya incident hit some 40,000 Merck computers, destroying data and forcing a months-long recovery process. The attack affected thousands of multinational companies, including Mondelēz and Maersk. In total, the malware caused roughly $10 billion in damage.NotPetya malware exploited two Windows vulnerabilities: EternalBlue, a digital skeleton key leaked from the NSA, and Mimikatz, an exploit…

3 Strategies to overcome data security challenges in 2024

3 min read - There are over 17 billion internet-connected devices in the world — and experts expect that number will surge to almost 30 billion by 2030.This rapidly growing digital ecosystem makes it increasingly challenging to protect people’s privacy. Attackers only need to be right once to seize databases of personally identifiable information (PII), including payment card information, addresses, phone numbers and Social Security numbers.In addition to the ever-present cybersecurity threats, data security teams must consider the growing list of data compliance laws…

ICS CERT predictions for 2024: What you need to know

4 min read - As we work through the first quarter of 2024, various sectors are continuously adapting to increasingly complex cybersecurity threats. Sectors like healthcare, finance, energy and transportation are all regularly widening their digital infrastructure, resulting in larger attack surfaces and greater risk exposure.Kaspersky just released their ICS CERT Predictions for this year, outlining the key cybersecurity challenges industrial enterprises will face in the year ahead. The forecasts emphasize the persistent nature of ransomware threats, the increasing prevalence of cosmopolitical hacktivism, insights…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today