Leave a comment

Top Story: Malware found in Google Play Store apps

Top Story: Malware found in Google Play Store apps
PHOTO COURTESY OF THREAT POST

Here at Komando.com, we constantly remind you about the dangers of downloading and installing apps from unofficial sources. Since side-loaded apps from unknown locations are not checked nor verified against the guidelines imposed by the official Google Play or Apple app stores, this practice increases the risk of having your phone or tablet infiltrated by malware or fake phishing apps.

By putting our trust in the verification process of these official app stores, we rely on the judgment of their respective curators and gatekeepers to keep us safe from potential harm brought about by apps with malicious intent.

But what if apps secretly embedded with malware could slip by these checks and pass the review process required by these app stores?

This is exactly what security researchers from Check Point found in more than 40 Android apps in the Google Play app store. The malware called "DressCode" is reported to be infecting apps ranging from mobile games to user guides. An additional 400 applications from third-party app stores were also found to be infected with this strain of malware.

The oldest apps that have been detected to be embedded with the malware were introduced to the Google Play app store on April 2014. A reported 500,000 to 2 million users have downloaded the DressCode infected apps from Google Play.

 

DressCode malware

One of the Android apps infected with the DressCode malware

 

Check Point revealed that the DressCode malware turns infected Android smartphones and tablets into botnets that relay communication through a proxy server. A botnet is a device secretly controlled by a hacker to perform a variety of tasks, such as denial-of-service attacks, message spamming, or in DressCode's case, generating false ad clicks for profit.

Once installed on a device, DressCode initializes itself by contacting its command and control server. It is then ordered to lay dormant until the malware's masters activate it, turning the device into a proxy server for rerouting ad traffic.

For now, profit from false ad clicks appears to be the sole purpose of the DressCode malware but Check Point warns that botnet attacks like this can be used for even more nefarious deeds such as infiltrating networks. "Since the malware allows the attacker to route communications through the victim’s device, the attacker can access any internal network to which the device belongs. This can compromise security for enterprises and organizations," wrote Check Point's research team in their blog post.

Check Point already notified Google about these infected apps and most have already been removed from the Google Play app store.

Here is a list of the DressCode infected packages as provided by Check Point:

  • com.dark.kazy.goddess.lp
  • com.whispering.kazy.spirits.pih
  • com.shelter.kazy.ghost.jkv
  • com.forsaken.kazy.game.house
  • com.dress.up.Musa.Winx.Stella.Tecna.Bloom.Flora
  • com.dress.up.princess.Apple.White.Raven.Queen.Ashlynn.Ella.Ever.After.High
  • com.monster.high.Dracubecca.freaky.Fusion.draculaura
  • com.dress.up.Cerise.Hood.Raven.Queen.Apple.White.Ever.After.Monster.High
  • com.ever.after.high.Swan.Duchess.barbie.game
  • com.cute.dressup.anime.waitress
  • com.rapunzel.naughty.or.nice
  • guide.slither.skins
  • clash.royale.guide
  • guide.lenses.snapchat
  • com.minecraft.skins.superhero
  • com.catalogstalkerskinforminecraft_.ncyc
  • com.applike.robotsskinsforminecraft
  • com.temalebedew.modgtavformcpe
  • com.manasoft.skinsforminecraftunique
  • com.romanseverny.militaryskinsforminecraft
  • com.temalebedew.animalskinsforminecraft
  • com.temalebedew.skinsoncartoonsforminecraft
  • com.str.carmodsforminecraft
  • com.hairstyles.stepbystep.yyhb
  • com.str.mapsfnafforminecraft
  • com.weave.braids.steps.txkw
  • mech.mod.mcpe
  • com.applike.animeskinsforminecraftjcxw
  • com.str.furnituremodforminecraft
  • com.vladgamerapp.skin.editor.for_.minecraft
  • ru.sgejko.horror.mv
  • com.vladgamerapp.skins.for_.minecraft.girls
  • com.zaharzorkin.cleomodsforgtasailht
  • com.temalebedew.ponyskins
  • com.my.first.date.stories
  • com.gta.mod.minecraft.raccoon
  • com.applike.hotskinsforminecraft
  • com.applike.serversforminecraftpe
  • com.zaharzorkin.pistonsmod
  • wiki.clash.guide
  • mobile.strike.guide
  • prank.calling.app
  • sonic.dash.guide

If you have downloaded any of these apps in the past and you still have them installed on your Android phone or tablet, please uninstall and delete them immediately. We don't know the extent of control DressCode has on a compromised device but this is the first step that we recommended.

To read more about Check Point's report about DressCode, please visit their official blog post.

Next Story
Source: Verdictforu
Warning! Scammers stealing PayPal customers' passwords
Previous Happening Now

Warning! Scammers stealing PayPal customers' passwords

Car rental risks: One common mistake gives thieves your data
Next Happening Now

Car rental risks: One common mistake gives thieves your data

View Comments ()