Feeds

Malicious apps infiltrate Google's Android Market

Bogus games purged after more than 10,000 downloads

Top 5 reasons to deploy VMware with Tegile

Google security crews have tossed at least a dozen smartphone games out of the Android Market after discovering they contained secret code that caused owners to accrue expensive charges for text messages sent to premium numbers.

The malicious apps, uploaded to the Google-hosted service by a developer named Logastrod, masqueraded as wildly popular games such as Angry Birds, Assassin's Creed Revelations, and NEED FOR SPEED. The developer allegedly cloned the titles, including the accompanying graphics and descriptions, and added malicious code that caused handsets to surreptitiously send and receive premium messages.

By the time Google removed the titles – more than 24 hours after they were first made available – more than 10,000 people had downloaded them, according to a blog post published on Monday by Sophos.

“We have already stated several times that the requirements for becoming an Android developer that can publish apps to the Android market are far too relaxed,” Sophos blogger Vanja Svajcer wrote. “The cost of becoming a developer and being banned by Google is much lower than the money that can be earned by publishing malicious apps. The attacks on the Android Market will continue as long as the developer requirements stay too relaxed.”

In all fairness to Google, users who installed the counterfeit games saw permission screens that warned the apps were able to “edit SMS or MMS, read SMS or MMS, receive SMS” messages. The apps also came with terms of service that disclosed users would be subscribed to premium services that cost as much as €4.50.

The revelation that Google hosted the malicious titles for more than a day and allowed them to be downloaded more than 10,000 times is ample evidence that these protections aren't enough to secure the Android Market. Google has steadfastly declined to scan apps available in its online store for malicious code that logs users' keystrokes or racks up expensive charges.

Google has long counseled users to carefully examine the permissions screen of each app before it's installed. And at least one of its employees has lashed out at companies providing antivirus products for Android handsets, calling them "charlatans" who play on users' fears.

With so many Android apps requiring access to geographic-location data, messaging functions, and other sensitive resources, Google has yet to educate users how to tell legitimate requests from illegitimate requests. What's more, Google's caveat emptor approach means it's up to users to make sure they don't get swindled while shopping in the company's official apps bazaar. ®

Internet Security Threat Report 2014

More from The Register

next story
'Kim Kardashian snaps naked selfies with a BLACKBERRY'. *Twitterati gasps*
More alleged private, nude celeb pics appear online
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Snowden, Dotcom, throw bombs into NZ election campaign
Claim of tapped undersea cable refuted by Kiwi PM as Kim claims extradition plot
Freenode IRC users told to change passwords after securo-breach
Miscreants probably got in, you guys know the drill by now
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
BitTorrent's peer-to-peer chat app Bleep goes live as public alpha
A good day for privacy as invisble.im also reveals its approach to untraceable chats
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.