Feeds

BadNews not so bad, says Google

Android malware not installing SMS-spreading-spamware

Website security in corporate America

Google has broken its six-week silence on the BadNews malware, telling a US security conference that while it was justified in removing infected apps from Google Play, it had no evidence that BadNews was playing a part in the distribution of SMS-borne frauds.

Announcing its discovery of the malware, security company Lookout claimed BadNews started by behaving as a legitimate advertising network, but later would push the AlphaSMS SMS fraud malware to infected devices.

The Security Ledger is now reporting that Google Android security engineer Adrian Ludwig has cast doubt on that claim, speaking to an FTC event in Washington DC.

“We have observed the app and we've reviewed all the logs we have access to,” TSL quotes Ludwig as saying, and “we haven't seen a single instance of abusive SMS applications being downloaded as a result of BadNews.”

Ludwig agreed with Lookout that the 32 BadNews-carrying apps found on Google Play had downloads in the “low millions”, adding that Google had removed the apps because they violated the Android developer agreement.

Take-downs, he added, can happen for reasons other than the inclusion of malware: “removal doesn't necessarily mean [an] application is bad … we rarely confirm the reasons.”

The Register has asked Lookout Mobile Security to respond to Ludwig's comments. We would also note that it's feasible that zero logs of AlphaSMS downloads could indicate that users are simply ignoring messages inviting them to click on a link in an SMS. ®

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Critical Adobe Reader and Acrobat patches FINALLY make it out
Eight vulns healed, including XSS and DoS paths
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Blood-crazed Microsoft axes Trustworthy Computing Group
Security be not a dirty word, me Satya. But crevice, bigod...
Snowden, Dotcom, throw bombs into NZ election campaign
Claim of tapped undersea cable refuted by Kiwi PM as Kim claims extradition plot
Freenode IRC users told to change passwords after securo-breach
Miscreants probably got in, you guys know the drill by now
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.