'Guerrilla', el malware que burla Google Play
'Guerrilla', el malware que burla Google Play
This fake application allows cyber attackers to carry out suspicious promotion campaigns using infected devices to download apps
Experts from Kaspersky Lab have discovered an Android Trojan called 'Guerrilla', which tries to overcome the anti-fraud protection mechanisms of the Google Play store through a fraudulent application that behaves as if there was a person behind it.
This fake application allows cyber-attackers to carry out suspicious promotion campaigns using infected devices to download, install, vote and comment on publications on Google Play. However, this malware is not only capable of abusing the mechanisms of infected devices.
With millions of users and software developers, Google Play is an attractive platform for cybercriminals. Among other things, cybercriminals use Google Play to carry out the so-called Shuabang campaigns, which are widespread in China.
These fraudulent advertising activities are aimed at promoting some legitimate applications by granting higher ratings, increasing their downloads and posting positive comments about them on Google Play.
Many of these applications used to carry out these campaigns, in general, pose no threat to the user of the infected device such as data or money theft. However, they can do much more damage: the ability to download additional applications onto infected devices places an extra burden on Internet traffic, and, in some cases, Shuabang applications are able to secretly install free programs and even payment, in addition to using the bank card associated with the Google Play user account.
Fraudulent accounts
To carry out these activities, cybercriminals created numerous fake accounts on Google Play or infected user devices with special malware capable of covert actions on this platform based on the orders received from hackers.
Although Google has strong protection mechanisms that help detect and block fake users to prevent fraudulent operations, the authors of the Guerrilla Trojan seem to be trying to overcome these protections.
The Trojan is introduced into the device through the Leech rootkit, a malware that gives cyber attackers user privileges on the infected device. These privileges give cybercriminals unlimited opportunities to manipulate device data.
Among other things, it allows access to the user name, passwords and authentication tokens, which are required to communicate with applications of official Google services and inaccessible for normal applications on non-rooted devices. After installation, the Guerrilla Trojan uses the data to communicate with the Google Play store as if it were a real application.
Comments
Post a Comment