Connect with us

Hi, what are you looking for?

HEADLINES

Malicious app spreads fake reviews thanks to in-app accessibility service abuse

The Trojan, dubbed “Shopper”, first drew the attention of researchers following its extensive obfuscation and use of the Google Accessibility Service.

Kaspersky researchers detected a Trojan application that terrorizes users with unsolicited ads and boosts installations of online shopping applications – fooling both users and advertisers. This malicious app visits smartphone app stores, downloads and launches applications and leaves fake reviews on behalf of the user, all while hiding itself from the device owner.

As winter sales are hitting the stores, both users and brands need to be wary. When choosing shops, users rely heavily on reviews, while retailers increase their promotion and advertising budgets. As it turns out, neither can fully trust what they see online, as a new Trojan application is boosting popular shopping app ratings and installations, and spreading numerous ads that may annoy users.

The Trojan, dubbed “Shopper”, first drew the attention of researchers following its extensive obfuscation and use of the Google Accessibility Service. The service enables users to set a voice to read out app content and automate interaction with the user interface – designed to help people with disabilities. However, in the hands of attackers this feature presents a serious threat to the device owner. 

Once it has the permission to use the service, the malware can gain almost unlimited opportunities to interact with the system interface and applications. It can capture data featured on the screen, press buttons and even emulate user gestures. It is not known yet how the malicious application is being spread, however Kaspersky researchers assume that it may be downloaded by device owners from fraudulent ads or third-party app stores while trying to get a legitimate application. 

Advertisement. Scroll to continue reading.

The app masks itself as a system application and uses a system icon named ConfigAPKs in order to hide itself from the user. After the screen is unlocked, the app launches, gathers information about the victim’s device and sends it to the attacker’s servers. The server returns the commands for the application to execute. Depending on the commands, the app can:

  • Use a device owner’s Google or Facebook account to register on popular shopping and entertainment apps, including AliExpress, Lazada, Zalora, Shein, Joom, Likee and Alibaba;
  • Leave application reviews in Google Play on behalf of the device owner;
  • Check the rights to use the Accessibility Service. If permission is not granted, it sends a phishing request for them;
  • Turn off Google Play Protect, a feature that runs a safety check on apps from the Google Play Store before they are downloaded;
  • Open links received from the remote server in an invisible window and hide itself from the app menu after a number of screens are unblocked;
  • Show ads when unblocking the device’s screen and create labels to advertised ads in the app menu;
  • Download applications from the Apkpure[.]com ‘market’ and install them;
  • Open and download advertised applications in Google Play;
  • Replace labels of installed apps with labels of advertised pages

The highest share of users infected by Trojan-Dropper.AndroidOS.Shopper.a from October to November 2019 was in Russia, with a staggering 28.46% of all users affected by the shopaholic app located in the country. Almost a fifth (18.70%) of infections were in Brazil and 14.23% in India.

“Despite the fact that at the moment, the real danger stemming from this malicious app is limited to unsolicited ads, fake reviews and ratings issued in the name of the victim, no one can guarantee that the creators of this malware will not change their payload to something else. For now, the focus of this malicious app is on retail, but its capabilities enable attackers to spread fake information via users’ social media accounts and other platforms. For example, it could automatically share videos containing whatever the operators behind Shopper would want on personal pages of users accounts and just flood the internet with unreliable information,” says Igor Golovin, Kaspersky malware analyst.

Kaspersky products successfully detect and block the Shopper malware under the following detection name: Trojan-Dropper.AndroidOS.Shopper. Read more about the Shopper on Securelist.com.

To reduce the risk of infection by malware threats such as this one, users are advised to follow the recommendations below: 

  • Beware of apps that require the use of the Accessibility Service, if the application isn’t meant to be used with this function
  • Always check application permissions to see what your installed apps are allowed to do  
  • Do not install applications from untrusted sources, even if they are actively advertised, and block the installation of programs from unknown sources in your smartphone’s settings
  • Use a reliable mobile security solution, such as Kaspersky Internet Security for Android, that can help identify potentially dangerous or questionable requests made by the downloaded application, and explain the risks associated with different types of common permissions

Advertisement. Scroll to continue reading.
Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

White Papers

When compared to 2023, Sophos saw a 51% increase in abusing “Living off the Land” binaries or LOLbins; since 2021, it’s increased by 83%.

HEADLINES

Someone illegally acquires or uses personal information such as bank account or credit card numbers of another person to obtain money, goods or services....

HEADLINES

To stay ahead of these challenges, organizations need to invest in AI-driven defenses, transition to quantum-safe encryption, and adopt a Zero Trust approach to...

HEADLINES

There was a 121% Year-on-Year (YoY) increase in identity fraud in 2024 across the region, with significant surges recorded in Singapore (207%), Thailand (206%)...

HEADLINES

As part of RCBC’s 2024 Cybersecurity literacy program, the webinar aims to help Filipinos level up their online banking safety by providing them with...

White Papers

The survey found that CXO’s feel less prepared than their global peers. Less than half or 48% in APAC said they felt completely prepared...

HEADLINES

On average, a single organization in the Philippines experiences 4,003 attacks per week, significantly higher than the APAC average of 2,870 attacks per week.

White Papers

Exploiting this vulnerability, cybercriminals craft deceptively authentic phishing emails that align with current trends, exploiting human emotions to invoke urgency and trick recipients into...

Advertisement