Icon-hiding Android adware returns to the Play Market

Credit to Author: Pankaj Kohli| Date: Tue, 08 Oct 2019 13:00:37 +0000

App developers have, for years, embedded ad-code into their apps as a way to help defray the costs of development, but some developers simply use their apps as a borderline-abusive platform solely to launch ads on mobile devices.

SophosLabs recently discovered 15 apps on Google’s Play Market that engage in such practices; They generate frequent, large, intrusive ads and literally hide their app icons in the launcher in order to make it difficult for you to find and remove them. Several of them go a step further by disguising themselves in the phone’s App settings page.

According to the Play Market pages for these apps, more than 1.3 million devices worldwide have installed at least one of them. If history is any indication, there are likely many more waiting to be found.

Icon hiding adware apps on Google Play

For example, the app free.calls.messages (Flash On Calls & Messages – aka Free Calls & Messages – shown below) engages in some clever trickery to prevent users from uninstalling the app.

When first launched, the app displays a message that says “This app is incompatible with your device!” You might think that the app has crashed, because, after this “crash,” the app opens the Play Store and navigates to the page for Google Maps, to mislead you into thinking that the ubiquitous Maps app is the cause of the problem. It is not. This is a ruse.

The app then hides its own icon so it doesn’t show up in the launcher’s app tray. Others in the list hide their icon, too: Some do this on the first launch, while others simply wait for a while after you install the app.

Playing dirty

SophosLabs has also observed these apps pulling a different dirty trick: using one name and icon for the application (which is visible in the phone’s Apps settings page), and a different name and icon for the Main Activity (the running app window).

Nine out of the batch of 15 apps used deceptive application icons and names, most of which appeared to have been chosen because they might plausibly resemble an innocuous system app. (The app icon is still visible in the phone’s “gear” Settings menu, under Apps.)

By hiding their launcher icon, and using an application icon and name that resembles a system app, these apps make a convincing case to a casual observer that there’s nothing unusual installed on the phone.

Adware app code that uses different icons for the application (which appears in the phone’s settings menu) and main activity

Other apps make use of a library, called koolib, that installs a service to hide the icon after a predetermined time after the installation of the app. Not kool, app.

Icon hiding code in koolib

Most of these apps were presented to the user as one kind of utility app or another. QR code readers, image editors, backup utilities, a phone finder, and most ironically. a utility ostensibly to . The apps further disguised themselves using a name representing a harmless app, such as Google Play Store, Update, Back Up, or Time Zone Service. These names appear only in the phone’s settings.

An application icon for an adware appears beneath the legitimate Play Store icon

Many use generic names, like “Update,” along with generic icons

Back up, that generic icon isn’t a legitimate backup app

Your phone already has a background service that tracks the time zone: the clock

All of these apps appeared during this calendar year. The oldest one among these, free.calls.messages, was published in January; Two months after it appeared, it had more than a million installs. Although these apps were uploaded to the market by different publisher accounts, many shared similar code structure, UI, package names, and behavior — too many for it to be considered a coincidence.

For example, the app com.cc.image.editor contained a reference to a different app, com.bb.image.editor, within its code. The two apps, despite their similar names, were published by completely different entities. This suggests to us that the former might have been derived from the latter, but we can’t definitively say that the same author(s) developed both apps.

Timeline for free.calls.messages

Users not fond of adware

Most of these apps had negative reviews from users, many of which had complained about these apps not being able to run, app icon disappearing from the launcher, and of course the aggressive ads.

Android adware took a dark turn with the use of these persistence tricks. By leveraging increasingly innovative techniques to stay resident on the phone, apps like these can quickly infect mass numbers of victims within a few weeks of their release. Users should pay close attention to user reviews before installing apps from Google Play (and don’t be the first person to try out a brand new app).

SophosLabs notified Google about these apps in July and, as far as we know, they have been taken down. These apps are detected by Sophos Mobile Security as Andr/Hiddad-AB and Andr/Hiddad-AC.

Take it from me, a cat: steer clear

IOCs

Package Name InstallsPublished
free.calls.messages1,000,000+Jan 2019
com.a.bluescanner10,000+May 2019
com.bb.image.editor10,000+May 2019
com.cc.image.editor100,000+June 2019
com.d.bluemagentascanner10,000+June 2019
com.doo.keeping1,000+May 2019
com.e.orangeredscanner10,000+July 2019
com.hz.audio10,000+June 2019
cos.mos.comprehensive10,000+April 2019
com.garbege.background.cutout10,000+July 2019
com.hanroom.cutbackground50,000+July 2019
com.jiajia.autocut.photo100,000+July 2019
com.jiakebull.picture.background50,000+July 2019
com.fruit.autocut.photo10,000+July 2019
com.huankuai.autocut.picture10,000+July 2019

 

http://feeds.feedburner.com/sophos/dgdY

Leave a Reply