Story image

Five million Android devices possibly infected with 'aggressive' pre-installed adware

21 Mar 18

Almost five million Android mobile devices may have pre-installed with an adware called RottenSys – and security researchers suspect distributors may have played a part in the saga.

Check Point researchers Feixiang He, Bohdan Melnykov and Elena Root posted in a blog last week that the RottenSys mobile adware could have been installed in the devices’ supply chains since 2016.

They claim Honor, Huawei and Xiaomi devices are most affected by the ‘extremely aggressive ad network’. As of March 12 2018, 4,964,460 devices were infected by RottenSys.

When the researchers analysed the malware’s distribution channels, two names suggested a possible connection with Hangzhou-based mobile phone supply chain distributor Tian Pai.

“Tian Pai related channels contribute 49.2% of the total number of infested devices that we observed. According to China National Enterprise Credit Information Publicity System, Tian Pai offers a wide range of services from presales customization, online/offline wholesale to customer care. It covers regional sales of top brands in the market such as Samsung, HTC, Apple, Xiaomi, ZTE, Coolpad, Lenovo, and Huawei,” researchers state.

“Tian Pai may not be a direct participant in the campaign. Yet, this correlates with our hypothesis that the malware entered the user’s device before purchase.”

The RottenSys adware can manifest in a number of ways. On one Xiaomi Redmi device the malware was disguised as ‘System WiFi service’ – a service that does not provide any WiFi services but instead asks for Android permissions including user calendar read access, silent download permission and accessibility service permission.

The malware uses the Tencent ads platform (Guang Dian Tong) and Baidu ad exchange to conduct its ad fraud.

Check Point researchers say the malware uses two techniques to evade detection. It postpones its operations between the app and its actions to avoid connection. It also contains a dropper component that doesn’t contain any malicious activity.

However, when the device is activated and dropper is installed, it contacts its command & Control server that downloads the malicious code.

RottenSys also relies on an open source framework called MarsDaemon. The framework hinders device performance and contributes to battery drain. The framework is available on GitHub.

Chinese Android users have complained about RottenSys’s side effects and its tendency to display ‘aggressive’ home screen advertisements.

“In the past 10 days alone, it popped aggressive ads 13,250,756 times (called impressions in the ad industry), and 548,822 of which were translated into ad clicks.”

Those ads could be bringing in 20 cents per each click and 40 cents for each thousand impressions – resulting in more than $115,000 in revenue for attackers.

Researchers suggest that attackers are also using the same command and control server to test a new botnet campaign since February this year.

“The attackers plan to leverage Tencent’s Tinker application virtualization framework as a dropper mechanism. The payload which will be distributed can turn the victim device into a slave in a larger botnet,” they explain.

“This botnet will have extensive capabilities including silently installing additional apps and UI automation. Interestingly, a part of the controlling mechanism of the botnet is implemented in Lua scripts. Without intervention, the attackers could re-use their existing malware distribution channel and soon grasp control over millions of devices.”

Recommendations:

If your brand new phone is suffering from unknown ads on the home screen, please go to Android system settings, then to app manager, and look for the following possible malware package names and uninstall them:

Cisco expands security capabilities of SD­-WAN portfolio
Until now, SD-­WAN solutions have forced IT to choose between application experience or security.
AlgoSec delivers native security management for Azure Firewall
AlgoSec’s new solution will allow a central management capability for Azure Firewall, Microsoft's new cloud-native firewall-as-a-service.
How to configure your firewall for maximum effectiveness
ManageEngine offers some firewall best practices that can help security admins handle the conundrum of speed vs security.
Exclusive: Why botnets will swarm IoT devices
“What if these nodes were able to make autonomous decisions with minimal supervision, use their collective intelligence to solve problems?”
Why you should leverage a next-gen firewall platform
Through full lifecycle-based threat detection and prevention, organisations are able to manage the entire threat lifecycle without adding additional solutions.
The quid pro quo in the IoT age
Consumer consciousness around data privacy, security and stewardship has increased tenfold in recent years, forcing businesses to make customer privacy a business imperative.
ForeScout acquires OT security company SecurityMatters for US$113mil
Recent cyberattacks, such as WannaCry, NotPetya and Triton, demonstrated how vulnerable OT networks can result in significant business disruption and financial loss.
Exclusive: Fileless malware driving uptake of behavioural analytics
Fileless malware often finds its way into organisations via web browsers (or in combination with other vectors such as infected USB drives).