The Latest in IT Security

Android.Exprespam Authors Revamp Gcogle Play to Android Express’s Play

15
Jan
2013

When Android.Exprespam was discovered earlier this month, we quickly posted a blog warning users about the malware and discussing the details of the attack. Word spread quickly as the media, as well as the local authorities, pushed the news out to a wide audience. It seems like the scammers thought the news had reached enough people and that it was time they updated the malware and the fake market in order to start their attack afresh with new content that people are not familiar with.

The new fake market is called ANDROID EXPRESS’s PLAY (ANDROID EXPRESS?PLAY in Japanese). According to the site, it is maintained by Gcogle.

Figure 1. App page showing the name of the fake Google Play site

The domain name for the market was registered on January 7, which coincidently is the date when our blog was published. The signature of the malicious Android app is signed to be valid from January 9, 2013.

The scam, as in the past, starts off with spam emails that look like a newsletter advertising Android apps. An example of the spam mail can be seen below (Figure 2). It is worth noting that the content of the spam varies and could be updated at any time.

Figure 2. Example of spam email

The new lineup of non-existing apps the scammers have prepared are listed in the table below.  They include some new interesting types of app such as a spam blocker, a TV viewer for phones that do not have a TV function, a database for recipes from famous chefs, and a battery discharger app.

Figure 3. Example app page from fake market

Ultimately, attempting to download any of the nine apps leads to the same malicious app called Android ??????. Once the malicious app is executed, personal information, including the device’s phone number and the names and email addresses stored in Contacts, is uploaded to a remote location.

This group of scammers does not seem to want to go away any time soon, so we may have to continue to play this cat-and-mouse game with them for a while.  We are also aware of at least two more similar scams currently targeting Japanese Android users (Android.Enesoluty and Android.Ecobatry) although these have not updated their content on the fake market sites. 

To stay protected, please refrain from clicking on links in emails from unknown senders and do not download apps from untrusted vendors. Users who have Symantec’s security apps, such as Norton Mobile Security or Symantec Mobile Security, are protected from this threat-detected as Android.Exprespam.  For general safety tips for smartphones and tablets, please visit our Mobile Security website.

Leave a reply


Categories

SATURDAY, NOVEMBER 18, 2017

Featured

Archives

Latest Comments

Social Networks