We were alerted in July 2012 about malicious apps that we detect as ANDROIDOS_CONTACTS.E. We investigated the related spam, which arrives on the mobile device. What is noteworthy about this threat is that the spam were distributed not only to smartphones, but also to feature phones as well.
This indicates that the spammers may have carried out indiscriminate attacks targeting the email addresses provided by telecommunication carriers.

Spammers understand users’ tendency to be too trusting, thus they distributed these spam to carrier email addresses to increase their attack’s success.
So far, we can categorize the URLs in these spam into three types:
- URLs that directly lead to download an APK package of Android app
- URLs that lead to a malicious web page disguised as a legitimate app market store
- Shortened URLs
Let’s focus on the 3rd type of URL. When users click the shortened URL, they are lead to a webpage set up by the spammer or their partners. In this scenario, it is possible that it may either lead to the downloading an APK package or to a web page disguised as a legitimate app store.
Why do spammers leverage this shortened URL service? Users find it difficult to double check the complete URL based on the shortened URL, thus the higher rate of users inadvertently clicking a malicious link. Furthermore, some shortened URL services can count user clicks in real-time. So if a particular link had less clicks, spammers can use a different shortened link which had more clicks in their future spam run.
Now, let’s focus on those URLs that lead users to a spoofed app store. We found the app “Power Charge”, also detected as ANDROIDOS_CONTACTS.E, which is supposedly an app that charges by using solar light.

In the evaluation section of the web page, we saw some good feedback, though it does not have a section where users can rate the app. The feedback may be spoofed and is used to trick users to bolster the apps credibility.
Here is a list of apps we detect as ANDROIDOS_CONTACTS.E that users may encounter via spam mails.

In our follow up blog entry, we’ll take a look at a particular app detected as ANDROIDOS_CONTACTS.E, specifically its information theft routine.
Leave a reply