Pokémon Go guide app with half a million downloads hacks Android devices
Security

Pokémon Go guide app with half a million downloads hacks Android devices

Security researchers have found a malicious application on Google Play that had over 500,000 downloads and was designed to gain complete control over Android devices.

The application masqueraded as a guide for the popular Pokémon Go game and used multiple layers of obfuscation to bypass Google Play's malware detection mechanisms, researchers from Kaspersky Lab said in a blog post.

The app contains a malicious module that doesn't execute immediately. Instead, the app waits for another application to be installed or uninstalled in order to determine if it's running on a real device or in an emulated environment, like the ones used to detect malware.

Once the app determines that it runs on a real device, it waits a further two hours before executing the malicious module, which then connects to a remote server and sends data about the device. The server can instruct the module to download exploits for local privilege escalation vulnerabilities that were discovered in Android between 2012 and 2015.

These are known as root exploits because they grant access to the highest privileged account on Android -- the root account. In other words, successful exploitation will lead to a full compromise of the device.

Google has released patches for all of these vulnerabilities, but because of the fragmentation of the Android ecosystem, there are likely many devices out there that haven't received all the updates.

This doesn't mean that the 500,000 downloads represent the number of compromised devices. Android has local protection features like Verify Apps and SafetyNet that are specifically designed to detect and block known root exploits.

Kaspersky identified over 6,000 successful infections, primarily in Russia, India and Indonesia. "However, since the app is oriented towards English-speaking users, people in such geographies, and more, are also likely to have been hit," the Kaspersky researchers said.

The malicious “Guide for Pokémon Go” app was not the only app in the Google Play store that contained this Trojan module. Kaspersky found other such apps that were in the store at different times since December 2015. Most of the older apps had around 10,000 downloads, but one called "Digital Clock" had more than 100,000 downloads.

Google has done a pretty good job at keeping malware out of its official app store over the past few years, but as this incident shows, malicious applications can still slip through from time to time.

IDG Insider

PREVIOUS ARTICLE

«Asana's new feature lets users 'track anything'

NEXT ARTICLE

Tech leaders, activists call for Obama to pardon Snowden»
author_image
IDG Connect

IDG Connect tackles the tech stories that matter to you

Add Your Comment

Recommended for You

silhouette

Everything you need to know about… Tech Careers

IDG Connect tackles the tech stories that matter to you

kathryn-cave

Blockchain For Dummies: What you really need to know

Kathryn Cave looks at the big trends in global tech

martin-veitch-thumbnail

What we know and don’t know about digital transformation

Martin Veitch's inside track on today’s tech trends

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should companies have Bitcoins on hand in preparation for a Ransomware attack?