Fake Netflix App on Google Play Spreads Malware Via WhatsApp
Reading Time: 1 Minute
Malware disguised as a Netflix app, lurking on the Google Play store, spread through WhatsApp messages, researchers have discovered.
According to a Check Point Research analysis released on Wednesday, the malware masqueraded as an app called “FlixOnline,” which advertised via WhatsApp messages promising “2 Months of Netflix Premium Free Anywhere in the World for 60 days.” But once installed, the malware sets about stealing data and credentials.
The malware was designed to listen for incoming WhatsApp messages and automatically respond to any that the victims receive, with the content of the response crafted by the adversaries. The responses attempted to lure others with the offer of a free Netflix service, and contained links to a fake Netflix site that phished for credentials and credit card information, researchers said.
“The app turned out to be a fake service that claims to allow users to view Netflix content from around the world on their mobiles,” according to the analysis. “However, instead of allowing the mobile user to view Netflix content, the application is actually designed to monitor a user’s WhatsApp notifications, sending automatic replies to a user’s incoming messages using content that it receives from a remote server.”
The malware was also able to self-propagate, sending messages to users’ WhatsApp contacts and groups with links to the fake app. To that end, the automated messages read, “2 Months of Netflix Premium Free at no cost For REASON OF QUARANTINE (CORONA VIRUS)* Get 2 Months of Netflix Premium Free anywhere in the world for 60 days. Get it now HERE [Bitly link].”
Over the course of two months that the app was live on Google Play, the malware racked up 500 victims, according to Check Point. The firm alerted Google to the malware, which took the app down. However, “the malware family is likely here to stay and may return hidden in a different app,” researchers warned.
“The malware’s technique is fairly new and innovative,” Aviran Hazum, manager of Mobile Intelligence at Check Point, said in the analysis. “The technique here is to hijack the connection to WhatsApp by capturing notifications, along with the ability to take predefined actions, like ‘dismiss’ or ‘reply’ via the Notification Manager. The fact that the malware was able to be disguised so easily and ultimately bypass Play Store’s protections raises some serious red flags.”
See Also: Offensive Security Tool: DirDar
Malware-Laced Apps on Google Play
The official Android app store is unfortunately no stranger to malicious and trojanized apps. In March for instance, nine malicious apps were found on Google Play, harboring a malware dropper that paves the way for attackers to remotely steal financial data from Android phones. And in January, Google booted 164 apps, collectively downloaded a total of 10 million times, because they were delivering disruptive ads.
Meanwhile last year, the Joker malware continued to plague Google Play apps. Joker, which has been around since 2017, is a mobile trojan specializing in a type of billing fraud known as “fleeceware.” The Joker apps advertise themselves as legitimate apps (like games, wallpapers, messengers, translators and photo editors, mainly). Once installed, they simulate clicks and intercept SMS messages to subscribe victims to unwanted, paid premium services. The apps also steal SMS messages, contact lists and device information.
How Can Android Users Protect Themselves?
To protect against this type of malware, users should be wary of download links or attachments received via WhatsApp or other messaging apps, even when they appear to come from trusted contacts or messaging groups, Check Point noted.
If users find themselves with a fake app, they should immediately remove the suspect application from the device, and proceed to change all passwords.
Source: threatpost.com
(Click Link)