- Did Britain’s head Brexiter hide in a bus to avoid getting hit by a milkshake? 4 Years Ago
- This woman who thought she saw a handmaid about to jump from a building is very relieved 4 Years Ago
- Michael Avenatti allegedly defrauded Stormy Daniels to pay for a Ferrari 4 Years Ago
- HBO has no plans for an Arya Stark spinoff series 4 Years Ago
- Republicans and Democrats agree on dangers of facial recognition tech Today 3:18 PM
- Amazon is using video games and ‘swag bucks’ to incentivize workers Today 3:04 PM
- Here’s what’s coming and going on Netflix in June Today 2:46 PM
- This Michael Jackson makeup meme is sweeping TikTok Today 2:45 PM
- Homophobic preacher wants Pete Buttigieg to renounce fisting and rimming Today 2:33 PM
- ‘The Liar, the Snitch, and the War Crimes’: Twitter roasts news of Trump Jr. book deal Today 12:36 PM
- Polar Peak in Fortnite is cracking, and players think a dragon may be beneath the ice Today 12:07 PM
- ‘Rise of Skywalker’ first look reveals mysterious new characters Today 12:00 PM
- Meet the anti-choice, pro-NRA Trump supporter challenging Rep. Justin Amash Today 11:51 AM
- Moby attempts to prove he dated Natalie Portman with a shirtless photo Today 11:39 AM
- After feuding with James Charles, Tati Westbrook angers the YouTube community Today 11:06 AM
A sneaky Android virus infected apps in the Google Play Store and third-party markets
Infected apps included fakes of popular games like Candy Crush.
Some of Android‘s most popular games have been tainted by a virus installed in fake versions of the games that lets hackers take control of victims’ phones and add them to a botnet, according to new research from the Slovakian security firm ESET.
Infected games posing as Candy Crush, Temple Run, and Plants vs. Zombies 2 are among those on the Google Play Store that were affected by the Mapin virus from the end of 2013 until the end of 2014. The fake version of Plants vs. Zombies 2 alone was downloaded tens of thousands of times over the course of a year while it was infected, after which it was finally pulled from the store.
The fact that Mapin made it onto Google’s official app store means that it fooled Google’s security software, Bouncer, for nearly a year and a half.
Mapin also hit third-party Android software markets, affecting more than a dozen apps there in the last two years. Many of these apps are still available outside of the official Google Play Store.
Nearly 75 percent of infections have hit India, according to the researchers.
The Mapin trojan takes a patient and clever attack route by waiting a full 24 hours before executing, so that the infected games don’t seem responsible for problematic behavior.
Instead, the user is led to believe that the phone itself asking to install new software called Google Play Update or Manage Settings—authoritative names for nefarious tools.
“The average user will be convinced that this is some important update and at some point is likely to install it just to get rid of this notification,” the researchers told the Daily Dot.
After successfully installing itself, the trojan demands administrative privileges from the user so that it can’t be removed. By then, Mapin has connected back to a command-and-control server through which the hackers can pull the strings.
To add insult to injury, the trojan serves advertisements to the user, interrupting every action with full-screen commercials.
To help protect yourself against threats like this, ESET researchers recommend sticking to trustworthy developers and reading app permission requests closely when installing new software. If a request stands out as unjustifiable, something might be wrong.
Clarification: The apps being attacked by the Android/Mapin Trojan are not the actual popular arcade games, but rather fake versions of those apps that are also available in Google Play as well as third-party stores.
Screengrab via Palo Alto Networks/Google Play
Patrick Howell O'Neill is a notable cybersecurity reporter whose work has focused on the dark net, national security, and law enforcement. A former senior writer at the Daily Dot, O'Neill joined CyberScoop in October 2016. I am a cybersecurity journalist at CyberScoop. I cover the security industry, national security and law enforcement.