Malicious Apps Get Back on the Play Store Just by Changing Their Name (bleepingcomputer.com) 56
Malicious Android apps that have been previously reported to Google are showing up again on company's marquee Play Store with new names, security researchers are reporting. BleepingComputer: Seven of these apps have been "rediscovered," said Symantec in a report published yesterday. The company's experts say the author of the original malicious apps didn't do anything special, but only changed the app's names, without making modifications to the code, and re-uploaded the apps on the Play Store from a new developer account under a new name. Symantec says it detected seven of these re-uploaded apps on the Play Store, which it re-reported to Google's security team and had them taken down again.
Google can't be bothered? (Score:2)
To vet the software it makes available?
Re:Google can't be bothered? (Score:4, Insightful)
Re: (Score:2)
A butthurt RAT has been impersonating me for MONTHS and it's PISSING me off. It's infuriating to see an anonymous UNIDENTIFIABLE TROLL pretending to be me on a daily basis and it needs to STOP.
I don't see any impersonation here. Anonymous Coward posts anonymously.
Anyhow, if you don't like seeing that, can't you just block her with an adblocker that allows blocking a div element of class commentBody that contains both bold tags and "APK"?
Re: (Score:2)
To vet the software it makes available?
That's the REAL joke: They say they already DO that.
Oh No! they banned us (Score:3)
I guess we should just quit and go home. Or we could just try again.
Re: (Score:2)
If adding exclamations and numbers work for changing passwords, why wouldn't it work for apps?
Seems Google doesn't check anything but your email (Score:5, Insightful)
If there is an actual vetting process, it's a joke. So much for diligence, trustworthiness, and looking out for the security of their Android users, who dominate worldwide consumers of their "product".
Re: (Score:2)
Re: (Score:2)
Re:Seems Google doesn't check anything but your em (Score:5, Informative)
Re: (Score:3)
They failed at an even simpler level than that. They could have just kept checksums of the code objects in known malicious apps and automatically removed any other apps that match that checksum
Since the name is part of the package contents, changing the name will change the checksum. For that matter, just re-signing the package (even with the same key, much less a different key) will change the checksum. Your very simple countermeasure couldn't actually work at the package level. It might work at a lower level, disassembling the package and storing checksums of individual .class, etc. files, but the naive approach would produce a lot of false positives, because Android apps (including malicious
Re: (Score:2)
A definite point. But you could do checksums of random sections of the code. You'd get false positives, that you'd need to screen out, of course, and even a few false negatives, if blocks of code got switched during compilation or linking, and your checksum straddled a block boundary. The larger a block of code you checked, the fewer false positives you would get, but the more false negatives. So you pick a medium to small block of code, and scan several blocks per submission. You'd still need to chec
Re: (Score:2)
if you got the sizes right you should do a pretty fair job that would have very few false negatives. and not too many false positives.
Maybe, maybe not. You're making a lot of guesses -- which isn't bad unless you start assuming that your guesses are guaranteed to be right. In fact that's pretty much how this space works; people guess at what might work, evaluate the data, then try it if it looks promising. it's entirely possible that something like this was tried and found not to work as well as you're guessing it would. I know the people on the malware scanning team and they're very good. I know this example looks bad, but the problem is
Re: (Score:2)
Actually, I think the real problem would be that the right block sizes would require too much computing. But you're right, it would take a LOT of testing. And it's quite possible that there's no "one size fits all" right block size.
How is this possible? (Score:2)
Re: (Score:3)
The A in AI does stand for 'artificial' and not 'accurate.'
Re: (Score:2)
I'm thinking the 'I' should stand for 'Inflated' as well.
In Soviet Russia (Score:5, Insightful)
Re: (Score:1)
You are confusing 3 different things. 1) Being able to make an app 2) Coming up with an app idea that is popular 3) Monetizing your idea. They are all totally different problems.
This Is Why You Get Your Apps On F-Droid (Score:1)
There's at least two orders of magnitude more malware on a per-app basis at Google Play than at F-Droid.
Re: (Score:2)
There's at least two orders of magnitude more malware on a per-app basis at Google Play than at F-Droid.
And about Infinity-times more than on the Apple App Store.
Re: (Score:3)
Yes, but the Apple App store does not distribute apps that will run on any of my equipment.
Sounds like you have the wrong equipment.
Re: run a hash on the APK (Score:1)
If you're not logged in under it, it's not your name.
That's Google! (Score:2)
Great ideas falling from their ears.
And SHIT IMPLEMENTATION WITH NO SUPPORT.