Trojan Dropper Malware Found In CamScanner Android App With 100+ Million Downloads (bleepingcomputer.com) 34
Kaspersky security researchers have discovered a Trojan Dropper malicious module hidden within the Android app CamScanner that's been downloaded over 100 million times on the Google Play Store. After they reported their findings, Google removed the app, but added, "it looks like the app developers got rid of the malicious code with the latest update of CamScanner." They conclude: "Keep in mind, though, that versions of the app vary for different devices, and some of them may still contain malicious code." BleepingComputer reports: As a confirmation to sudden increases in negative ratings and user reviews usually pointing out to something not exactly going right with an app, the researchers found "that the developer added an advertising library to it that contains a malicious dropper component." In this case, while CamScanner was initially a legitimate Android app using in-app purchases and ad-based monetization, "at some point, that changed, and recent versions of the app shipped with an advertising library containing a malicious module," says Kaspersky.
The module dubbed Trojan-Dropper.AndroidOS.Necro.n is a Trojan Dropper, a malware strain used to download and install a Trojan Downloader on already compromised Android devices which can be employed to infect the infected smartphones or tablets with other malware. When the CamScanner app is launched on the Android device, the dropper decrypts and executes malicious code stored within a mutter.zip file discovered in the app's resources. "As a result, the owners of the module can use an infected device to their benefit in any way they see fit, from showing the victim intrusive advertising to stealing money from their mobile account by charging paid subscriptions," found the researchers.
The module dubbed Trojan-Dropper.AndroidOS.Necro.n is a Trojan Dropper, a malware strain used to download and install a Trojan Downloader on already compromised Android devices which can be employed to infect the infected smartphones or tablets with other malware. When the CamScanner app is launched on the Android device, the dropper decrypts and executes malicious code stored within a mutter.zip file discovered in the app's resources. "As a result, the owners of the module can use an infected device to their benefit in any way they see fit, from showing the victim intrusive advertising to stealing money from their mobile account by charging paid subscriptions," found the researchers.
Re: (Score:1)
Re: (Score:2)
It works and works well, if you know how to wriggle around their premium services. I've taken snaps of documents and created PDFs of them out in the field, then fired them off at people by email, surprising them with the speed of the turnaround. It works and works well, just keep clear of their cloud service.
Re: (Score:1)
What users get for free is not like the expert attention needed for the paying ads?
Its an ad brand. To show ads to users.
Mobile Account? (Score:1)
""As a result, the owners of the module can use an infected device to their benefit in any way they see fit, from showing the victim intrusive advertising to stealing money from their mobile account by charging paid subscriptions," found the researchers."
What the hell is a "mobile account"?
Re:Mobile Account? (Score:5, Interesting)
Re: (Score:2)
This is one of my main concern about using smart phones for important stuff. We are encouraged to install random crap from random people and at the same time use it for things like banking, payments etc. There is a permission system but we are taught to ignore it just like the Windows "security" nag boxes of old. Important permissions should have been in bold-faced blinking red and excessive permissions (like network access for a flashlight) should not be allowed at all. It should be possible to sort apps
Re: (Score:2)
Or everything wanting access to my contacts list. This reminds me of the time I needed a flashlight to plug something into my PC under my desk without removing the whole thing. All the flashlights I found had flat batteries, couldn't find fresh batteries, so I thought I would just use my cellphone flash as a torch (which is built in nowadays, but it wasn't then). Every single app I downloaded asked for ridiculous permissions (other than camera) and I refused. Ended u
Re: (Score:1)
All you needed was to open any app or menu that produces a nearly all white display. That's all these flashlight apps really do. Yeah some can do different colors, or psychedelic effects, or whatever but this is not needed at all if you just need a flashlight.
iOS vs droid (Score:1, Interesting)
Re: (Score:2)
Re: (Score:2)
Re: iOS vs droid (Score:1)
Re: (Score:2)
Re: iOS vs droid (Score:1)
Re: (Score:2)
Re: iOS vs droid (Score:1)
Re: (Score:2)
Re: iOS vs droid (Score:1)
Re: (Score:2)
Re: iOS vs droid (Score:1)
Re: (Score:2)
Was a Useful App (Score:1)
...and now it is deleted from my phone. Never signed up for the cloud storage service.
Thanks again to (Score:1)
Detection and Cleanup (Score:3)
I have used CamScanner often. How do I detect if I am infected? Neither BitDefender nor ESET found any problems. I am wary of installing Kaspersky :-(
How do I remove and cleanup any problems?
Re: Detection and Cleanup (Score:1)
Re: (Score:2)
I have used CamScanner often. How do I detect if I am infected? Neither BitDefender nor ESET found any problems. I am wary of installing Kaspersky :-(
How do I remove and cleanup any problems?
AFAICT, there's no evidence that this trojan dropper carried any payload capable of breaching the app sandbox, so uninstalling the app and deleting all files in the shared data space (go to Settings -> Storage -> Files) should take care of it. If you want to be completely certain, factory reset your phone.
Also, a comment on Android anti-virus apps... you're completely right to be wary of Kaspersky, but you should be wary of all of them. Unless you've rooted your device (in which case my previous c
I uninstalled mine... (Score:2)
And now I'm waiting for it to return. I've used it in the past and it is a well made app, suitable for contractors or work abroad where you don't have access to a scanner or PDF converter.
Re: (Score:2)
I have used the paid version for many years now (not any subscription, just the license) - it has always worked well for me. I may try Office Lens instead now, but I think that the paid version, since it didn't have the ad framework, is likely not affected. I'm basing this on speculation, though, so don't take my word for it.
Re: (Score:2)
Those figures (Score:1)
I keep hearing about how X app has 100 million plus downloads, and yet I never hear about it until it's mentioned here on Slashdot, or other sites when there is malware involved. And I am very much in the know about these things.
I think these kind of numbers are artificially inflated, and likely by the botnet that the unfortunate few who download X are now unwittingly part of. "ooh, this app has 100M+ downloads! It must be legit!"
Google might want to look into patching the hole in Google Play that