Mobile app developers need to be more vigilant about the security of their apps, being mindful when granting permission requests that criminals could exploit for profit.
This is one of the recommendations in the McAfee Labs Threats Report: June 2014, which reveals mobile malware tactics that abuse the popularity, features, and vulnerabilities of legitimate apps and services, including malware-infested clones masquerading as the popular mobile game Flappy Birds.
The manipulation of legitimate mobile apps and services played a key role in the expansion of mobile malware at the beginning of 2014.
McAfee Labs found that 79% of sampled clones of the Flappy Birds game contained malware. Through these clones, perpetrators were able to make phone calls without user permission, install additional apps, extract contact list data, track geo-location, and establish root access for uninhibited control over anything on the device, including the recording, sending, and receiving of SMS messages.
Beyond app reputation, McAfee Labs saw notable examples of mobile malware that take advantage of the features of trusted apps and services, including:
* Android/BadInst.A: This malicious mobile app abuses app store account authentication and authorisation to automatically download, install, and launch other apps without user permission;
* Android/Waller.A: This Trojan exploits a flaw in a legitimate digital wallet service to commandeer its money-transfer protocol and transfer money to the attacker’s servers; and
* Android/Balloonpopper.A: this Trojan exploits an encryption method weakness in the popular messaging app WhatsApp, allowing attackers to intercept and share conversations and photos without users’ permission.
“We tend to trust the names we know on the internet and risk compromising our safety if it means gaining what we most desire,” says Vincent Weafer, senior vice-president for McAfee Labs.
“The year 2014 has already given us ample evidence that mobile malware developers are playing on these inclinations, to manipulate the familiar, legitimate features in the mobile apps and services we recognise and trust. Developers must become more vigilant with the controls they build into these apps, and users must be more mindful of what permissions they grant.”
Additional key finding from the study include:
* Mobile on the move – McAfee Labs’ “zoo” of mobile malware samples grew by 167% between Q1 2013 and Q1 2014;
* Suspicious URLs – new suspect URLs set a three-month record with more than 18-million, a 19% increase over Q4 2013 and the fourth straight quarterly increase;
* Signed malware – new malicious signed binaries remain a popular form of attack, increasing by 46% in the first quarter of 2014;
* Master boot record malware – new threats attacking the master boot record increased by 49% in the first quarter, reaching an all-time high for a single quarter;
* Ransomware in repose – ransomware sample counts have dropped for three straight quarters; and
* Botnets and currency mining – McAfee Labs saw botnet providers include virtual currency mining capabilities with their services, reflecting the increasing popularity of digital currencies such as Bitcoin.