Check Point Researchers recently discovered a new variant of mobile malware that has quietly infected around 25 -million devices, while the user remains completely unaware.
Disguised as a Google related application, the core part of the malware exploits various known Android vulnerabilities and automatically replaces installed apps on the device with malicious versions without the user’s interaction.
So far, the primary victims are based in India though other Asian countries such as Pakistan and Bangladesh are also impacted, as are even a noticeable number of devices in the UK, Australia and the US. Check Point has worked closely with Google and at the time of publishing, no malicious apps remain on the Play Store.
Dubbed “Agent Smith”, the malware currently uses its broad access to the device’s resources to show fraudulent ads for financial gain. This activity resembles previous campaigns such as Gooligan, Hummingbad and CopyCat malware and can infect all smartphones updated beyond even Android v.7.
In this case, “Agent Smith” is being used to for financial gain through the use of malicious advertisements.
However, it could easily be used for far more intrusive and harmful purposes such as banking credential theft and eavesdropping. Indeed, due to its ability to hide its icon from the launcher and impersonate existing user-trusted popular apps, there are endless possibilities for this sort of malware to harm a user’s device.
“Agent Smith” has three phases in its attack flow.
In the first phase, the attacker lures users to download a dropper application from an app store such as 9Apps. These droppers are usually disguised as free games, utility applications or adult entertainment applications, yet contain an encrypted malicious payload. The dropper application then checks if any popular applications, such apps include WhatsApp, MXplayer, ShareIt and more from the attacker’s pre-determined list, are installed on the device. If any targeted application is found, “Agent Smith” will then attack those innocent applications at a later stage.
In the second phase, after the dropper gains a foothold on victim device, it automatically decrypts the malicious payload into its original form – an APK (Android installation file) file which serves as the core part of “Agent Smith’s attack. The dropper then abuses several known system vulnerabilities to install the core malware without any user interaction at all.
In the third phase, the core malware conducts attacks against each installed application on the device which appears on its target list. The core malware quietly extracts a given innocent application’s APK file, patches it with extra malicious modules and finally abuses a further set of system vulnerabilities to silently swap the innocent version with a malicious one.
As “Agent Smith” was originally downloaded from the widely used third party app store, 9Apps, targeted mostly at Indian (Hindi), Arabic, Russian, Indonesian speaking users, it is not surprising that it reached such a high infection rate. After all, third party app stores often lack the security measures required to block adware loaded apps.
With such a devious infection method of replacing existing device apps with the malicious version of those apps, users are reminded that apps should only be downloaded from trusted app stores to mitigate the risk of infection.
Given “Agent Smith’s main approach is to attack user installed applications from third party app stores silently, it is very challenging for common Android users to fight against such threats.