Connect with us

Featured

Malware behind Android alternative

ESET researchers have recently discovered a Turkish alternative Android app that has been spreading malware across all android apps.

ESET researchers discovered that CepKutusu.com, a Turkish alternative Android app store was spreading malware under the guise of all offered Android apps.

When users browsed the Turkish alternative app store CepKutusu.com and proceeded to downloading an app, the “Download now” button led to banking malware instead of the desired app. A few weeks after ESET researchers turned to the store’s operator with the discovery of the attack, the store ceased the malicious activity.

Interestingly, although ESET researchers found the misdirection from a legitimate app to the malicious one to be general – meaning that every single app was set to be replaced with the banking malware, the crooks behind the campaign added an exception. Probably to increase the chance to stay longer under the radar, they introduced a seven-day window of not serving malware after a malicious download. In practice, after the user downloads the infected app, a cookie is set to prevent the malicious system from prevailing, leading to the user being served clean links for next seven days. After this period passes, the user gets redirected to malware once they try to download any application from the store.

The malicious app distributed by the store at the time of the investigation was remotely controlled banking malware capable of intercepting and sending SMS, displaying fake activity, as well as downloading and installing other apps.

When installed, the malware doesn’t mimic the app the user intended to install. Instead, it imitates Flash Player.

Figure 1 – The malicious app served to a user who thinks they are downloading the Clash of Clans game and the legitimate game served to the same user within the seven day period, respectively.

Figure 1 – The malicious app served to a user who thinks they are downloading the Clash of Clans game and the legitimate game served to the same user within the seven day period, respectively.

To gain more insight on this attack and its wider implications, we turned to Lukáš Štefanko, Malware Researcher at ESET, who specializes in Android malware and who discovered the malware-distributing app store.

An app store serving its customers with malware on a mass scale – that sounds like a big threat. On the other hand, serving Flash Player instead of whatever customers wanted – that’s a rather thin disguise… What’s your take on this?

First, let me say that this is the first time I’ve seen an entire Android market infected like that. Within the Windows ecosystem and in browsers, this technique is known to have been used for some time but in the Android ecosystem, it’s really a new attack vector.

As for the impact, what we saw in this particular case was most probably a test. The crooks misused their control of the app store in the simplest manner. Replacing the links to all apps with a link to a single malicious app requires virtually no effort – but it also gives the store’s customers a fair chance to detect the scam. If you got lured into downloading a popular game and ended up with Flash Player instead… I think you’d uninstall it straight away and report the issue, right?

This might explain why we have seen only a few hundred infections.

From this point of view, it doesn’t sound like a big deal …

Well, like I said, it was probably a test. I can imagine a scenario in which the crooks who control the store’s back end append a malicious functionality to each of the apps in the store. Serving those interested in a particular game with a trojanized version of that game… That would remove the biggest red flag and the number of victims might rise significantly.

As for the attribution of this attack – have you found any traces?

There are three possible scenarios here: an app store built with the intention to spread malware; a legitimate app store turned malicious by an employee with bad intentions; and a legitimate app store becoming a victim of a remote attacker.

As for scenarios two and three, I would think that such an attack wouldn’t go unnoticed by a legitimate store. User complaints, suspicious server logs and changes in code should be sufficient indicators for its operators…. The more that the malware was being distributed via the store for weeks. Also of interest in this regard is that we contacted the store operators with our findings but haven’t received any reaction.

How to protect yourself

Recommendations by ESET

·        If possible, always favor downloading apps from official app stores.
This piece of advice is infinitely repeated for a good reason – there’s no guarantee of any security measures in alternative app stores, making them a great place for malware authors to spread their “work”, and not just via single malicious apps, but also on a mass scale, as illustrated in this case.

·         Be cautious when downloading content from the internet. Pay attention to anything suspicious in file name, size and extension – this is where many threats can still be recognized and avoided in time.

·         Use a reliable mobile security solution to protect you from the latest threats. As for the threat hidden in the alternative app store, ESET detects it as Android/Spy.Banker.IE and prevents it from getting downloaded.

Featured

Veeam passes $1bn, prepares for cloud’s ‘Act II’

Leader in cloud-data management reveals how it will harness the next growth phase of the data revolution, writes ARTHUR GOLDSTUCK

Veeam Software, the quiet leader in backup solutions for cloud data management,has announced that it has passed $1-billion in revenues, and is preparing for the next phase of sustained growth in the sector.

Now, it is unveiling what it calls Act II, following five years of rapid growth through modernisation of the data centre. At the VeeamON 2019conferencein Miami this week, company co-founder Ratmir Timashev declared that the opportunities in this new era, focused on managing data for the hybrid cloud, would drive the next phase of growth.

“Veeam created the VMware backup market and has dominated it as the leader for the last decade,” said Timashev, who is also executive vice president for sales and marketing at the organisation. “This was Veeam’s Act I and I am delighted that we have surpassed the $1 billion mark; in 2013 I predicted we’d achieve this in less than six years. 

“However, the market is now changing. Backup is still critical, but customers are now building hybrid clouds with AWS, Azure, IBM and Google, and they need more than just backup. To succeed in this changing environment, Veeam has had to adapt. Veeam, with its 60,000-plus channel and service provider partners and the broadest ecosystem of technology partners, including Cisco, HPE, NetApp, Nutanix and Pure Storage, is best positioned to dominate the new cloud data management in our Act II.”

In South Africa, Veeam expects similar growth. Speaking at the Cisco Connect conference in Sun City this week, country manager Kate Mollett told Gadget’s BRYAN TURNER that the company was doing exceptionally well in this market.

“In financial year 2018, we saw double-digit growth, which was really very encouraging if you consider the state of the economy, and not so much customer sentiment, but customers have been more cautious with how they spend their money. We’ve seen a fluctuation in the currency, so we see customers pausing with big decisions and hoping for a recovery in the Rand-Dollar. But despite all of the negatives, we have double digit growth which is really good. We continue to grow our team and hire.

“From a Veeam perspective, last year we were responsible for Veeam Africa South, which consisted of South Africa, SADC countries, and the Indian Ocean Islands. We’ve now been given the responsibility for the whole of Africa. This is really fantastic because we are now able to drive a single strategy for Africa from South Africa.”

Veeam has been the leading provider of backup, recovery and replication solutions for more than a decade, and is growing rapidly at a time when other players in the backup market are struggling to innovate on demand.

“Backup is not sexy and they made a pretty successful company out of something that others seem to be screwing up,” said Roy Illsley, Distinguished Analyst at Ovum, speaking in Miami after the VeeamOn conference. “Others have not invested much in new products and they don’t solve key challenges that most organisations want solved. Theyre resting on their laurels and are stuck in the physical world of backup instead of embracing the cloud.”

Illsley readily buys into the Veeam tagline. “It just works”. 

“They are very good at marketing but are also a good engineering comany that does produce the goods. Their big strength, that it just works, is a reliable feature they have built into their product portfolio.”

Veeam said in statement from the event that, while it had initially focused on server virtualisation for VMware environments, in recent years it had expanded this core offering. It was now delivering integration with multiple hypervisors, physical servers and endpoints, along with public and software-as-a-service workloads, while partnering with leading cloud, storage, server, hyperconverged (HCI) and application vendors.

This week, it  announced a new “with Veeam”program, which brings in enterprise storage and hyperconverged (HCI) vendors to provide customers with comprehensive secondary storage solutions that combine Veeam software with industry-leading infrastructure systems. Companies like ExaGrid and Nutanix have already announced partnerships.

Timashev said: “From day one, we have focused on partnerships to deliver customer value. Working with our storage and cloud partners, we are delivering choice, flexibility and value to customers of all sizes.”

Continue Reading

Featured

‘Energy scavenging’ funded

As the drive towards a 5G future gathers momentum, the University of Surrey’s research into technology that could power countless internet enabled devices – including those needed for autonomous cars – has won over £1M from the Engineering and Physical Sciences Research Council (EPSRC) and industry partners.

Surrey’s Advanced Technology Institute (ATI) has been working on triboelectric nanogenerators (TENG), an energy harvesting technology capable of ‘scavenging’ energy from movements such as human motion, machine vibration, wind and vehicle movements to power small electronic components. 

TENG energy harvesting is based on a combination of electrostatic charging and electrostatic induction, providing high output, peak efficiency and low-cost solutions for small scale electronic devices. It’s thought such devices will be vital for the smart sensors needed to enable driverless cars to work safely, wearable electronics, health sensors in ‘smart hospitals’ and robotics in ‘smart factories.’ 

The ATI will be partnered on this development project with the Georgia Institute of Technology, QinetiQ, MAS Holdings, National Physical Laboratory, Soochow University and Jaguar Land Rover. 

Professor Ravi Silva, Director of the ATI and the principal investigator of the TENG project, said: “TENG technology is ideal to power the next generation of electronic devices due to its small footprint and capacity to integrate into systems we use every day. Here at the ATI, we are constantly looking to develop such advanced technologies leading towards our quest to realise worldwide “free energy”.

“TENGs are an ideal candidate to power the autonomous electronic systems for Internet of Things applications and wearable electronic devices. We believe this research grant will allow us to further the design of optimized energy harvesters.”

Continue Reading

Trending

Copyright © 2019 World Wide Worx