A new Trojan version from Android Spy family is currently in 155 Android apps that are distributed in the Google Play Store. Once the Trojan infects the device, it collects private information about it and start showing annoying ads. The ads can appear on the top of the phone’s home screen, in other applications or even inside the OS notification area.
Security researchers at Dr.Web are the founders of this new version of Android Spy Trojan. They have also found the names of all apps that are potential plague spots. According to their report over 2.8 million users have already downloaded one of the compromised applications. Even though the experts have informed Google about the threat it seems that many of the apps are not removed from the store yet.
In this article you could find out the list of the names of all compromised apps and stay away from them.
Distribution of Android.Spy.305
Android.Spy.305 is enforced via an advertising Software Development Kit (SDK) platform. The purpose of this platform is to generate earnings from application downloads. It is built-in variety of applications distributed via Google Play and other app stores. The intense increase of mobile malware attacks should alert all Android users to be very careful when downloading applications from app stores. Google Play Store is not an exception even though it was considered reliable.
Commonly used kinds of software applications like photo editors, utilities, live wallpapers, image catalogs, radio apps are among the malicious apps that distribute the Android.Spy.305 Trojan. Currently, the number of risky apps counts 155. The security researchers have registered over 2.8 million downloads. There is evidence of at least seven developers that have implemented the fraudulent practice. Android.Spy.305 is embedded into apps of Fatty Studio, Doril Radio.FM, Gig Mobile, Sigourney Studio, MaxMitek Inc, Finch Peach Mobile Apps, TrueApp Lab, and Mothrr Mobile Apps.
Dr.Web specialists have found Android.Spy.305 in the following apps:
The Malicious Impact of Android.Spy.305 Trojan
It seems that once the malicious app is launched on your device, Android.Spy.305 connects to its command and control (C&C) server and sends a request. Then another module that contains the malicious payload of the threat is downloaded. When Android.Spy.305 is executed it starts to collect the following information on the user’s device:
- Screen resolution
- Email address connected to the Google user account
- List of installed applications
- OS version
- IMEI identifier
- Current system language
- Name of the device manufacturer
- Mobile device model
- Mobile network operator
- Name of the application containing the Trojan
- Developer’s ID
- SDK platform’s version
Next, it sends the gathered information to its C&C server.
The main purpose of this Trojan is to deliver annoying advertisements. The ads pop up on the home screen, on top of running applications and on the operating system interface. It is best to avoid clicking on these ads. Furthermore, Android.Spy.305 Trojan may display pop-up messages and try to convince the user to download other programs. The pop-up messages may claim that the device is infected with malware.
Unfortunately, sometimes even Google Paly Store is not an entirely secure source of software for Android as mentioned before. Various types of malicious software try to endanger Android users. Android.Spy.305 Trojan is yet another proof. The intense emerge of new devastating threats should alert Android users to be extra cautious before downloading software. Always pay attention to negative feedback from other users and download software created only by trusted developers.