Business Standard

Role reversal: Now, an app store that could rob you!

Related News

Shom Choudhury, a 29-year-old BPO professional, recently downloaded an application that would act as a doctor for his smartphone by extending its battery life. He searched for the application on the internet and found an site that said the app was for free. Only after downloading did he realise it was not a genuine app. In fact, the app store itself was fake. Choudhury was terrified when he learnt this could be used for stealing information from his device. He, therefore, immediately deleted it.

Malware and fake apps are passé. Attackers are now targeting users by faking the entire app store itself. Symantec observed a 42 per cent increase in mobile vulnerabilities, according to the . Most attacks on the mobile platform that Symantec has observed have been Trojanised versions of Android apps — where attackers inject malicious code into legitimate apps and upload them back into the app store. The new development, however, is the creation of not just a malicious app, but an entire ecosystem thriving around mobile malware, according to Symantec.

Except for the URL, the sites look so genuine that it is difficult to identify whether these are original or fake. Innocent users get lured by popular apps (in reality malware) on offer at throwaway prices or available for free. Security experts feel the Android app market is the particular target of these fake app stores, since it is more popular in India.

Shantanu Ghosh, VP and MD, India Product Operations at, Symantec. says, “An interesting feature of this fake app market is it uses a technique called server-side polymorphism. What this means is that every time a file is downloaded, a unique version of the file is created in order to evade traditional signature-based detection. Symantec detects all of these variants as Android.Opfake. The sites hosting Opfake include either links or buttons that can be used to download the malicious packages purporting to be free versions of the popular Android software.

WHAT USERS CAN DO
* Use app marketplaces hosted by well-known, legitimate vendors for downloading and installing apps 
* Always check the URL to confirm legitimacy 
* Adjust Android OS application settings to stop the installation of non-market apps
* Review other users’ comments on the marketplace to assist in determining if an app is safe before downloading
* Check the access permissions being requested for installation. If these seem excessive for what the application is designed to do, don’t install
* Utilise a mobile security solution on devices to ensure that downloaded apps are not malicious
* Do not use Google to search for apps; use the app icon of your device
* Don’t get tricked by sites offering free apps

Every time the threat is downloaded, the applications morph themselves automatically. “In addition, manual modifications are also made every few days, indicating that the malware authors actively nurture this malware family,” he says.

Quick Heal Technologies has also spotted this trend in India. Sanjay Katkar, Co-Founder & CTO, Quick Heal Technologies, informs he had seen these cases mostly in the Android marketplace, where the user could realise he/she had downloaded an app from a fake store only after installation. “It is difficult to remove the threat caused by the app, as at present, no technology can scan the mobile phone completely,” says Katkar.

Govind Rammurthy, MD & CEO, eScan, says his company, too, has noticed fake app stores luring customers to download apps hosted on these. “Comparatively in India, it is in a nascent stage. The phenomenon is more global where non-availability of the app stores in certain geographies gives rise to third party ones. Consumers here have the only option of procuring the apps from third-party ones,” says Rammurthy.

He added that apart from the low prices, other offers are related to pre-release apps for a famous app, which turns out to be ad-click fraud or it simply takes over the user’s address book and conducts activities that are more nefarious.

Some experts feel that there is no need to panic about this issue right now. Altaf Halde, MD, Kaspersky Lab-South Asia, opines that though malware attacks have been common through fake apps, fake appstores are a relatively new phenomenon. “Users usually have an official default app marketplace in their phone. As long as they use it carefully, there is no threat.”

Experts also feel that apps being banned in legitimate stores, for violations of policy can find their way in to third party sites. This makes users vulnerable to attacks.

Read more on:   
|
|

Read More

Google Business Photos programme launched in India

Google Business Photos programme is now officially open to businesses in India


Quick Links

Back to Top