CopyCat malware attacked 14 mn smartphones, hackers stole $1.5 mn in 2016

The malware affected users mainly in Southeast Asia

Dealing with the WannaCry ransomware attack
IANS London
Last Updated : Jul 08 2017 | 5:22 PM IST

A CopyCat malware affected over 14 million Android devices last year, rooting eight million of them and earning the hackers behind the attack approximately $1.5 million in fake ad revenues in two months, Israel-based IT security provider Check Point has revealed.

The malware affected users mainly in Southeast Asia and spread to more than 2,80,000 Android users in the US, the company said in a blog post.

"It is unclear who is behind the CopyCat attack, however, there are several connections to MobiSummer, an ad network located in China," it added.

"The malware also refrains from targeting Chinese devices, suggesting the malware developers are Chinese and want to avoid any investigation by local law enforcement, a common tactic in the malware world," the blog post said.

The malware uses a novel technique to generate and steal ad revenues.

According to the researchers, the campaign was spread via popular apps, repackaged with the malware and downloaded from third party app stores, as well as phishing scams.

There was no evidence that CopyCat was distributed on Google Play Store.

In March this year, Check Point informed Google about the CopyCat campaign and how the malware operated.

According to Google, they were able to quell the campaign, and the current number of infected devices is far lower than it was at the time of the campaign's peak.

"Unfortunately, devices infected by CopyCat may still be affected by the malware even today," Check Point said.

The malware uses state-of-the-art technology to conduct various forms of ad fraud.

Upon infection, CopyCat first roots the user's device, allowing the attackers to gain full control of the device and essentially leaving the user defenceless, reseachers said.

CopyCat then injects code into the Zygote app launching process, allowing the attackers to receive revenues by getting credit for fraudulently installing apps by substituting the real referrer's ID with their own, Check Point explained in a blogpost.

The CopyCat campaign reached its peak between April and May in 2016.

(Only the headline and picture of this report may have been reworked by the Business Standard staff; the rest of the content is auto-generated from a syndicated feed.)

*Subscribe to Business Standard digital and get complimentary access to The New York Times

Smart Quarterly

₹900

3 Months

₹300/Month

SAVE 25%

Smart Essential

₹2,700

1 Year

₹225/Month

SAVE 46%
*Complimentary New York Times access for the 2nd year will be given after 12 months

Super Saver

₹3,900

2 Years

₹162/Month

Subscribe

Renews automatically, cancel anytime

Here’s what’s included in our digital subscription plans

Exclusive premium stories online

  • Over 30 premium stories daily, handpicked by our editors

Complimentary Access to The New York Times

  • News, Games, Cooking, Audio, Wirecutter & The Athletic

Business Standard Epaper

  • Digital replica of our daily newspaper — with options to read, save, and share

Curated Newsletters

  • Insights on markets, finance, politics, tech, and more delivered to your inbox

Market Analysis & Investment Insights

  • In-depth market analysis & insights with access to The Smart Investor

Archives

  • Repository of articles and publications dating back to 1997

Ad-free Reading

  • Uninterrupted reading experience with no advertisements

Seamless Access Across All Devices

  • Access Business Standard across devices — mobile, tablet, or PC, via web or app

More From This Section

First Published: Jul 08 2017 | 5:10 PM IST

Next Story