Another 14 malicious applications found on Google Play

Posted: August 7, 2013 in IT Security News
Tags: , , , ,

Symantec CorpSymantec reported the detection of new threats in the Android app store.

Service Symantec Security Response has found 14 applications that allow attackers without the user’s direct requests from the device to external resources. Symantec Security Response has detected 14 malicious applications published by the same developer. These applications make the request with the user’s device by directing traffic to a web site needed attackers.

Malicious code running in the background, posing as part of the operating system Android. It receives signals from a number of control servers (C & C), and constantly waiting for the next command request over HTTP. This scheme provides remote management of a wide range of ways you can use. For example, it can help to generate revenue in the systems for the transition to monetize advertising links and banners.

malicious applications found on Google Play

Since the beginning of the Japanese Internet scammers earning per click, continue to produce all new applications on Google Play. And while many of these applications are deleted by administrators within hours of the publication, some can survive for several days. Despite a short life cycle, attackers continue to produce malicious applications to Google Play. Manipulation of the search engine Google Play could allow attackers to withdraw their application to the top positions on the search keywords. In many cases, identify the malicious nature of the applications is difficult, testing each application manually, and subjecting it to deep analysis.

Malicious component is contained in the following applications published on Google Play:

  • com.cyworld.ncamera
  • com.kth.thbdvyPuddingCamera
  • com.tni.pgdnaaeTasKillerFull
  • com.greencod.wqbadtraffic
  • com.teamlava.nbsbubble
  • com.bestappshouse.vpiperoll2ages
  • com.ledong.hamusicbox
  • com.ktls.wlxscandandclear
  • maxstrom.game.hvihnletfindbeautyhd
  • org.woodroid.muhflbalarmlady
  • com.lxsj.rbaqiirdiylock
  • com.neaststudios.wnkvprocapture
  • com.gamempire.cqtetris

These infected programs mainly relate to popular categories such as games and application software, for example, to work with the phone’s camera. Symantec has identified these applications as Android.Malapp, and Google was sent a message of their presence.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s