As it turned out, several months later security researchers Jon Oberheide and Charlie Miller discovered - among other things - just what kind of virtual environment Bouncer uses (the QEMU processor emulator) and that all requests coming from Google came from a specific IP block, and made an app that was instructed to behave as a legitimate one every time it detected this specific virtual environment.
Now two more researchers have effectively proved that Bouncer can be rather easily fooled into considering a malicious app harmless.
During a presentation at Black Hat, Trustwave's Nicholas Percoco and Sean Schulte explained that they had created “SMS Blocker,” which appeared to be like any other SMS blocker app on the market, but was also capable of harvest information such as contacts, SMS messages, photos; launching DoS attacks; and even force a web page to load.
And yet, Bouncer repeatedly failed to flag it as malicious.
They also unearthed Bouncer's IP address, so every time the app was hailed and executed by it, it would behave as a legitimate, harmless app.
Time and time again, the researchers added new malicious capabilities to the app, and time and time again, Bouncer would fail to notice the fact.
That went on for two weeks. And only when the team tweaked the app to execute every second did Bouncer notice it and suspend the developer account, Percoco shared with the audience.
He pointed out that everything they did is legitimate and allowed by Google from a developer standpoint, and that this was an oversight in the security they're applying to applications being approved.
During the time “SMS Blocker” was available on the online market, it sported a prohibitively high price in order not to be downloaded by regular customers.
Google has been apprised of the results of the research so that it can make changes and better secure Google Play and its users against malicious individuals.