Abuse of mobile app permissions
Posted on 28 June 2013.
McAfee Labs found that under the camouflage of “free” apps, criminals are able to get consumers to agree to invasive permissions that allow scammers to deploy malware.

The permissions in free apps, funded by adware, leak personal information which ad networks use to serve targeted ads. However, McAfee found that 26 percent of apps are likely more than just adware. SMS scams and rooting exploits were among the most popular types of threats seen across a variety of apps.

“Most consumers don’t understand or even worry about the app permissions they agree to,” said Luis Blando, vice president of mobile product development at McAfee. “Because of that, cybercriminals are increasingly abusing app permissions as an efficient way to deliver mobile malware. Through these agreements mobile consumers are unwittingly putting their personal information into the hands of criminals disguised as ad networks, and opening up endless doors for scammers.”

Premium rate SMS scams: A pricey problem

The report examines Fake Installer, a piece of SMS malware disguised within a free app that sends up to seven messages. At a typical premium rate of $4 USD per message, that “free” app can cost up to $28 USD as the malware tells a consumer’s device to send messages to or receive messages from a premium rate SMS number.

Bogus app ratings: Read between the stars

The report analyzes FakeRun, malware that tricks users in the United States, India, and 64 other countries into giving an app a five-star rating on Google Play. Once an app developer has been rated highly, other apps they publish will be trusted, which creates more opportunities for a criminal to publish and distribute malware-carrying apps.

Malicious apps by category: Games top the list

The report also identifies the most popular apps that carry malware. Of the top 20 downloads of malware-infected apps, games won the popularity contest, followed by personalization and a tie between tools, music, lifestyle (a cover category for adult content) and TV.

Methodology

This report draws on several data sources. The McAfee Labs Global Threat Intelligence database, which provided stats on prevalence of mobile malware, is built through data collected by McAfee Labs directly, through collaboration with third party researchers, and from data collected anonymously from McAfee product users. McAfee conclusions about app sources are based on the data collected directly by our McAfee crawlers (for the zoo figure) or by scans of downloads performed by users of McAfee Mobile Security.

The complete report is available here.





Spotlight

Windows 0-day exploited in ongoing attacks, temporary workarounds offered

Posted on 22 October 2014.  |  A new Windows zero-day vulnerability is being actively exploited in the wild and is primarily a risk to users on servers and workstations that open documents with embedded OLE objects.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Oct 23rd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //