Android Malware Secretly Subscribes Victims to Premium SMS Services

Share this…

The Android.Trojan.MKero.A malware is making a comeback in Androidland, and this time around, hackers found a method to bundle it with legitimate apps, capable of bypassing Google’s Bouncer app scanning system.

While the malware was first detected in 2014 and was mainly distributed to users installing Android apps from unverified sources, Bitdefender is now reporting on several instances of the trojan being found distributed via the official Google Play Store.

Android Malware Secretly Subscribes Victims to Premium SMS Services

This time around, the malware is packed inside various Android games, and after infecting users it secretly subscribes them to premium SMS services, all without the user having to take any actions.

Using humans to bypass to CAPTCHA filters

According to Bitdefender’s researchers, the malware uses a clever and complex set of procedures that allows it to bypass various security mechanisms put in place by the premium SMS services to prevent fraud.

First, once on the infected device, the malware starts communicating with a C&C server, from where the URL of a target premium subscription website is loaded.

Android.Trojan.MKero.A then moves on to extract the CAPTCHA image from the subscription form, image which it sends to antigate.com, a Web service that relies on humans to solve image-to-text CAPTCHAs. (How ironic!)

After receiving the CAPTCHA’s solution from antigate.com, the malware subscribes the user to the service, and after receiving, parsing and extracting the confirmation code from an SMS message, it enters the code on the target website, effectively subscribing the user to the premium service.

Attackers are probably members of various affiliate programs

The purpose of infecting users with Android.Trojan.MKero.A and then subscribing them to these kinds of services is simple. The attacker is probably participating in various affiliates programs in relation to those services, and has monetary gains from each user it brings in.

“Considering the malware has been built with convert capabilities to operate completely silent on the victim’s Android device, user detection and removal is extremely difficult,” says Bitdefender’s Liviu Arsene, who recommends using a mobile antivirus client to perform regular scans of your devices.

Checking your mobile and data bill on regular intervals should also be a good idea, since increased costs that come out of nowhere can be a sign of a malware infection.

Bitdefender’s staff has identified 7 infected gaming apps on Google’s Play Store, all of which have been removed in the meantime.

Mkero_

Source:https://news.softpedia.com/