top of page

Sneaky Versioning: How Malicious Apps Bypass Google Play Store Scanners

Rabah Moula

Updated: Aug 10, 2023



The Android ecosystem is no stranger to threats. As one of the most prevalent operating systems globally, Android devices are prime targets for cybercriminals. Recently, a sneaky technique known as 'versioning' has been leveraged by threat actors to bypass Google Play Store's malware detection systems.

 

The Subtle Art of Versioning

According to the Google Cybersecurity Action Team (GCAT), versioning has emerged as a common tactic used in campaigns aiming to steal users' credentials, data, and finances. While not a new technique, versioning is extremely challenging to detect due to its stealthy nature.


In this technique, a developer launches an initial version of an app on the Play Store that passes Google's pre-publication checks. This version is benign, but later updates incorporate a malicious component, effectively turning the app into a malicious backdoor.


This transformation is facilitated through an update pushed from an attacker-controlled server that employs dynamic code loading (DCL) to deliver malicious code onto end-user devices. The result is an unsuspecting application that doubles as a Trojan horse.


Past Incidents and Consequences

In May 2023, cybersecurity firm ESET discovered an instance of versioning in a screen recording app named "iRecorder - Screen Recorder." This app remained harmless for nearly a year after its Play Store debut before malicious changes were introduced to spy on its users.


The notorious SharkBot, which frequently appears on the Play Store disguised as security and utility apps, is another example of malware using DCL. It's a financial trojan that initiates unauthorized money transfers from compromised devices.


The Corporate Concern and Solutions

In a corporate setting, versioning serves as a stark reminder of the need for in-depth defense principles. These include limiting application installation sources to trusted ones like Google Play, or managing corporate devices via a mobile device management (MDM) platform.


Cybersecurity incidents in a CSOC (Cybersecurity Operations Center) environment can have serious implications. Versioning could potentially provide backdoor access to critical company data. The solution could involve establishing strict app installation guidelines, regular vulnerability assessments, and rigorous employee cybersecurity training to avoid potential pitfalls.


Mitigating the Threat

To counter these threats, Android users should stick to downloading apps from trusted sources and enable Google Play Protect for notifications regarding potentially harmful apps.



Key Terms:


  • Versioning: A method where a developer releases an app with no harmful components and later updates it with malware.

  • Dynamic Code Loading (DCL): The ability of an application to load and execute code during runtime.

  • SharkBot: A type of malware, particularly a financial trojan, that initiates unauthorized money transfers.

  • Mobile Device Management (MDM) platform: A security software used by IT departments to monitor, manage, and secure employees' mobile devices.




In Summary:

Cybercriminals are using the versioning technique to bypass Google Play Store's malware detections, threatening Android users' data security. High-profile incidents like iRecorder and SharkBot showcase the severe impact of this method. Enterprises need to employ in-depth defense principles and regular security checks to mitigate the risk.

 

What happened?


The Trick: Some developers trick the Google Play Store with apps that initially seem safe. After getting approved, these apps are secretly changed to include harmful elements.

The Deception: This change method, called "versioning," allows the harmful apps to bypass Google's security checks. Users then download what they think is a safe app, but it's not.

Why it worked: Initially, the apps look innocent to both the users and the Play Store. But, with a sneaky update, the developers add malicious parts without being detected.


What was done about it?

Users are advised to only download apps from trusted sources and to use security tools like Google Play Protect to catch any malicious apps.

1 view

Comments


SUBSCRIBE

Sign up to receive news and updates.

Thanks for submitting!

©CyberGuardianNews. 

bottom of page