This Thanksgiving deals on your private data too

In a matter of years, weโ€™ve seen Black Friday and Cyber Monday become two of the most anticipated days of the calendar year. While consumers eagerly await the chance to buy this seasonโ€™s hottest gifts, what they donโ€™t realize is that hackers are also anticipating a holiday treat: their personal data. This weekend, Zscaler uncovered a campaign where malware turning the holiday shopping season into an opportunity to scam large number of people by creating fake apps offering early access to Amazon.com Black Friday and Cyber Monday offers and deals.

The Zscaler research team recently came across one such fake amazon app which was masked as an Amazon.com Black Friday deals app, but actually intended to collect victim’s personal data. The URL from where this fake app is downloaded is as shown below:

  • URL : ย http[:]//amazon[.]de[.]offer47263[.]cc/amazon[.]apk
From the URL it can be observed that the malware authors are using cyber squatting to fool the victim and portraying itself as a legitimate Amazon site.

Once the application gets installed it disguises itself as a legit Amazon app.

Icon

When the user starts this installed fake Amazon app, it loads another app named “com.android.engine” as seen below.

Loading application dynamically

This newly loaded child application asks for administrative privileges and other risky permissions like sending SMS and dialing phone numbers.

Permissions

This newly loaded app will first register itself as a service. Even if we remove the fake Amazon app, the “com.android.engine” app will stay persistent and keep doing its activity in the background. Once this malicious app is installed on the victim’s phone, the fake Amazon application will start giving the error message: “Device not supported with App”. This forces the victim to delete the fake amazon app thinking that there were some errors while installing it. As the malicious child app does not have any icon, it is quite difficult for the common users to remove the app.
The presence of this app can be seen in Settings>Apps>Running Applications section of device as shown below.

Silently working in backgroud
Administrative access

This loadedย maliciousย application has code for harvesting user’s personal data.

The following code routine present in the app is used to collect victim’s browser history and bookmarks.

Browser data

It is also able to harvest the call logs, received inbox messages and segregate it into sender’s numbers, SMS body, received incoming call number and contact name etc as shown below.

Call logs
Inbox messages
The malicious app also gathers victims contact details.
Contacts
This particular piece of malware was also found to be communicating with an IP address in Canada, “198[.]50[.]169[.]251” on port 4467 probably sending the harvest data through network socket.
Hard coded IP

The following packet capture shows the malware communication with its C&C(Command and Control Center).

 

Packet Capture
Data being sent
Especially during this holiday season, consumers need to be aware of the applications theyโ€™re downloading and stay away from such fake apps. Always install applications from legitimate app stores and websites. Be aware of the permissions asked by the application during installation. Shopping apps should not be asking for access to your contacts or SMS. Keeping an eye on the permissions used by the app can save you from installing such fake apps.
+ posts

The editorial team behind Compare the Cloud made up a unique group of IT specialists, digital marketers and cloud specialists. We understand the industry from both the IT managerโ€™s perspective and the perspective of the IT service provider.

Unlocking Cloud Secrets and How to Stay Ahead in Tech with James Moore

Newsletter

Related articles

Investment Opportunities for Startups and Technologies in AIย 

Although artificial intelligence developed from niche technology has become...

Four Surprising Lessons I’ve Learned Leading Tech Teams

Techies. Geeks. Boffins. Whatever your organisation calls its IT...

A Business Continuity Cheat Sheet

Right, let's be honest. When you hear "business continuity,"...

Challenges of Cloud & Ultima’s Solution to Transform Business

With the way that AWS and Microsoft dominate technology...

Data privacy concerns linger around LLMs training

We have all witnessed the accelerated capabilities of Large...