Skip to main content

Hong Kong Google Play Store's Apps Security Risk Report (March 2015)

Release Date: 24 Mar 2015 2518 Views

 

Hong Kong Computer Emergency Response Team (HKCERT) Coordination Centre cooperates with the National Computer Network Emergency Response Technical Team of China (CNCERT) for detecting malicious and suspicious behaviors of Apps from the Google Play Store, in order to study the security risk of apps in the Google Play Store in Hong Kong area. CNCERT provides us analyzed result, and we collate the detection result and publish security alerts to the public.

 

In the report of March, we have downloaded 200 apps from Play Store, where 6 apps have been identified as high risk. None of them were removed from Play Store (on or before 20-Mar). The detail of report is shown as follow.

 

Target scope

  • Top 50 Free Applications in Hong Kong area
  • Top 50 New Free Applications in Hong Kong area
  • Top 50 Free Games in Hong Kong area
  • Top 50 New Free Games in Hong Kong area

 

Scanned Apps

  • Successful downloaded and scanned: 200 apps
  • Unable to download via the system: 0 apps
  • Downloaded date: 5-March 2015
  • List of the downloaded apps: "Appendix 1" [download]

 

Analysis Overview

 

In this analysis, 200 apps were scanned for bad behaviors. Based on the level of security threat, the apps were divided into 2 categories: apps with malicious and apps with suspicious behaviors. Malicious behavior refers to apps having malicious purpose explicitly, which could cause direct harm to systems and users' interests. Suspicious behavior refers to apps having behavior, which could cause direct harm to systems and users' interests, but no malicious behavior can be explicitly identified.

 

 

1.Scanning Result

 

Among the 200 scanned apps, 6 apps were identified as security high risk. These 6 Apps were identified with the following high risk behavior signatures Android.Adware.SmsReg, Android.Adware.AirPush, Android.Adware.Kuguo, Android/AdLoad.B.Gen, Android.Trojan.Generic.A, Android.Adware.Dowgin, etc.

 

List of security high risk apps

 

Application

High risk behavior signature / Ad plug-in

Malware detection ratio by VirusTotal

Status #

1) 优酷XL高清影视    (v1.0.1)

Category: New Free App
Installs: 1,000+
High risk behavior description:
obtain SIM operator name, obtain SIM serial number, obtain SIM status, connect to the Internet, and send out phone information.

Android.Trojan.Generic.A

9 / 51 [Link]

Available on play store

2) 快的打车    (v3.7)

Category: Top Free App
Installs: 100,000+
High risk behavior description:
obtain SIM operator name, obtain SIM serial number, obtain SIM status, read phone number, and connect to the Internet.

Android.Adware.SmsReg
Android.Adware.AirPush

8 / 56 [Link]

Available on play store

3) 黃金聖衣    (v1.13.421)

Category: New Free App, New Free Game
Installs: 10,000+
High risk behavior description:
obtain SIM operator name, obtain SIM serial number, obtain SIM status, read phone number, and enable Bluetooth automatically.

Android.Adware.SmsReg
Android/AdLoad.B.Gen

11 / 53 [Link]

Available on play store

4) Bubble Fantacy    (v1.3)

Category: New Free App, Top Free Game, New Free Game
Installs: 100,000+
High risk behavior description:
obtain SIM operator name, obtain SIM serial number, obtain SIM status, read voice mail number, read phone number, connect to the Internet, and send out phone information.

Android.Adware.SmsReg
Android.Trojan.Generic.A
Android.Adware.Dowgin

16 / 53 [Link]

Available on play store

5) Tap Clicker    (v6)

Category: New Free App, Top Free Game, New Free Game
Installs: 10,000+
High risk behavior description:
obtain SIM operator name, obtain SIM serial number, obtain SIM status, read phone number, enable camera automatically, and connect to the Internet.

Android.Adware.SmsReg

4 / 56 [Link]

Available on play store

6) 無雙戰將指間操縱天下    (v2.5.1)

Category: Top Free App, New Free App, Top Free Game, New Free Game
Installs: 50,000+
High risk behavior description:
obtain SIM operator name, obtain SIM serial number, obtain SIM status, read voice mail number, read phone number, and connect to the Internet.

Android.Adware.Kuguo

1 / 51 [Link]

Available on play store

Remark (#): The status was checked on 20-Mar. There is no direct relation between the on-shelf status and this report.
 
 
2.High risk behavior signature and Ad plug-in
 

High risk behavior signature and Ad plug-in

High risk behavior

Android.Adware.SmsReg

It is a high risk app. When the app is running, it can receive user's SMS and send SMS in the background. It can cause user information disclosure and pay additional charge.

Android.Adware.AirPush

This is an advertisement framework. It can aggressively push ad to device's notification bar. It can modify browser's bookmark, and remove icon on the main screen. The ads will ask for money. Some ads showed in the notification bar will lure user to subscribe and pay for SMS service. Three common luring ads are 1) fake shop, 2) fake free call service, 3) system notification impersonation

Android.Adware.Kuguo

This is advertisement software bundled with the application. It can steal user's private information, such as phone number, email address, etc.

Android/AdLoad.B.Gen

It is a high risk Ad plug-in, which can download and display an advertisement on the notification bar when it is running. It can track the data usage of the phone.

Android.Trojan.Generic.A

This is a malicious backdoor Trojan, which runs in the background. It allows remote access to the infected system. It will collect and steal sensitive information, such as Internet activities, account/password setting, geo-location, and IMEI, etc.

Android.Dowgin

It is a high risk Ad plug-in, which is bundled in the App. It can send advertisement on the notification bar, download unknown plug-in, download and install unknown application, send sensitive data to remote server, such as IMEI number, phone manufacturer, phone model, etc.

 
 
3.High risk app analysis
 
Please refer to "Appendix 2" [download]