- MCP server with stdio transport for local use - Search episodes, transcripts, hosts, and series - 4,511 episodes with metadata and transcripts - Data loader with in-memory JSON storage 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
175 lines
9.6 KiB
Plaintext
175 lines
9.6 KiB
Plaintext
Episode: 3360
|
|
Title: HPR3360: Android Malware Alert
|
|
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr3360/hpr3360.mp3
|
|
Transcribed: 2025-10-24 21:41:46
|
|
|
|
---
|
|
|
|
This is Haka Public Radio episode 3364,
|
|
Friday 18th of June 2021.
|
|
Today's show is entitled Android Malware Alert
|
|
and in part of the series Privacy and Security
|
|
It is hosted by a huker and in about 11 minutes long
|
|
and carrying a clean flag.
|
|
The summer is a look at some security issues in Android.
|
|
This episode of HBR is brought to you by an Honesthost.com.
|
|
Get 15% discount on all shared hosting with the offer code
|
|
HBR15, that's HBR15.
|
|
Better web hosting that's Honest and Fair at An Honesthost.com.
|
|
Hello, this is Huka, welcome to Hacker Public Radio
|
|
and another exciting episode and I want to again give us a little security update
|
|
and this has to do with some Android malware.
|
|
A report was released regarding malware that targets Android called Joker.
|
|
Now this malware has been around actually since 2016.
|
|
But it continues to be one of the major threats to Android devices.
|
|
It can steal SMS messages, contact lists and device information.
|
|
It can also sign up users for pricey subscription services,
|
|
such as wireless application protocol or WAP services.
|
|
This malware gets added to applications that can be downloaded
|
|
from the Google Play Store.
|
|
And though Google has removed many of those apps,
|
|
the malware keeps coming back.
|
|
So how does it do what it does?
|
|
Well, the apps that get the Joker malware are essentially knockoffs of legitimate apps
|
|
that can fool people into downloading them.
|
|
They don't generally contain the malware.
|
|
Instead they contain what is called a dropper code,
|
|
which at some future time days or weeks later will contact a remote site
|
|
and then download the actual malware.
|
|
Now this dropper code is heavily obfuscated in a variety of ways.
|
|
Sometimes the code is AES encrypted.
|
|
Other times it masquerades as legitimate files that are common in other applications,
|
|
such as JSON files and CSS.
|
|
The download is frequently a .dex file,
|
|
which stands for Dalvik Executable,
|
|
which is now the native format for Android applications.
|
|
Joker can also use code injection to hide inside of legitimate third-party packages
|
|
that reside on an Android phone, such as org.junit.internal,
|
|
com.google.android.gms.dynamite,
|
|
or com.unit.3d.player.unit.provider.
|
|
Now a security research firm Zscaler issued the most recent report on this,
|
|
and of course this is all linked in the show notes.
|
|
And as I've said before,
|
|
I do these shows I try to put as much information as possible in the show notes,
|
|
you know, links to sources that will give you more information.
|
|
So you can find out about Dalvik Executables,
|
|
and you can read this Zscaler report.
|
|
And this report explains some of the methods Joker uses to download the malware.
|
|
One of those is direct download.
|
|
So in this scenario, a URL is hidden in the code via string obfuscation.
|
|
Now this is a technique for hiding executable code by making it hard for the code to be detected.
|
|
There's a site called Securry,
|
|
that gives an example of calling PHP to execute the commands
|
|
where the functions are broken up into two to three character chunks,
|
|
each chunk inside single quotes and separated by periods.
|
|
PHP will then join the chunks, remove the single quotes,
|
|
and execute the functions just created.
|
|
Interesting technique.
|
|
And by the way, just a side on Securry, that's SU-C-U-R-I,
|
|
that's a security site,
|
|
I found out about them,
|
|
and then discovered they had a very nice plugin for WordPress.
|
|
And my websites are all run on WordPress.
|
|
And so I went, I got this plugin,
|
|
and it does something that I really like,
|
|
and that is it sends me an email anytime there's any activity on the website.
|
|
Website backend, I mean,
|
|
it's not going to notify me that someone looked at a webpage,
|
|
but if a webpage has been modified,
|
|
a new page has been added, you know, any of that kind of activity,
|
|
I get an email.
|
|
Now, so far, all that is meant is I get an email every time I do something,
|
|
but it's good to have that notification if someone were to get in,
|
|
and that did happen to one of my sites.
|
|
And it was a royal pain in the butt.
|
|
You know, I had to go through basically searching through my SQL database
|
|
to find out where they had hidden this stuff,
|
|
because what was happening was all of a sudden you go to my site,
|
|
and it's serving up something entirely different.
|
|
So now, if someone does that, I'll get an email right away,
|
|
and at least I can get on top of it.
|
|
Okay, so back to direct download,
|
|
you know, we looked at that technique of using PHP.
|
|
So what happens after that code has been re-put together by PHP,
|
|
and the function has been executed?
|
|
Well, at that point, contacts a command and control server
|
|
to get another URL, which will take them to the final download of the malware payload.
|
|
It also supplies a JSON file that has the configuration information
|
|
for the final download.
|
|
Once the JSON file is downloaded and executed,
|
|
the final download takes place.
|
|
Then there's one stage download.
|
|
So this variant downloads a stage or payload first,
|
|
which then leads to the final download.
|
|
The URL for the stage or payload is encoded using a ES encryption.
|
|
There are two varieties of stage or payload that Zscalar has noted,
|
|
either an APK file or a .dex file.
|
|
This stage is responsible for obtaining the URL for the final payload download.
|
|
The stage is also responsible for executing that final payload.
|
|
Then there's a two stage download.
|
|
In this variant, the infected app executes code to contact the command and control server,
|
|
which replies by sending a message with the URL for the first stage or payload,
|
|
which it hides in the location header.
|
|
The first stage or payload is downloaded and executed,
|
|
which then downloads the second stage or payload,
|
|
which in turn contains the hard-coded URL for the final payload.
|
|
That is then downloaded.
|
|
Now, final payload, regardless of the download method,
|
|
the final payload of malware is the same.
|
|
To begin with, it uses DES encryption to execute the command and control activities,
|
|
and it uses string obfuscation techniques to hide all important strings.
|
|
Now, if you want a more detailed description of all of this,
|
|
there's a link in the show notes.
|
|
It's a Chinese site, so you want to use a browser that can translate from Chinese to English,
|
|
but you can get a lot more detailed technical information there if you want it.
|
|
Now, what can you do?
|
|
Given that this malware has been infecting apps in the Google Play Store for five years now,
|
|
it does not seem likely that someone else is going to fix the problem.
|
|
The Zscaler report says that Google has removed these apps from the Play Store when it finds them,
|
|
but it cannot remove them from your phone if you had the misfortune to download one of them.
|
|
Using an anti-malware app on your phone may help,
|
|
but the techniques Joker uses to hide make it challenging to detect and remove.
|
|
Now, step one is to check to see if you have one of these apps and remove it manually from your phone.
|
|
I have a link in the show notes to the latest batch of 17 apps that Zscaler found,
|
|
and they put that on a web page you can do some checking.
|
|
Once that is done, there are some common sense precautions you can take.
|
|
Be careful to only download and install apps that serve a genuine need.
|
|
Downloading a lot of apps willy-nilly will only increase your attack service.
|
|
Then, check the history of the app.
|
|
If it is fairly new and has relatively few downloads, you should probably steer clear.
|
|
Now, remember, Google does remove these apps from the Play Store as soon as they're aware of them,
|
|
so they don't tend to last long.
|
|
Next, stick with developers that have a good reputation and track record.
|
|
Now, for apps you rarely use or haven't used recently, consider uninstalling them.
|
|
Remember, it is about the size of the attack service.
|
|
The more apps you have, the more potential vulnerabilities you have.
|
|
Pay attention to permissions.
|
|
Every time you install an app, it asks you for permissions to do things.
|
|
Now, most of us see that so much that we just click yes automatically.
|
|
Okay, yeah, fine, whatever. Just give me my adrenaline thrill here.
|
|
I don't want to be reading through all of this stuff.
|
|
And that's what malware authors rely on.
|
|
If a solitaire app asks for permission to access your contacts list in your SMS,
|
|
you probably shouldn't allow it.
|
|
That's not a good thing.
|
|
One thing you can do, manage your existing permissions.
|
|
A good thing Android 11 does is allow you to remove permissions for apps you haven't used in a while.
|
|
Now, I've got a link in the show notes to a tech republic article that you can read more about this
|
|
and how to manage your permissions.
|
|
And I've got some reference material as well in the show notes that you can take a look at.
|
|
That's our technical article.
|
|
So there's some good information there.
|
|
And as always, when I post these shows, I try to put relevant links in the show notes so that you can get more information
|
|
and follow up on these things.
|
|
But for now, this is a hook up for hacker public radio signing off and encouraging you to support pretty software.
|
|
Bye-bye.
|
|
You've been listening to Hacker Public Radio at HackerPublicRadio.org.
|
|
We are a community podcast network that releases shows every weekday Monday through Friday.
|
|
Today's show, like all our shows, was contributed by an HBR listener like yourself.
|
|
If you ever thought of recording a podcast, then click on our contributing to find out how easy it really is.
|
|
HackerPublic Radio was founded by the digital dog pound and the Infonomicon Computer Club
|
|
and is part of the binary revolution at binrev.com.
|
|
If you have comments on today's show, please email the host directly, leave a comment on the website or record a follow-up episode yourself.
|
|
Unless otherwise status, today's show is released on the creative comments, attribution, share a like, 3.0 license.
|
|
Thank you.
|