SlideShare a Scribd company logo
Hide n Seek: An Investigation
into changing Dynamics of
Android APT’s
Jagadeesh Chandraiah
Threat Researcher
AVAR 2018
Who am I
• Threat Researcher at Sophos, UK
• Windows, Mobile Malware Analysis
• @jag_chandra
AVAR 2018
Agenda
AVAR 2018
• Android Malware State
• APT malware
• Infection vector and Targeted Data
• Changing Dynamics
Mobile OS market share
AVAR 2018
Source-https://www.statista.com/statistics/266136/global-market-share-held-by-smartphone-operating-systems/
Android – 88%
https://danluu.com/android-updates/
Out of date devices
Mobile OS share
Google play malware -2017
MilkydoorFeb
2017 2017Jan Mar Apr May Jun Jul Aug Sep
Humming
Bad
52
wks
Phase
I
Charger
Fake
apps
Stealer
Iframes
HiddenAd
Instealy
Fake
Minecraft
FlashLight
BankBot
FalseGuide
Milkydoor
FakeApp
BrainTest
XavirAd
Axent
MarsDae
SMS Stealer
Lipizzan
BankBot
Spyware
BankBot
Judy
Clicker
Expensive
Wall
DU Antivirus
WireX
BankBot
Oct
Flashlight
Feb
Sockbot
AVAR 2018
FakeApp
Miners
Nov
Fake
Whatsapp
BankBot
App
Lockers
Expensive
Wall
Dropper
Tizi
Google play malware -2018
Downloaders SMS Fraud Ad Clickers Fake Banking
Bankbots Coin Miners Stealers Rogueware Fake apps
Android Malware - APT
AVAR 2018
Android Malware
AVAR 2018
https://source.android.com/security/reports/Google_Android_Security_2017_Report_Final.pdf
2nd most INDIA
Android Malware
AVAR 2018
INDIA
>19 million
https://transparencyreport.google.com/android-security/overview
>12 million
Glance Love
AVAR 2018
Glance Love
AVAR 2018
Glance Love
AVAR 2018
https://www.idf.il/en/minisites/hamas/hamas-uses-fake-facebook-profiles-to-target-israeli-soldiers/
I’ll send you a picture
Glance Love
AVAR 2018
Glance Love – Device Information
AVAR 2018
Glance Love – Commands
AVAR 2018
Glance Love – Download
AVAR 2018
goldncup[.]com
Glance Love - Payload
AVAR 2018
• Images
• Device Info
• Location
• Record Audio
• Record Calls
• Video
• SMS Data
Glance Love - Payload
AVAR 2018
Glance Love
AVAR 2018
MQTT/HTTP
Dark Caracal
AVAR 2018
Dark Caracal
• Targeted spyware campaign
• Trojanised applications
• Both Mobile and Desktop component
AVAR 2018
Dark Caracal – Infection Vector
AVAR 2018
Download these apps to
communicate
Facebook Group Link
http://secureandroid<dot>info/a
ndroidapps/telegram+.html
WhatsApp message
Image courtesy - https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf
Dark Caracal - Infection Vector
AVAR 2018
Phishing page Phishing LinksFake Facebook profiles
Dark Caracal – App Distribution
AVAR 2018
Image courtesy - https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf
Dark Caracal – App Distribution
AVAR 2018
Clean Malicious
Dark Caracal –Permissions
AVAR 2018
Dark Caracal –Commands
AVAR 2018
• GALL1 – Get all data
• GFILE1 – Get File
• CAMG1 – Camera
• UPD1 – Send Update
• DelF1 – Delete File
• UPF1 – Upload File
• DWN1 – Download
• REC1 – Record and upload
• SMS1 – Send SMS
• PWS1 – Password Steal
• PRM1 – Permissions ask
• WT1 – Send WhatsApp or Tele
Dark Caracal
• Contacts
• Call Logs
• Install Apps
• Capture Audio
• Device Data
• Capture Images
• Location
• Text Messages
• Wi-Fi Access points
• Credentials/Files
AVAR 2018
AVAR 2018
Dark Caracal
Facebook groups
Fake Store
C2 server
WhatsApp Messages
SkyGoFree
AVAR 2018
SkyGoFree
AVAR 2018
• Multi Stage and Multicomponent spyware
• Targets Social Media extensively
• Has device filter/Self protection
• Uses Exploits to gain privileges
SkyGoFree – Distribution
AVAR 2018
• Third Party Sites pretending to be Mobile
operators.
• Social Engineering to download Configuration
update
Image Courtesy- https://securelist.com/skygofree-following-in-the-footsteps-of-hackingteam/83603/
SkyGoFree – Exploits and Shell
AVAR 2018
SkyGoFree – Root
AVAR 2018
SkyGoFree – Commands
AVAR 2018
• Rubrica - get Contacts
• registro_chiamate – Call logs
• Reverse - reverse shell module
• wifi - Add new Wi-Fi configuration
• listapp – get apps list
• Social - Get Social media database
• whatsapp – get WhatsApp data
• history - Steal Browser history
• Install_apk -Install apk
• Camera – Get Photo/Video
SkyGoFree – Commands
AVAR 2018
SkyGoFree – Commands
AVAR 2018
SkyGoFree – Commands
AVAR 2018
SkyGoFree – Social media data
AVAR 2018
SkyGoFree - Data
AVAR 2018
RedDawn
AVAR 2018
RedDawn
• Campaigns targeting Korean users
• Both Google play and outside
• Distributed as health care, utility, Food ingredients and prayer
applications
• Cloud service used to upload data
AVAR 2018
RedDawn
AVAR 2018
RedDawn - Distribution
AVAR 2018
Prayer
RedDawn
AVAR 2018
RedDawn
AVAR 2018
Accessibility service
Install payload
Dropper
Dex/Commands
Changing Dynamics
AVAR 2018
How are they getting on Device ?
AVAR 2018
• Popular social media apps used for Distribution
o Facebook groups , Twitter
o WhatsApp , KaKao , Facebook Messenger
o Stolen Profiles, Social Engineering
• User Interests and Popular Trends
o Fitness Apps, World Cup
• Innocuous Utility Apps on Google Play
o Cleaners
o Backup
Changing Dynamics – How are they getting Data ?
AVAR 2018
• Publicly available exploits
o Android rooting tools framework
Malware on Android OS versions
Android OS Distribution
Changing Dynamics – Data targeted
AVAR 2018
• SMS
• Call Logs
• Contacts
• Location
• Social Media (Regional)
o Whatsapp/Facebook/Viber
o LinkedIn
o Kakao
• Images
• Installed Apps
• Wifi
• Credentials
• Text
• Installed apps
• Device Information
• Emails
• Messenger/VoIP
Downloaders and Accessibility Service
AVAR 2018
• Downloaders and Droppers Achilles heel of Google
play store security
• Used by Bankbots and other popular malware
• Continued abuse of Accessibility service
Counter Measures
AVAR 2018
• Downloaded data and code loaded at runtime
should be verified
• Social media vigilance
• Accessibility abuse should be restricted
• Push vendors to reduce Fragmentation
• Be cautious when granting permissions
• Alert about apps from non standard and non
reputable sources
References/Further Read
• https://www.eff.org/press/releases/eff-and-lookout-uncover-new-malware-espionage-campaign-infecting-thousands-around
• https://research.checkpoint.com/glancelove-spying-cover-world-cup/
• https://www.clearskysec.com/glancelove/
• https://securelist.com/skygofree-following-in-the-footsteps-of-hackingteam/83603/
• https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf
• https://securingtomorrow.mcafee.com/mcafee-labs/malware-on-google-play-targets-north-korean-defectors/
AVAR 2018
  Hide and Seek: An Investigation into changing dynamics of Android APT’s

More Related Content

Similar to Hide and Seek: An Investigation into changing dynamics of Android APT’s

Malware on Smartphones and Tablets - The Inconvenient Truth
Malware on Smartphones and  Tablets  - The Inconvenient  TruthMalware on Smartphones and  Tablets  - The Inconvenient  Truth
Malware on Smartphones and Tablets - The Inconvenient Truth
AGILLY
 
18-mobile-malware.pptx
18-mobile-malware.pptx18-mobile-malware.pptx
18-mobile-malware.pptx
sundar110567
 
Cyber Security Predictions 2016
Cyber Security Predictions 2016Cyber Security Predictions 2016
Cyber Security Predictions 2016
Quick Heal Technologies Ltd.
 
Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!
InnoTech
 
Building Native Apps With Titanium Mobile
Building Native Apps With Titanium MobileBuilding Native Apps With Titanium Mobile
Building Native Apps With Titanium Mobile
Brendan Lim
 
WhatsApp Forensic
WhatsApp ForensicWhatsApp Forensic
WhatsApp Forensic
Animesh Shaw
 
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
NCCOMMS
 
Google android os
Google android osGoogle android os
Google android os
Faiq Ali Sayed
 
Spinlab - Technology for Small Businesses
Spinlab - Technology for Small BusinessesSpinlab - Technology for Small Businesses
Spinlab - Technology for Small Businesses
joeclo
 
ESA - Hacking the aerospace industry - should we worry ?
ESA - Hacking the aerospace industry - should we worry ? ESA - Hacking the aerospace industry - should we worry ?
ESA - Hacking the aerospace industry - should we worry ?
Jakub Kałużny
 
Forum Eventos 2013 Mobile Technology in Meeting Planning
Forum Eventos 2013 Mobile Technology in Meeting PlanningForum Eventos 2013 Mobile Technology in Meeting Planning
Forum Eventos 2013 Mobile Technology in Meeting Planning
joeclo
 
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Advanced monitoring
 
Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020
tmbainjr131
 
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
EC-Council
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012
Andris Soroka
 
Security News Bytes Null Dec Meet Bangalore
Security News Bytes Null Dec Meet BangaloreSecurity News Bytes Null Dec Meet Bangalore
Security News Bytes Null Dec Meet Bangalore
InMobi Technology
 
[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security Workshop[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security Workshop
OWASP
 
Android malware analysis
Android malware analysisAndroid malware analysis
Android malware analysis
Jason Ross
 
Mega trends in information management
Mega trends in information managementMega trends in information management
Mega trends in information management
Guy Harrison
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013
Blueinfy Solutions
 

Similar to Hide and Seek: An Investigation into changing dynamics of Android APT’s (20)

Malware on Smartphones and Tablets - The Inconvenient Truth
Malware on Smartphones and  Tablets  - The Inconvenient  TruthMalware on Smartphones and  Tablets  - The Inconvenient  Truth
Malware on Smartphones and Tablets - The Inconvenient Truth
 
18-mobile-malware.pptx
18-mobile-malware.pptx18-mobile-malware.pptx
18-mobile-malware.pptx
 
Cyber Security Predictions 2016
Cyber Security Predictions 2016Cyber Security Predictions 2016
Cyber Security Predictions 2016
 
Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!
 
Building Native Apps With Titanium Mobile
Building Native Apps With Titanium MobileBuilding Native Apps With Titanium Mobile
Building Native Apps With Titanium Mobile
 
WhatsApp Forensic
WhatsApp ForensicWhatsApp Forensic
WhatsApp Forensic
 
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
 
Google android os
Google android osGoogle android os
Google android os
 
Spinlab - Technology for Small Businesses
Spinlab - Technology for Small BusinessesSpinlab - Technology for Small Businesses
Spinlab - Technology for Small Businesses
 
ESA - Hacking the aerospace industry - should we worry ?
ESA - Hacking the aerospace industry - should we worry ? ESA - Hacking the aerospace industry - should we worry ?
ESA - Hacking the aerospace industry - should we worry ?
 
Forum Eventos 2013 Mobile Technology in Meeting Planning
Forum Eventos 2013 Mobile Technology in Meeting PlanningForum Eventos 2013 Mobile Technology in Meeting Planning
Forum Eventos 2013 Mobile Technology in Meeting Planning
 
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
 
Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020
 
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012
 
Security News Bytes Null Dec Meet Bangalore
Security News Bytes Null Dec Meet BangaloreSecurity News Bytes Null Dec Meet Bangalore
Security News Bytes Null Dec Meet Bangalore
 
[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security Workshop[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security Workshop
 
Android malware analysis
Android malware analysisAndroid malware analysis
Android malware analysis
 
Mega trends in information management
Mega trends in information managementMega trends in information management
Mega trends in information management
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013
 

Hide and Seek: An Investigation into changing dynamics of Android APT’s