Google yanks over 50 infected apps from Android Market

Could trigger remote removal to delete malicious apps from users' phones

Google has pulled more than 50 malware-infected apps from its Android Market, but hasn't yet triggered automatic uninstalls of those programs from users' phones, security experts said today.

"The apps were 'Trojanized,' for a better word," said Tom Parsons, a senior manager with Symantec's security response team. "With the phones being 'rooted,' the attacks can do almost anything, including pulling data off the phone," he said, referring to the malware's ability to gain root access to the devices.

The apps were available for about four days on the Android Market, Google's official app store. According to San Francisco-based smartphone security firm Lookout, between 50,000 and 200,000 copies of the apps were downloaded by users.

All the apps were infected with the same malicious code, said Kevin Mahaffey, the CTO of Lookout, and came from three different publishers. The malware, dubbed "DreamDroid," lets attackers compromise Android smartphones, then connect them to a command-and-control server (C&C) which can issue orders to the devices.

In some cases, the malicious apps were pirated versions of legitimate Android software.

Mahaffey called the appearance of so many infected apps on the official Android Market a turning point in mobile malware. "This was a tier 1 market that had a significant number of malicious apps that were downloaded a significant number of times," he said.

Previously, malware-infected Android apps, like the bogus "Steamy Window" app that Symantec discovered Monday, were posted on third-party download sites, not Google's own e-mart.

Mahaffey confirmed that Google has yanked the 50-some apps from the Android Market, but said that as of late last night, the mobile OS maker had not pulled those apps from users' phones.

Like other mobile app distributors, such as Apple, Google has the ability to flip a switch that remotely removes questionable or malicious apps from all Android smartphones. Google has pulled the uninstall switch at least once before, in June 2010.

"Google's very responsible with that power," said Mahaffey, explaining why the apps have been pulled from the Android Market but not yet removed from users' phones. "They want to make sure that it's used only in cases when they're sure they're removing only malware."

Google declined to comment on what actions it has taken so far to protect users.

Mahaffey said Lookout is still analyzing the malware, its capabilities and how the attackers hoped to profit from the compromised smartphones, but said his company's initial investigation had uncovered a C&C server located in Fremont, Calif.

The infected phones are communicating with the server and sending information -- including the user-specific subscriber identifier, also known as the IMSI (International Mobile Subscriber Identity), and the phone's SIM card's serial number -- via an encrypted channel. The C&C server seems to be hosted on a legitimate system that hackers had breached previously.

Parsons and Mahaffey differed when asked how the incident reflected on Google and the security of its Android Market.

"More than anything, it shows how popular Android is," said Parsons. "Google has a major challenge vetting nearly a thousand new apps each day, and this may indicate that that vetting isn't robust enough."

But Mahaffey saw a silver lining in the cloud.

"I'd argue that it speaks to the openness of the Android platform that a user was empowered [enough] to notice [a malicious app]," Mahaffey argued, referring to reports that an Android smartphone owner was the first to go public with his suspicions. "We will see more people be more vigilant."

Both Parsons and Mahaffey applauded Google for quickly responding -- within minutes of the first reports -- to the situation by deleting the apps in question from its marketplace.

"After this, there will increased vigilance by a lot of people," said Mahaffey, hinting at Google's likely wake-up call. "For users, the best advice is to pay attention to what you download."

Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer or subscribe to Gregg's RSS feed . His e-mail address is .

Read more about security in Computerworld's Security Topic Center.

Join the CSO newsletter!

Error: Please check your email address.

Tags ParsonssymantecGoogleMobile Apps and ServicessecurityMalware and Vulnerabilities

More about AppleGoogleIMSIMicrosoftMSIParsonsSymantec

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Gregg Keizer

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Market Place