Mobile Connect makes headway with launch of cross-border pilot

Florence Broderick    4 December, 2015
European trial makes Mobile Connect the first private-sector cross-border public service authentication solution compatible with European Union eIdentification and Trust Services (eIDAS) Regulation.

Throughout the next few weeks, Mobile Connect will be trialled in two EU Member States, establishing proof-of-concept for cross-border authentication to e-Government services. The pilot, launched on November 16, will demonstrate how Mobile Connect can be used to identify an EU-citizen of one Member State in order to gain access to a public service of another. Mobile Connect offers a simple way of achieving pan-European federation of cross-border services for the EU governments compatible with the eIDAS regulation, whilst enabling growth in digital public services nationally.

The trial is taking place between Spain Catalunia and Finland, and will enable customers of participating Spanish operators, to log-in to a Finnish eGovernment service, and on the Catalunia side the log-in through a digital identity validator granting access to a complete public services portfolio. The customer experience is the same in both countries: After the customer presses the Mobile Connect button and enters their mobile number on the discover page, a PIN request appears on their mobile phone. By entering the correct PIN, the user’s identity is confirmed and the customer is logged-in to the eGovernment online service.

The pilot is the result of collaboration between organisations seeking to accelerate the uptake of trusted and secure digital authentication in response to the eIDAS Regulation. The Regulation aims to enhance trust in electronic transactions in the EU internal market by providing a common foundation for secure electronic interaction between citizens, businesses and public authorities, thereby increasing the effectiveness of online services in the EU. The GSMA with major operators, Orange Spain, Telefonica, TeliaSonera, and Vodafone Spain are supporting the trial, as well as Gemalto, Mobile World Capital, the Catalonia Regional Government, the Finnish Ministry of Finance and Finnish Population Registration Centre.

Hear from the participants in the trial on their experience with Mobile Connect:

“Finally with Mobile Connect we can create international eID services that are based on real identities, and for those identities we can create a new breed of trust services for a global market.” Joni Rapanen, TeliaSonera.

“We in the Ministry of Finance are very satisfied with this successful project. Our role was limited compared with the participants who planned the actual trial, but the results are very important to us when we are building a national trusted network for e-identification.“ Mr Olli-Pekka Rissanen, Special Adviser, Ministry of Finance.

“Orange Mobile Connect solution meets the needs of our customers for a secured journey and also paves the way for a rapid take-off of eIDAS services” Alicia Calvo, Innovation Director, Orange Spain.

“Mobile Connect is a key component of Telefonica’s security services. It has greatly expanded the identity and privacy solutions we offer to our customers José Luis Gilpérez, Defense and Security Director, Telefónica.

“For Vodafone, it is important to provide to our Customers confidence and simplicity when using digital services. Mobile Connect will be a key enabler of the Customers Digital Journey” Ibo Sanz, mCommerce Director, Vodafone Spain.

“The identification and trust services for electronic transactions in the internal market aligned with eIDAS regulation, is a milestone for a Government of Catalonia to provide a confident environment to enable secure and seamless electronic interactions or transactions between European businesses, citizens and public authorities. In this regard, this experience, is focused on this European government’s spirit of collaboration” – Jordi Puigneró – General Director for Telecommunications and ICT at Government of Catalonia.

Oscar Pallarols, Smart Living Director at Mobile World Capital Barcelona. .

The trial occurs just weeks after the EU’s recent adoption of the implementation rules of the eIDAS Regulation, which makes the EU the first and only region in the world to have a legal framework for safe cross-border access to services and online interactions between businesses, citizens and public authorities.

The Regulation is part of the European Commission’s push towards the Digital Single Market, and is designed to enable citizens to carry out secure cross-border electronic transactions. For example, enrolment in a foreign university, filing of multiple tax returns, access to electronic medical records or authorisation of a doctor to access these on one’s behalf. It will also enable citizens moving or relocating to another member state to manage registration and other administration online with the same legal certainty as they currently have with traditional paper-based processes.

Mobile Connect’s technical architecture follows secure user authentication requirements provisioned by the eIDAS Regulation, and its technical specifications of implementation – and is the first private-sector cross-border public service authentication solution to be compatible with it. As such, the pilot will test how eIDAS cross border authentication works and reveal any practical challenges in implementing the solution.

The solution is ideally placed to address both service providers’ needs acting as a primary log-in for websites, apps, and other online services and consumers’ demands for straightforward and secure authentication and identification. Mobile Connect can help government agencies and other service providers increase usage of their online services, improving efficiency, enriching the end-user experience and increasing engagement. With the demand for secure and convenient authentication for digital services at an all-time high, this pilot further illustrates the market readiness of Mobile Connect. To find out more email the team at [email protected]

Source: GSMA

Original post Mobile Connect makes headway with launch of cross-border pilot by GSMA.

ElevenPaths Black Friday

Florence Broderick    27 November, 2015

The highly anticipated Black Friday starts at Eleven Paths with the very best desktop tools against metadata.

Friday November 27th Metashield desktop suite of products for Client and for Outlook can be exclusively yours for free for 1 year.

Use the codes Black Friday and will turn on the best technology of preventive security on your computer against leakage of metadata.

Links of products:
Engine:
Metashield Engine Stand-Alone 3.2

Client:
Metashield For Client SA 3.2

Outlook:
Metashield For Outlook SA x86 3.2
Metashield For Outlook SA x64 3.2

Black Friday 1 year free activation code:
Metashield for Client: BLACKFRIDAY27NOVMSCW
Metashield for Outlook: BLACKFRIDAY27NOVMSOU

Activation mail: [email protected]
Do not let this chance go away.

More information on https://www.elevenpaths.com/es/tecnologia/metashield/index.html
Youtube: https://youtu.be/QBhISm4QTik

* 27 November one day special offer.

Quick and dirty script in Powershell to check certificate fingerprints

Florence Broderick    23 November, 2015
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates. Everything counts to “look good” for the users and machines. Sometimes, when a signed malware is discovered, you may wonder if any of the binaries in your machine is signed with that certificate. This is a simple powershell script to get that.

Script in powershell

With Powershell, retrieving the fingerprint of the certificate is quite easy. Just a few lines of code. Since most of the suspected machines will be Windows and all modern versions are able to use Powershell, this a simple solution. Just add the certificate fingerprint you are searching for in your computer, tell the program where to start from, and that is all.

To use it, just create your txt file with some fingerprints. For example, these are the fingerprints for the certs used in TheFlame (2012) and WildNeutron (2015) operations respectively.

‎1D190FACF06E133E8754E564C76C17DA8F566FBB
0D859141EE9A0C6E725FFE6BCFC99F3EFCC3FC07

We have uploaded the code to our Github. Whatever good idea you may have to improve it, just share it with us in our community.

Please note this is “quick and dirty” code with both practical and educational purposes.

Drones in Precision Farming

Luis Simón Gómez Semeleder    19 November, 2015

Streamlining and modernizing farming techniques has been a key process since the turn of the century in order to ensure global food supplies. The Food and Agriculture Organization (FAO) estimates that farming production will need to be increased at least 70% by 2050, thus almost duplicating current production.

However, climate events (shifts in weather patterns, advancing desertification…), combined with demographic and social trends (increase in urban population and city size…) make it very difficult to allocate the necessary farming land in the medium term. Therefore it is more important than ever to be able to optimise the use of farming land to be able to increase current production.

From a consumer perspective, most of the farming resources are dedicated to water, fertilizers and plant protection products, as well as the power to carry out the irrigation, fertilizing and harvesting.

New technologies simplify manual processes and make a better use of available resources. There are currently a variety of Internet of Things based solutions to digitize farming processes: smart irrigation, cattle monitoring, smart water resources management, etc. Farms have also started to use connected drones recently.

Drone farming

Besides the coolness factor, drones are an ideal platform for monitoring activities. The main advantage of flying a drone over other aerial solutions is its rapid deployment, enabling monitoring of large portions of farmland in a simple, quick and cost-effective manner, providing high value insight that speeds up decision-making.

Spectral on-board sensors allow drones to take high resolution aerial pictures of the whole plot of land evaluated.

Certain farming activities are currently automated thanks to GPS positioning tools. Therefore these activities can now be planned and designed with a great deal of precision

Fertilizer management

The pictures taken using the different on-board cameras (multispectral, infrared, thermal…) provide data that goes beyond what can be seen with the naked eye: soil nitrate levels, or crop vigour through leaf brightness testing (plant reflectance). It is possible to determine exact fertilising needs for the soil of each plot of land after processing this data.

Thus, farmers can have a fertilizing map while driving the tractor, which will allow them to add only the needed amount of fertiliser in each differentiated area. This level of precision brings obvious advantages: previously the whole plot of land received equal amount of fertiliser or it was spread based on the farmer’s experience and knowledge. The lack of science behind this had a toll on using these products efficiently and required farmer expertise. Technology takes this burden off farmers’ shoulders and allows to maximise investment in expensive plant treatment products and fertilisers maintaining farming land performance at its peak thanks to the precise data obtained.

Water resources and other farming applications for drones

Based on our bird’s-eye-view data provided by multiple sensors, we can extract further information that allow us to extend our analysis to other aspects of plots and crops. Besides fertiliser level, we can also determine the amount of watering required (if the crop is subject to “water stress”), control pruning requirements, detect weeds, or keep invasive species at bay in real time.

Other applications are more obvious and well known, but also important for farming activity and are related to surveying applications (plot measurements, cadastral surveys…), reservoir water management, river courses, crop patrolling and security, etc.

Affordable technology

Steep entry barriers previously made access to these aerial resources (satellite, or plane/helicopter images) only affordable for large crop owners (normally in the hands of the big food industry players).

Drone technology is an outstanding improvement, unthinkable until not long ago. It is a tangible reality that allows access to relevant information positively impacting on crop performance at an affordable price for farmers that own medium size crops.

Telefónica’s global offering in farming, called Smart Agro, combines connectivity and the support channel of a leading telecommunications firm with partners that provide both the technology and expertise in the field of farming. We offer customised end to end projects to suit the needs of any farmer whether it is to reshape their business model or improve the operative process, maximizing savings in either case. 

Leave a Comment on Drones in Precision Farming

Research: On the overexposure of Amazon credentials in mobile apps

Florence Broderick    16 November, 2015
The development of mobile applications that interact with common services in mobility environments such as Amazon Simple Storage Service (S3), Amazon Simple Notification Service (SNS), Amazon Simple Queue Service (SQS) or Amazon Mobile Analytics is becoming more frequent.

To interact with these services, apps need to communicate with them and authenticate with some kind of credential (usually based on tokens). We have identified unsafe programming practices in the form of poor management of login credentials, which could allow an attacker to modify the behavior of the affected apps.

Identity management in Amazon AWS

Mobile app developers need their own access keys to programmatically call Amazon Services. They can use the AWS Command Line Interface (AWS CLI)  , AWS SDKs or direct HTTP calls using APIs for AWS individual services.

The latter is more common in apps communications. From the Amazon Management Console, access keys, known as access keys and secret keys can be created, modified, viewed or rotated. These access keys are valid to programmatically interact with the contents or services offered by Amazon. Apps that use these contents must therefore know the access keys.

Although there are more appropriate methods, some programmers embed this information in the app itself. If access is read-only, this can result in a bad programming practice, but not necessarily in a security problem. However, if permissions are poorly established, contents could be controlled. If, in addition, access keys are accessible by anyone analyzing the application, an attacker could modify those contents that later on would be used by the app.

If necessary measures are not taken when setting access permissions of the API keys, anyone with access to the keys could not only access the information, but modify it.

However, access keys can also be introduced into an app through a credentials file located within the APK, in clear text. This way, apps are easier to manage and maintain. This file is generated with the AWS CLI. Its default name is AWSCredentials.properties, and its format is similar to the following:

(Falso) example of credentials

With Tacyt , ElevenPaths’ Cyber intelligence Tool for mobile apps, we have searched how many apps in the different monitored markets contain a file of such type, subsequently verifying the nature of the associated credentials.

First seach in Tacyt for APKs with this kind of files

At the time of writing this report, we found 1,635 APK files containing a file of this type in our database, formed by 4.5 million apps. Those 1,635 files correspond to apps and also to different versions of those same apps (hashes) stored in our database. Unique apps (regardless of their version, and on the basis of unique package name) are actually 478 different apps distributed over different markets.

We have studied the situation of credentials and if they represent any risk.

Data analysis

These are the results obtained after analyzing the apps containing files that could potentially pose a security problem:

  • Of all studied apps, 102 are no longer in the official market and have been removed. Although removed, they still to pose a problem, since the apps remain in the installed devices, and furthermore, credentials do not stop being valid even so.
  • We have found 478 different apps containing valid credentials. 408 of them in Google Play.
  • However, the number of different access keys found in all markets is not too high: 63. This means that several of those 63 credentials are distributed between different apps. In other words, many seemingly different developers share valid AWS accounts. In particular, two different credentials are shared in 523 and 196 different versions of the apps. There are only 26 unique credentials that are not shared and that are found in a sole app.
  • 37 of the 63 access keys found remain fully operational, which means they allow the correct performance of the authentication process. The valid access keys shared have the following distribution. Among the valid access keys, one is distributed in 523 different versions of different apps.  
  • Of these access keys, we have obtained permissions (ACL) from 26 credentials. 
  • 22 access keys kept FULL CONTROL with those credentials. This means that some contents hosted on Amazon could be read, written and even edited.The rest of them allowed Write, which for practical purposes also poses a security problem.
  • The credentials found on Google Play are distributed over 408 different apps. In turn, many seemingly different developers share credentials. It is interesting to see how there is a single credential present in 74 different developers, each one with their respective apps.

Of the 74 credential-sharing developers on Google Play, it should be noted that most of them seem to be magazine publishing companies and media in general, some of them quite known. This suggests that these companies’ apps have been developed by the same team, which has somehow reused part of the resources, including the infrastructure in the cloud and, with it, the access credentials. This exchange of shared credentials between different apps that load contents hosted on a third party opens an interesting attack window, depending on the credentials permissions.

It is necessary to clarify that not all apps containing credentials have to use them. It can simply constitute a “bad practice” if using the appropriate permissions, which means that, even if it involves exposure of sensitive information, in practice it does not open any security breach or attack possibility against app users or developers.

The Android Trojan preinstalled in Amazon Tablets is in Google Play as well

Florence Broderick    13 November, 2015
Researchers from Cheetah Mobile have found Trojans preinstalled in some cheap Amazon tablets, very hard to remove. But, here in ElevenPaths we have found that a version of this Trojan is present right now in Google Play hidden as a HTML 5 games application. The malware has been dubbed “Cloudsota“.

The app, still in Google Play, made by the same band of “Cloudsota”.

 
The Trojan found by Cheetah Mobile, is preinstalled in tablets, restores itself after reboots if deleted, hijacks the browser homepage and downloads apps from some servers to install them silently if the device is rooted (which, in these tablets, is very likely). We found a very similar behavior in a Google Play app, downloading apps from the same servers and with quite similar code. What we can be sure is that is made by the same people behind this Cloudsota. Although maybe with enough changes to be able to get in the official market.

How it works

Once the apps found by Cheetah were analyzed, thanks to Tacyt, we found a strong correlation with just one out of 4.6 million apps in our database. It has been in Google Play since August 2015. This app, when booting or if a user is present (unlocks the screen), calls a method called “b” inside the  com.android.ThreeTyCon.c class, that visits this site hxxp://union.dengandroid.com/getconfig and sends some interesting information.

JSon sent to the server before being encoded

After sending some encoded personal information (email, MAC, if the device is rooted or not, etc) it finally downloads (with some encoding as well) a dex file called business.dex. We guess the file may be different depending on this information previously sent.

The code to download and use business.dex

This business.dex is terribly offuscated, and contains most of the malicious code. Business.dex is as well programmed to download different versions of business_X.dex (the X depends on the configuration in the device) that we suppose that makes its behavour quite unpredictable.

If busybox util is found in the device, it tries to load libraries, install and uninstall apps… This is done just before business.dex is downloaded, we guess this is for uninstalling any antivirus the user may have just before downloading the (even more) malicious code, that is more likely to be detected.

Triying to uninstall code

As far as we know, the app itself or the business.dex does not contain code to survive and install itself after reboot or hijack the homepage, but it definitely could, as we can see some references in the code. 

It may hijacks the homepage

  
Aside, it shares with Cheetah samples, the use of a very particular library libshellcmd.so.
 

It uses libshellcmd.so, shared with Cloudsota

The app in Google Play is detected by some antiviruses. But most of them do not detect the app because of this behavior, but because of it containing some Airpush SDK code. Airpush was considered a potentially unwanted adware SDK long time ago by the antiviruses. It is interesting as well that the app has been downloaded 5.000 and 10.000 times, but only 3 votes have been given.

Too many downloads for so few votes…

That make us think about some time of artificial boost with unreal downloads made by the same developers to enhance searching position.

Sergio de los Santos
Miguel Ángel García 

Apps in Google Play that install an HTTP Server as a backdoor in your Android

Florence Broderick    5 November, 2015
Trend Micro has discovered a very interesting problem with an SDK called Moplus that, literally, works as a backdoor for Android devices. The problems here are that this SDK belongs to Baidu (the Chinese biggest search engine); that is used not only by their apps but others; and that some of the apps are in Google Play right now, with millions of downloads. Finding vulnerable devices is just as easy as scanning a network and send some HTTP commands. Aside Trend Micro research, we have discovered some of these apps in Google Play and other curiosities.

This SDK is called Moplus. Aside its “official features” it sets up a local HTTP server (the well known nanoHttpd), that listens in different ports, depending on the app and SDK version (probably 6259 TCP port). If connected to that port, nothing is served (documentRoot is at data/data/apkNamefileslocal_http_server)… but it allows the attacker to send POST requests with commands.

Defining the port where the server will listen

And that is all. Any attacker may send commands to the port via HTTP POST requests with no strong authentication. One of the weakest version only needs the header “remote-addr” to be set to 127.0.0.1. But some others need the referer header to match this.

^http[s]?://[^/]+(.baidu.com|.hao123.com|.hiapk.com|.91.com)(:d+)?(/.*|)$”;

If it works, it will execute the orders and return a JSON with the response (given the right permissions, which most of the spotted apps seem to have).

What commands does it support?

It is very clear with this piece of code:

Code with the accepted commands

It allows downloading files, and uploading anything. From retrieving the lists of apps to inserting new contacts. In rooted devices, any new apk could be installed silently.

Code to add contacts silently
Part of the code to upload files

Trend Micro contacted Baidu, that has created a new version that removes most of the malicious commands of the list. They are replacing most of the affected apps.
 
What did we found?

Trend Micro talks about thousands of apps affected. With Tacyt, we found the ones using the SDK and still available in Google Play. Some of them with up to 5 million downloads and not related to Baidu at all.

A variation of the code with the commands

These are some of the packageNames spotted in Google Play (although there will be more, for sure), different from the ones published by Trend Micro (so far):

  • com.qiyi.video.market
  • com.nd.android.launcher91
  • com.ivodani.comicsisland.activity
  • com.qyer.android.jinnang
  • com.pad.comicsisland.activity
  • com.cubic.choosecar

We could not confirm that the commands works the same in all of them. For sure, they contain the offensive code, but maybe with slightly different systems to be able to get in. They should be reversed individually to be sure how to make it work (or if they even work).

One of the easiest that we tested, was the very popular Baidu Maps. Not this one, but a previous version (8.7.0).

In the image, we use this Chrome plugin to inject POST commands. The result (inserting a contact remotelly) is shown. As you can see, Baidu Maps icon is on the top.

Adding contacts with a POST

It is worth mentioning that, many of the spotted apks, rely on two different classes.dex files. This means that, once executed, the app may load classes2.dex from its own “main” code, and usually this classes2.dex is the one with the offensive code.

An app containing a second “dex” file

This is not new. Many malware/adware in Google Play use this trick to try to fool detections. They may download the .dex file from elsewhere, or hold it inside. It is quite interesting finding that, some of the apps were using the “Moplus SDK capabilities” in this second dex file.

Aside, one of the most interesting point is that Mobo Launcher, related to the well known Mobogenie market, counts with this code backdoor as well, and it is very popular even outside China. It has been in Google Play since late 2014. In fact, is the oldest in Google Play with this version of the backdoor, as far as we know.

Some of the detected apps in Tacyt

Although we could not get to make it work and actually send a command (not sure why), the nanoHttp service was up, and code to receive commands is there… so there are strongs reasons not to trust this app, and reverse it even deeper to know exactly what is happening and how it works.

Of course, there are a lot of APKS outside Google Play (aptoide, mobogenie…) with this backdoor as well.

The good part is that most of these programs are already detected by several antiviruses, not all of them because of this, but detected, anyway.

Sergio de los Santos
@ssantosv

Juan Manuel Tirado
[email protected]

Android malware not only posing as Word documents… but Excel as well

Florence Broderick    31 October, 2015
China is a paradise for “SMS stealing malware” for Android. These programs steal your SMS inbox, notebook… The only “problem” for malware creators is to induce users to install the app. They usually use supposed pornographic content as a decoy. Zscaler just found some malware of this kind posing as a word document. We have updated their research with some new malware for android posing as Excel documents and some other interesting stuff.

Zscaler describes a more or less typical SMS infostealer Chinese malware. The improvement here is that they use a Word document icon for the Android malware. That would make the user believe that they are not installing anything, but trying to view a simple document. We searched and found some other malware (probably from the same attacker) posing as an Excel document, and got access to the email where the stolen info is sent to.

Some interesting stuff

The samples we have analyzed use an Excel icon. They are slightly different depending on the sample.

App that tries to look like an Excel document,
and another example of icon it may use

In this samples, the attacker uses an approach different from the one described by Zscaler that seems to be a little bit more advanced. Malware sends SMS history and contact list to the attackers’ email, but in this case, the password for sending the email (and to check it, too) is not directly in the code, but in a configuration file.

Configuration file for the malware. Password and email included

We got to get into the mailbox of these mails and confirmed that, indeed, there were real SMS and contacts there. In an account, we found lots of supposed IMSI numbers and the whole SMS collection of the victim.

Stolen SMS from the victims

Zscaler found the “word document” malware was stealing the IMEI, while this one, as can be seen in the image, is identifying the victim by its supposed IMSI. In another account from other sample, we find the contacts list of the victim (name and number).

Some of the stolen contacts

The malware is able to “silent” the phone as well.

Setting the audio to silence

As usual, the attacker is a “regular” Google Play developer. He has been uploading apps to Google Play for months, and there are some of them online.

Some apps from the same developer

Thanks to Tacyt, we can get to know the developer, more than a single app. Most of the apps by this developer are removed, but they are not like this kind of malware described above. SMS stealers would not be able to bypass Google checks. Most of them are clickers, riskware in general or very aggressive adware. One of the few that are still alive is this:

One of the apps from the same developer still in Google Play.
It is not a SMS stealer, but aggresive adware.

Conclusion

We got to expand and improve the Zscaler research. Same old tricks as used in PC are more and more used in Android again and again, like this “icon decoy” system. It is importan to highlight that this malware has nothing to do with Microsoft, Office, Word or Excel in Android, they just use their icons as something attractive to confuse users.

Sergio de los Santos
@ssantosv

Juan Manuel Tirado
[email protected]

New Financial Cyber Threats Report

Florence Broderick    22 October, 2015
New “Financial Cyber Threats (Q3 2015)” report
Summary
This report analyzes the current trends related to financial phishing and banking malware, including attacks on mobile devices, POS (Point of Sales) systems and ATMs. The timeframe for this analysis contains data obtained during the period from July 1st, 2015 to October 1st, 2015.

Phishing
A group of 14 countries are on the receiving end of the 90 % of all phishing attacks. The remaining 10 % is distributed among more than 170 different countries. Only the first three countries in this ranking account for half of the worldwide detected attacks.

The number of phishing attacks against Mexico is remarkable, taking over from United Kingdom the second position in the ranking of phishing attacks in comparison to the last period. New Zealand has been the country that suffered more phishing attacks per user over the course of Q3 2015.

During Q2 2015 United Arab Emirates was in the first place of countries with higher percentages of users attacked by phishing. This level has slowed down during this Q returning to its historical series. Phishing messages targeting the financial sector (banks, payment systems and online shops) accounted for more than 30% during this period, an increase of a 2.8 % compared with the data analyzed in Q2 2015. Banks are still the main targets within this sector as we observed during the last years.

Banking malware
For the first time since the start of the year the number of Dyre infections decresed (-2%) globally. The impact in UK and Spain of this malware has grown significally during this period, confirming the interest of the Dyre gang for both countries.

The number of infections of the Zeus Trojan and its variants keeps decreasing for the second period during this year.

When it comes to POS malware the number of infections for Cardthief, a 64 bits POS malware, shows an increase of activity during the end of Q3 2015.

Mobile malware
Once again Android is the most frequently targeted platform. 99.69% of the mobile malware detected target this operating system.

Russian Federation, Vietnam and Ukraine have almost the 90% of infections. Germany, Italy, France, Poland and Austria are the most infected European countries.

More info about our Security Trends Reports at www.elevenpaths.com
ElevenPaths’ Analyst Team

About the relations between ngemobi/Xinynhe, Ghost Push, Kemoge and Odpa malicious Android adware

Florence Broderick    21 October, 2015
Over the last few weeks we have seen some blog entries about different new Android based mobile malicious adware families discovered or spotted by CM Security Research Lab, Checkpoint, FireEye and Trend Micro, that allows a complete takeover of an Android user’s device. These mobile malicious adware families have been named “NGE MOBI/Xinyinhe”, “Brain Test”, “Ghost Push” and “Kemoge”, and are supposed to be developed by Chinese groups. We have tried to detect relationships between these different families. For example:

  • What’s going on with these “new” malicious adware families? How “new” are they?
  • Are these different malicious adware campaigns somehow connected?
  • Who has developed this adware campaigns?

In order to find the answer to these questions, the reported malicious adware families have been “squeezed” by Eleven Paths analyst researches using our in-house developed mobile cyber-intelligence Tacyt tool, to obtain more contextual information and the particular associated app “singularities” (technical or circumstantial app data that are “singular or unique” to a developer and/or application).

The above mentioned different adware campaigns have been analyzed and correlated on the basis of various application parameters, and the evidences obtained suggest us that:

  • The malicious adware family reported recently by FireEye (in September and October) seems to be related with the “Ghost Push” malware discovered by CM Security Research Lab and Trend Micro, as several clues regarding the links and associated certificate info included in the app point to the same developers, which in turn, seems to be related with the FireEye’s “Kemoge” called adware family as well.
  • The “Brain Test” malware app reported by CheckPoint contacted a server domain included also on the “Kemoge” adware family sample.
  • The aggressive adware discovered apps have had some versions in Google Play in early 2015, by a developer that produced aggressive adware as well.

Taking into account the several obtained “singularities” and hints, it seems that this adware or malware may all come from a single root, probably the known Odpa or Opda (it depends on the antivirus engine) creators (a known adware and infostealer) that may be the predecessor of these malicious adware families.

Brief research schema

Squeezing the Apps

Here we expose a few details of a much deeper analysis that you may find complete in a link below.

As shown in one of the FireEye reports the attackers have repackaged popular apps and inject ed malicious logic and ad components into the apps. The malicious adware iterates some domains and posts data once a connection is established. Searching with our Tacyt tool for the specific domains used by the malicious adware as indicated by the FireEye team, our analysts have found 12 different apps (some from the report itself, some from “Kemoge” samples). One of them, with “com.android.camera.update” package name, to be related to another (and supposed different) described mobile attack dubbed “MonkeyTest” by Cheetah Mobile on September 18th, 2015.

Searching for the com.android.camera.update app (from CM report), it reveals that this app uses a certificate singularity shared with one of the FireEye is reporting as downloaded by their samples. It shares the word “dashi” as well in the package name. There are even some specific strings in the code, which are shared between samples from all the reports.

It seems that some of the apps related with the developers were uploaded to Google Play back in late December or January. Searching with Tacyt for some specific binary files inside the apk, it brought us to some apps on Google Play which have been removed last January from the market.

Apps sharing very specific binary files

A curious thing is that most of them share this application permission, which is not very common (32 out of 4.5M apps): android.permission.ACCESS_MTK_MMHW.

Searching for certificates with those particular characteristics and for apps removed from Google Play the exact same day (which is supposed to be when Google discovered the fraud and cleaned the market), Tacyt obtained some evidence of related bands, like this particular UMENG ApiKey, as shown on the picture below:

Shared UMENG Api Key

This UMENG ApiKey has been shared with only a previous version of “Root Checker”, removed from Google Play on 27th, December, 2014 and from “OPDA” developers that claim that their developer web is www.dashi.com, which in turn, is related to a previous package name used in NGE (Xiny) attack. And there are even more connections between the word “Dashi” and OPDA developer. OPDA developers may be behind Odpa/Opda adware famlily, found in summer 2014.

On the other hand, CheckPoint reported that some of the domains found inside “Brain Test” malicious app seems to be present in “Kemoge” adware family as well:

Sharing specific domains

Conclusions

Tacyt’s powerful engine enables the analyst teams of the organizations to easily evaluate and correlate the application and its circumstances: when, who, what and where.

Using Tacyt our analyst team has been able to obtain further evidences that suggest a relationship between several reports, and confirm that some of aggressive apps discovered had a version in Google Play in early 2015. The evidences suggests that this supposed different families of malware, may be just the same Chinese band (because of the infrastructure, domains, topics, files, etc. they use) evolving the same idea about serving aggressive ads, rooting the devices, sending commands and installing new packages.

We assume this because of the several hints that join the families: domains, dates, permissions, names, certificates, resources, etc. They started their activities maybe in late 2014, using the OPDA “brand”, trying to introduce malware in Google Play and legitimate apps as well. Later, they have evolved with new techniques, from “Xinyinhe adware”, that seems to be just a variant of “Ghost Push” to “Brain Test” which seems some experiment before they got to “Kemoge”. It seems that this Chinese gang is evolving techniques and creating more effective adware that are not able to spread via Google Play anymore, but third party stores. Anyhow, it seems that they use Google Play to serve “less aggressive” adware.

Disclaimer:

This whole report has been done without code analysis and with the minimum information provided by the blog post mentioned above. Taking into account more samples, relations between all the samples are even stronger. A further analysis of all the data collected (emails, links, strings, etc) from all the apks related, may guide us to a more accurate attribution.

Although hereby we briefly describe our research, the complete analysis process may be found here.