Researchers have discovered an app in the Google Play Store that steals users’ photos and videos.
Symantec’s Shaun Aimoto explains that the app “HTML Source Code Viewer”, developed by Sunuba Gaming, poses as a development tool.
In actuality, the app sends files stored in an Android phone’s standard image and video locations to “proqnoz.info,” a web server hosted in Azerbaijan.
Attackers could use people’s stolen media for all kinds of nefarious purposes. As Aimoto notes in a blog post:
“A look on this server revealed a wealth of personal media files dating as far back as March, 2015. This personal media could be used for blackmailing, ransomware attacks, identity theft, pornography, and other forms of victimization.”
This is not the first media-stealing app Symantec has discovered. In June, the computer security firm detected “Beaver Gang Counter,” which masqueraded as an entertainment app while it stole all media files related to the Viber app and sent them to a remote server.
HTML Source Code Viewer had at most 5,000 downloads before Symantec notified Google’s security teams, who swiftly took down the app from the Google Play Store.
Like most file stealers, the app had a series of questionable permissions given its alleged purpose, including the ability to open network connections and to read from/write to external storage.
With that in mind, users should carefully review the permissions of any and all apps they download onto their devices, including those that are available on Google Play. If the permissions seem inconsistent with the app’s advertised function, they should avoid installing the app altogether and notify Google’s security teams.
Users should also update their software, back up their important data, install a security solution onto their devices, and download apps only from trusted developers on the Google Play Store.
Found this article interesting? Follow Graham Cluley on Twitter to read more of the exclusive content we post.