Android apps infected with umm… *Windows* malware

Graham Cluley

Android apps infected with umm... *Windows* malware

Android apps infected with umm... *Windows* malware

Security researchers at Palo Alto Networks recently discovered 145 apps in the official Google Play Android store that were “infected by malicious Microsoft Windows executable files.”

Yes, you read that correctly. Android apps carrying malicious Windows executables.

The malicious code can’t infect your Android device, of course, as the malware needs to run on a Windows system… not an Android one.

But it’s still a concern. Why? Because, as the security researchers explain in a blog post, it suggests that software developer ‘odieapps’ is not creating their apps in secure environment:

Notably, the infected APK files do not pose any threat to Android devices, as these embedded Windows executable binaries can only run on Windows systems: they are inert and ineffective on the Android platform. The fact that these APK files are infected indicates that the developers are creating the software on compromised Windows systems that are infected with malware. This type of infection is a threat to the software supply chain, as compromising software developers has proven to be an effective tactic for wide scale attacks. Examples include, KeRanger, XcodeGhost, and NotPetya.

The researchers report that many of the malware-carrying apps have gone unnoticed in the Google Play store for over half a year, and some have been downloaded over a thousand times and received four-star ratings.

Infected apps include “Learn to Draw Clothing”, “Hair Paint Color”, “Men’s Design Ideas”, “Modification Trail” (for fans of trail biking), and “Gymnastics Training Tutorial”.

Gym training app

So, what would happen if the malicious code in these Android apps *did* end up running on a Windows computer? The malware would attempt to capture your keypresses, stealing passwords, credit card details, and any other sensitive information you might type.

Palo Alto’s researchers informed Google’s security team of the problem, and the offending apps have been chucked out of the Google Play store.

But one wonders how many other Android apps are unknowingly being piggybacked by Windows malware. And, of course, how many software developers are building their programs in insecure environments.

Graham Cluley Graham Cluley is a veteran of the anti-virus industry having worked for a number of security companies since the early 1990s when he wrote the first ever version of Dr Solomon's Anti-Virus Toolkit for Windows. Now an independent security analyst, he regularly makes media appearances and is an international public speaker on the topic of computer security, hackers, and online privacy. Follow him on Twitter at @gcluley, or drop him an email.

2 Replies to “Android apps infected with umm… *Windows* malware”

    1. Hi I found some by using the link in the piece click on "explain in a blog post". Or this is the address it opens:- https://researchcenter.paloaltonetworks.com/2018/07/unit42-hidden-devil-development-life-cycle-google-play-apps-infected-windows-executable-files/

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.