Android apps infected with umm… *Windows* malware

145 Android apps yanked from official Google Play store.

Android apps infected with umm... *Windows* malware

Security researchers at Palo Alto Networks recently discovered 145 apps in the official Google Play Android store that were “infected by malicious Microsoft Windows executable files.”

Yes, you read that correctly. Android apps carrying malicious Windows executables.

The malicious code can’t infect your Android device, of course, as the malware needs to run on a Windows system… not an Android one.

But it’s still a concern. Why? Because, as the security researchers explain in a blog post, it suggests that software developer ‘odieapps’ is not creating their apps in secure environment:

Notably, the infected APK files do not pose any threat to Android devices, as these embedded Windows executable binaries can only run on Windows systems: they are inert and ineffective on the Android platform. The fact that these APK files are infected indicates that the developers are creating the software on compromised Windows systems that are infected with malware. This type of infection is a threat to the software supply chain, as compromising software developers has proven to be an effective tactic for wide scale attacks. Examples include, KeRanger, XcodeGhost, and NotPetya.

The researchers report that many of the malware-carrying apps have gone unnoticed in the Google Play store for over half a year, and some have been downloaded over a thousand times and received four-star ratings.

Infected apps include “Learn to Draw Clothing”, “Hair Paint Color”, “Men’s Design Ideas”, “Modification Trail” (for fans of trail biking), and “Gymnastics Training Tutorial”.

Gym training app

So, what would happen if the malicious code in these Android apps *did* end up running on a Windows computer? The malware would attempt to capture your keypresses, stealing passwords, credit card details, and any other sensitive information you might type.

Palo Alto’s researchers informed Google’s security team of the problem, and the offending apps have been chucked out of the Google Play store.

But one wonders how many other Android apps are unknowingly being piggybacked by Windows malware. And, of course, how many software developers are building their programs in insecure environments.

Tags: , , ,

   Join thousands of others and sign up to our free "GCHQ" newsletter.

Smashing Security podcast
Check out "Smashing Security", the award-winning weekly audio podcast, with Graham Cluley, Carole Theriault, and special guests from the world of information security.

"It's brilliant!" • "Three people having fun in an industry often focused on bad news" • Winner of the Best Security Podcast 2018

Latest episodes:
Listen on Apple Podcasts Listen on Google Podcasts

, , ,

2 Responses

  1. Patrick Snell

    August 2, 2018 at 12:21 am #

    Is there a list of the 145 apps so we can get them off our phones?

    • Gary Taylor in reply to Patrick Snell.

      August 2, 2018 at 6:20 pm #

      Hi I found some by using the link in the piece click on “explain in a blog post”. Or this is the address it opens:- https://researchcenter.paloaltonetworks.com/2018/07/unit42-hidden-devil-development-life-cycle-google-play-apps-infected-windows-executable-files/

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.