{"id":3856,"date":"2019-10-29T10:40:44","date_gmt":"2019-10-29T08:40:44","guid":{"rendered":"https:\/\/blog.eset.ee\/?p=3856"},"modified":"2019-10-29T11:36:17","modified_gmt":"2019-10-29T09:36:17","slug":"tracking-down-the-developer-of-android-adware-affecting-millions-of-users","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2019\/10\/29\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\/","title":{"rendered":"Tracking down the developer of Android adware affecting millions of users"},"content":{"rendered":"\n<p>We detected a large adware campaign running for about a year, with the involved apps installed eight million times from Google Play alone.<\/p>\n\n\n\n<p>We identified 42 apps on Google Play as belonging to the campaign, which had been running since July 2018. Of those, 21 were still available at the time of discovery. We reported the apps to the Google security team and they were swiftly removed. However, the apps are still available in third-party app stores. ESET detects this adware, collectively, as Android\/AdDisplay.Ashas.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-1-1.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-1-1.png\" alt=\"\" class=\"wp-image-130779\"\/><\/a><\/figure>\n\n\n\n<p><em>Figure 1. Apps of the Android\/AdDisplay.Ashas family reported to Google by ESET<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-2.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-2-570x1024.png\" alt=\"\" class=\"wp-image-130780\"\/><\/a><\/figure>\n\n\n\n<p><em>Figure 2. The most popular member of the Android\/AdDisplay.Ashas family on Google Play was \u201cVideo downloader master\u201d with over five million downloads<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ashas functionality<\/h2>\n\n\n\n<p>All the apps provide the functionality they promise, besides working as adware. The adware functionality is the same in all the apps we analyzed. [Note: The analysis of the functionality below describes a single app, but applies to all apps of the Android\/AdDisplay.Ashas family.]<\/p>\n\n\n\n<p>Once launched, the app starts to communicate with its C&amp;C server (whose IP address is base64-encoded in the app). It sends \u201chome\u201d key data about the affected device: device type, OS version, language, number of installed apps, free storage space, battery status, whether the device is rooted and&nbsp;<em>Developer mode<\/em>&nbsp;enabled, and whether Facebook and FB Messenger are installed.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-3.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-3-300x83.png\" alt=\"\" class=\"wp-image-130781\"\/><\/a><\/figure>\n\n\n\n<p><em>Figure 3. Sending information about the affected device<\/em><\/p>\n\n\n\n<p>The app receives configuration data from the C&amp;C server, needed for displaying ads, and for stealth and resilience.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-4.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-4-300x93.png\" alt=\"\" class=\"wp-image-130782\"\/><\/a><\/figure>\n\n\n\n<p><em>Figure 4. Configuration file received from the C&amp;C server<\/em><\/p>\n\n\n\n<p>As for stealth and resilience, the attacker uses a number of tricks.<\/p>\n\n\n\n<p>First, the malicious app tries to determine whether it is being tested by the Google Play security mechanism. For this purpose, the app receives from the C&amp;C server the&nbsp;<em>isGoogleIp<\/em>&nbsp;flag, which indicates whether the IP address of the affected device falls within the range of known IP addresses for Google servers. If the server returns this flag as positive, the app will not trigger the adware payload.<\/p>\n\n\n\n<p>Second, the app can set a custom delay between displaying ads. The samples we have seen had their configuration set to delay displaying the first ad by 24 minutes after the device unlocks. This delay means that a typical testing procedure, which takes less than 10 minutes, will not detect any unwanted behavior. Also, the longer the delay, the lower the risk of the user associating the unwanted ads with a particular app.<\/p>\n\n\n\n<p>Third, based on the server response, the app can also hide its icon and create a shortcut instead. If a typical user tries to get rid of the malicious app, chances are that only the shortcut ends up getting removed. The app then continues to run in the background without the user\u2019s knowledge. This stealth technique has been gaining popularity among adware-related threats distributed via Google Play.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-5.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-5-300x53.png\" alt=\"\" class=\"wp-image-130783\"\/><\/a><\/figure>\n\n\n\n<p><em>Figure 5. Time delay to postpone displaying ads implemented by the adware<\/em><\/p>\n\n\n\n<p>Once the malicious app receives its configuration data, the affected device is ready to display ads as per the attacker\u2019s choice; each ad is displayed as a full screen activity. If the user wants to check which app is responsible for the ad being displayed, by hitting the \u201cRecent apps\u201d button, another trick is used: the app displays a Facebook or Google icon, as seen in Figure 6. The adware mimics these two apps to look legitimate and avoid suspicion \u2013 and thus stay on the affected device for as long as possible.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-6ab.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-6ab-300x266.png\" alt=\"\" class=\"wp-image-130787\"\/><\/a><\/figure>\n\n\n\n<p><em>Figure 6. The adware activity impersonates Facebook (left). If the user long-presses the icon, the name of the app responsible for the activity is revealed (right).<\/em><\/p>\n\n\n\n<p>Finally, the Ashas adware family has its code hidden under the&nbsp;<em>com.google.xxx<\/em>&nbsp;package name. This trick \u2013 posing as a part of a legitimate Google service \u2013 may help avoid scrutiny. Some detection mechanisms and sandboxes may whitelist such package names, in an effort to prevent wasting resources.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-7.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-7.png\" alt=\"\" class=\"wp-image-130770\"\/><\/a><\/figure>\n\n\n\n<p><em>Figure 7. Malicious code hidden in a package named \u201ccom.google\u201d<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Hunting down the developer<\/h2>\n\n\n\n<p>Using open-source information, we tracked down the developer of the adware, who we also identified as the campaign\u2019s operator and owner of the C&amp;C server. In the following paragraphs, we outline our&nbsp; efforts to discover other applications from the same developer and protect our users from it.<\/p>\n\n\n\n<p>First, based on information that is associated with the registered C&amp;C domain, we identified the name of the registrant, along with further data like country and email address, as seen in Figure 8.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-8.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-8.png\" alt=\"\" class=\"wp-image-130771\"\/><\/a><\/figure>\n\n\n\n<p><em>Figure 8. Information about the C&amp;C domain used by the Ashas adware<\/em><\/p>\n\n\n\n<p>Knowing that the information provided to a domain registrar might be fake, we continued our search. The email address and country information drove us to a list of students attending a class at a Vietnamese university \u2013 corroborating the existence of the person under whose name the domain was registered.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-9.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-9-300x180.png\" alt=\"\" class=\"wp-image-130772\"\/><\/a><\/figure>\n\n\n\n<p><em>Figure 9. A university class student list including the C&amp;C domain registrant<\/em><\/p>\n\n\n\n<p>Due to poor privacy practices on the part of our culprit\u2019s university, we now know his date of birth (probably: he seemingly used his birth year as part of his Gmail address, as further partial confirmation), we know that he was a student and what university he attended. We were also able to confirm that the phone number he provided to the domain registrar was genuine. Moreover, we retrieved his University ID; a quick googling showed some of his exam grades. However, his study results are out of the scope of our research.<\/p>\n\n\n\n<p>Based on our culprit\u2019s email address, we were able to find his GitHub repository. His repository proves that he is indeed an Android developer, but it contained no publicly available code of the Ashas adware at the time of writing of this blogpost.<\/p>\n\n\n\n<p>However, a simple Google search for the adware package name returned a \u201cTestDelete\u201d project that had been available in his repository at some point<\/p>\n\n\n\n<p>The malicious developer also has apps in Apple\u2019s App Store. Some of them are iOS versions of the ones removed from Google Play, but none contain adware functionality.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-10.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-10-300x218.png\" alt=\"\" class=\"wp-image-130773\"\/><\/a><\/figure>\n\n\n\n<p><em>Figure 10. The malicious developer\u2019s apps published on the App Store which don\u2019t contain the Ashas adware<\/em><\/p>\n\n\n\n<p>Searching further for the malicious developer\u2019s activities, we also discovered his Youtube channel propagating the Ashas adware and his other projects. As for the Ashas family, one of the associated promotional videos, \u201cHead Soccer World Champion 2018 \u2013 Android, ios\u201d was viewed almost three million times and two others reached hundreds of thousands of views, as seen in Figure 11.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-11.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-11-300x290.png\" alt=\"\" class=\"wp-image-130774\"\/><\/a><\/figure>\n\n\n\n<p><em>Figure 11. YouTube channel of the malicious developer<\/em><\/p>\n\n\n\n<p>His YouTube channel provided us with another valuable piece of information: he himself features in a video tutorial for one of his other projects. Thanks to that project, we were able to extract his Facebook profile \u2013 which lists his studies at the aforementioned university.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-12.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-12-300x138.png\" alt=\"\" class=\"wp-image-130775\"\/><\/a><\/figure>\n\n\n\n<p><em>Figure 12. Facebook profile of the C&amp;C domain registrar (cover picture and profile picture edited out)<\/em><\/p>\n\n\n\n<p>Linked on the malicious developer\u2019s Facebook profile, we discovered a Facebook page,&nbsp;<em>Minigameshouse<\/em>, and an associated domain, minigameshouse[.]net. This domain is similar to the one the malware author used for his adware C&amp;C communication, minigameshouse[.]us.<\/p>\n\n\n\n<p>Checking this&nbsp;<em>Minigameshouse<\/em>&nbsp;page further indicates that this person is indeed the owner of the minigameshouse[.]us domain: the phone number registered with this domain is the same as the phone number appearing on the Facebook page.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-13.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-13-247x300.png\" alt=\"\" class=\"wp-image-130776\"\/><\/a><\/figure>\n\n\n\n<p><em>Figure 13. Facebook page managed by the C&amp;C domain registrant uses the same base domain name (minigameshouse) and phone number as the registered malicious C&amp;C used by the Ashas adware<\/em><\/p>\n\n\n\n<p>Of interest is that on the&nbsp;<em>Minigameshouse<\/em>&nbsp;Facebook page, the malicious developer promotes a slew of games beyond the Ashas family for download on both Google Play and the App Store. However, all of those have been removed from Google Play \u2013 despite the fact that some of them didn\u2019t contain any adware functionality.<\/p>\n\n\n\n<p>On top of all this, one of the malicious developer\u2019s YouTube videos \u2013 a tutorial on developing an \u201cInstant Game\u201d for Facebook \u2013 serves as an example of operational security completely ignored. We were able to see that his recently visited web sites were Google Play pages belonging to apps containing the Ashas adware. He also used his email account to log into various services in the video, which identifies him as the adware domain owner, beyond any doubt.<\/p>\n\n\n\n<p>Thanks to the video, we were even able to identify three further apps that contained adware functionality and were available on Google Play.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-14.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-14-300x259.png\" alt=\"\" class=\"wp-image-130777\"\/><\/a><\/figure>\n\n\n\n<p><em>Figure 14. Screenshots from this developer\u2019s YouTube video shows history of checking Ashas adware on Google Play<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">ESET telemetry<\/h2>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-15.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-15-300x220.png\" alt=\"\" class=\"wp-image-130778\"\/><\/a><\/figure>\n\n\n\n<p><em>Figure 15. ESET detections of Android\/AdDisplay.Ashas on Android devices by country<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Is adware harmful?<\/h2>\n\n\n\n<p>Because the real nature of apps containing adware is usually hidden to the user, these apps and their developers should be considered untrustworthy. When installed on a device, apps containing adware may, among other things:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Annoy users with intrusive advertisements, including scam ads<\/li><li>Waste the device\u2019s battery resources<\/li><li>Generate increased network traffic<\/li><li>Gather users\u2019 personal information<\/li><li>Hide their presence on the affected device to achieve persistence<\/li><li>Generate revenue for their operator without any user interaction<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Based solely on open source intelligence, we were able to trace the developer of the Ashas adware and establish his identity and discover additional related adware-infected apps. Seeing that the developer did not take any measures to protect his identity, it seems likely that his intentions weren\u2019t dishonest at first \u2013 and this is also supported by the fact that not all his published apps contained unwanted ads.<\/p>\n\n\n\n<p>At some point in his Google Play \u201ccareer\u201d, he apparently decided to increase his ad revenue by implementing adware functionality in his apps\u2019 code. The various stealth and resilience techniques implemented in the adware show us that the culprit was aware of the malicious nature of the added functionality and attempted to keep it hidden.<\/p>\n\n\n\n<p>Sneaking unwanted or harmful functionality into popular, benign apps is a common practice among \u201cbad\u201d developers, and we are committed to tracking down such apps. We report them to Google and take other steps to disrupt malicious campaigns we discover. Last but not least, we publish our findings to help Android users protect themselves.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Indicators of Compromise (IoCs)<\/h2>\n\n\n\n<table class=\"wp-block-table\"><thead><tr><th>Package name<\/th><th>Hash<\/th><th>Installs<\/th><\/tr><\/thead><tbody><tr><td>com.ngocph.masterfree<\/td><td>c1c958afa12a4fceb595539c6d208e6b103415d7<\/td><td>5,000,000+<\/td><\/tr><tr><td>com.mghstudio.ringtonemaker<\/td><td>7a8640d4a766c3e4c4707f038c12f30ad7e21876<\/td><td>500,000+<\/td><\/tr><tr><td>com.hunghh.instadownloader<\/td><td>8421f9f25dd30766f864490c26766d381b89dbee<\/td><td>500,000+<\/td><\/tr><tr><td>com.chungit.tank1990<\/td><td>237f9bfe204e857abb51db15d6092d350ad3eb01<\/td><td>500,000+<\/td><\/tr><tr><td>com.video.downloadmasterfree<\/td><td>43fea80444befe79b55e1f05d980261318472dff<\/td><td>100,000+<\/td><\/tr><tr><td>com.massapp.instadownloader<\/td><td>1382c2990bdce7d0aa081336214b78a06fceef62<\/td><td>100,000+<\/td><\/tr><tr><td>com.chungit.tankbattle<\/td><td>1630b926c1732ca0bb2f1150ad491e19030bcbf2<\/td><td>100,000+<\/td><\/tr><tr><td>com.chungit.basketball<\/td><td>188ca2d47e1fe777c6e9223e6f0f487cb5e98f2d<\/td><td>100,000+<\/td><\/tr><tr><td>com.applecat.worldchampion2018<\/td><td>502a1d6ab73d0aaa4d7821d6568833028b6595ec<\/td><td>100,000+<\/td><\/tr><tr><td>org.minigamehouse.photoalbum<\/td><td>a8e02fbd37d0787ee28d444272d72b894041003a<\/td><td>100,000+<\/td><\/tr><tr><td>com.mngh.tuanvn.fbvideodownloader<\/td><td>035624f9ac5f76cc38707f796457a34ec2a97946<\/td><td>100,000+<\/td><\/tr><tr><td>com.v2social.socialdownloader<\/td><td>2b84fb67519487d676844e5744d8d3d1c935c4b7<\/td><td>100,000+<\/td><\/tr><tr><td>com.hikeforig.hashtag<\/td><td>8ed42a6bcb14396563bb2475528d708c368da316<\/td><td>100,000+<\/td><\/tr><tr><td>com.chungit.heroesjump<\/td><td>c72e92e675afceca23bbe77008d921195114700c<\/td><td>100,000+<\/td><\/tr><tr><td>com.mp4.video.downloader<\/td><td>61E2C86199B2D94ABF2F7508300E3DB44AE1C6F1<\/td><td>100,000+<\/td><\/tr><tr><td>com.videotomp4.downloader<\/td><td>1f54e35729a5409628511b9bf6503863e9353ec9<\/td><td>50,000+<\/td><\/tr><tr><td>boxs.puzzles.Puzzlebox<\/td><td>b084a07fdfd1db25354ad3afea6fa7af497fb7dc<\/td><td>50,000+<\/td><\/tr><tr><td>com.intatwitfb.download.videodownloader<\/td><td>8d5ef663c32c1dbcdd5cd7af14674a02fed30467<\/td><td>50,000+<\/td><\/tr><tr><td>com.doscreenrecorder.screenrecorder<\/td><td>e7da1b95e5ddfd2ac71587ad3f95b2bb5c0f365d<\/td><td>50,000+<\/td><\/tr><tr><td>com.toptools.allvideodownloader<\/td><td>32E476EA431C6F0995C75ACC5980BDBEF07C8F7F<\/td><td>50,000+<\/td><\/tr><tr><td>com.top1.videodownloader<\/td><td>a24529933f57aa46ee5a9fd3c3f7234a1642fe17<\/td><td>10,000+<\/td><\/tr><tr><td>com.santastudio.headsoccer2<\/td><td>86d48c25d24842bac634c2bd75dbf721bcf4e2ea<\/td><td>10,000+<\/td><\/tr><tr><td>com.ringtonemakerpro.ringtonemakerapp2019<\/td><td>5ce9f25dc32ac8b00b9abc3754202e96ef7d66d9<\/td><td>10,000+<\/td><\/tr><tr><td>com.hugofq.solucionariodebaldor<\/td><td>3bb546880d93e9743ac99ad4295ccaf982920260<\/td><td>10,000+<\/td><\/tr><tr><td>com.anit.bouncingball<\/td><td>6e93a24fb64d2f6db2095bb17afa12c34b2c8452<\/td><td>10,000+<\/td><\/tr><tr><td>com.dktools.liteforfb<\/td><td>7bc079b1d01686d974888aa5398d6de54fd9d116<\/td><td>10,000+<\/td><\/tr><tr><td>net.radiogroup.tvnradio<\/td><td>ba29f0b4ad14b3d77956ae70d812eae6ac761bee<\/td><td>10,000+<\/td><\/tr><tr><td>com.anit.bouncingball<\/td><td>6E93A24FB64D2F6DB2095BB17AFA12C34B2C8452<\/td><td>10,000+<\/td><\/tr><tr><td>com.floating.tube.bymuicv<\/td><td>6A57D380CDDCD4726ED2CF0E98156BA404112A53<\/td><td>10,000+<\/td><\/tr><tr><td>org.cocos2dx.SpiderSolitaireGames<\/td><td>adbb603195c1cc33f8317ba9f05ae9b74759e75b<\/td><td>5,000+<\/td><\/tr><tr><td>games.puzzle.crosssum<\/td><td>31088dc35a864158205e89403e1fb46ef6c2c3cd<\/td><td>5,000+<\/td><\/tr><tr><td>dots.yellow.craft<\/td><td>413ce03236d3604c6c15fc8d1ec3c9887633396c<\/td><td>5,000+<\/td><\/tr><tr><td>com.tvngroup.ankina.reminderWater<\/td><td>5205a5d78b58a178c389cd1a7b6651fe5eb7eb09<\/td><td>5,000+<\/td><\/tr><tr><td>com.hdevs.ringtonemaker2019<\/td><td>ba5a4220d30579195a83ddc4c0897eec9df59cb7<\/td><td>5,000+<\/td><\/tr><tr><td>com.carlosapps.solucionariodebaldor<\/td><td>741a95c34d3ad817582d27783551b5c85c4c605b<\/td><td>5,000+<\/td><\/tr><tr><td>com.mngh1.flatmusic<\/td><td>32353fae3082eaeedd6c56bb90836c89893dc42c<\/td><td>5,000+<\/td><\/tr><tr><td>com.tvn.app.smartnote<\/td><td>ddf1f864325b76bc7c0a7cfa452562fe0fd41351<\/td><td>1,000+<\/td><\/tr><tr><td>com.thrtop.alldownloader<\/td><td>f46ef932a5f8e946a274961d5bdd789194bd2a7d<\/td><td>1,000+<\/td><\/tr><tr><td>com.anthu91.soccercard<\/td><td>0913a34436d1a7fcd9b6599fba64102352ef2a4a<\/td><td>1,000+<\/td><\/tr><tr><td>com.hugofq.wismichudosmildiecisiete<\/td><td>4715bd777d0e76ca954685eb32dc4d16e609824f<\/td><td>1,000+<\/td><\/tr><tr><td>com.gamebasketball.basketballperfectshot<\/td><td>e97133aaf7d4bf90f93fefb405cb71a287790839<\/td><td>1,000+<\/td><\/tr><tr><td>com.nteam.solitairefree<\/td><td>3095f0f99300c04f5ba877f87ab86636129769b1<\/td><td>100+<\/td><\/tr><tr><td>com.instafollowers.hiketop<\/td><td>3a14407c3a8ef54f9cba8f61a271ab94013340f8<\/td><td>1+<\/td><\/tr><\/tbody><\/table>\n\n\n\n<h3 class=\"wp-block-heading\">C&amp;C server<\/h3>\n\n\n\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttp:\/\/35.198.197[.]119:8080\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">MITRE ATT&amp;CK techniques<\/h2>\n\n\n\n<table class=\"wp-block-table\"><thead><tr><th>Tactic<\/th><th>ID<\/th><th>Name<\/th><th>Description<\/th><\/tr><\/thead><tbody><tr><td>Initial Access<\/td><td><a href=\"https:\/\/attack.mitre.org\/techniques\/T1475\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1475<\/a><\/td><td>Deliver Malicious App via Authorized App Store<\/td><td>The malware impersonates legitimate services on Google Play<\/td><\/tr><tr><td>Persistence<\/td><td><a href=\"https:\/\/attack.mitre.org\/techniques\/T1402\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1402<\/a><\/td><td>App Auto-Start at Device Boot<\/td><td>An Android application can listen for the BOOT_COMPLETED broadcast, ensuring that the app&#8217;s functionality will be activated every time the device starts<\/td><\/tr><tr><td>Impact<\/td><td><a href=\"https:\/\/attack.mitre.org\/techniques\/T1472\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1472<\/a><\/td><td>Generate Fraudulent Advertising Revenue<\/td><td>Generates revenue by automatically displaying ads<\/td><\/tr><\/tbody><\/table>\n\n\n\n<p><em>Kudos to @jaymin9687 for bringing the problem of unwanted ads in the \u201cVideo downloader master\u201d app to our attention.<\/em><\/p>\n\n\n\n<p>Source: <a href=\"https:\/\/www.welivesecurity.com\/2019\/10\/24\/tracking-down-developer-android-adware\/\">Welivesecurity<\/a><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We detected a large adware campaign running for about a year, with the involved apps installed eight million times from Google Play alone. We identified 42 apps on Google Play as belonging to the campaign, which had been running since July 2018. Of those, 21 were still available at the time of discovery. We reported<\/p>\n","protected":false},"author":5,"featured_media":3857,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[160],"tags":[],"class_list":["post-3856","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Tracking down the developer of Android adware affecting millions of users - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2019\/10\/29\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tracking down the developer of Android adware affecting millions of users\" \/>\n<meta property=\"og:description\" content=\"We detected a large adware campaign running for about a year, with the involved apps installed eight million times from Google Play alone. We identified 42 apps on Google Play as belonging to the campaign, which had been running since July 2018. Of those, 21 were still available at the time of discovery. We reported\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2019\/10\/29\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-29T08:40:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-10-29T09:36:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/10\/trck.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1188\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/10\\\/29\\\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/10\\\/29\\\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"Tracking down the developer of Android adware affecting millions of users\",\"datePublished\":\"2019-10-29T08:40:44+00:00\",\"dateModified\":\"2019-10-29T09:36:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/10\\\/29\\\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\\\/\"},\"wordCount\":2387,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/10\\\/29\\\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/trck.jpg\",\"articleSection\":[\"malware\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2019\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/10\\\/29\\\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/10\\\/29\\\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\\\/\",\"name\":\"Tracking down the developer of Android adware affecting millions of users - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/10\\\/29\\\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/10\\\/29\\\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/trck.jpg\",\"datePublished\":\"2019-10-29T08:40:44+00:00\",\"dateModified\":\"2019-10-29T09:36:17+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/10\\\/29\\\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/10\\\/29\\\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/10\\\/29\\\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/trck.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/trck.jpg\",\"width\":1920,\"height\":1188},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/10\\\/29\\\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tracking down the developer of Android adware affecting millions of users\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/10\\\/29\\\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Tracking down the developer of Android adware affecting millions of users - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2019\/10\/29\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\/","og_locale":"en_US","og_type":"article","og_title":"Tracking down the developer of Android adware affecting millions of users","og_description":"We detected a large adware campaign running for about a year, with the involved apps installed eight million times from Google Play alone. We identified 42 apps on Google Play as belonging to the campaign, which had been running since July 2018. Of those, 21 were still available at the time of discovery. We reported","og_url":"https:\/\/blog.eset.ee\/et\/en\/2019\/10\/29\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2019-10-29T08:40:44+00:00","article_modified_time":"2019-10-29T09:36:17+00:00","og_image":[{"width":1920,"height":1188,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/10\/trck.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/10\/29\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/10\/29\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"Tracking down the developer of Android adware affecting millions of users","datePublished":"2019-10-29T08:40:44+00:00","dateModified":"2019-10-29T09:36:17+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/10\/29\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\/"},"wordCount":2387,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/10\/29\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/10\/trck.jpg","articleSection":["malware"],"inLanguage":"en-US","copyrightYear":"2019","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/10\/29\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\/","url":"https:\/\/blog.eset.ee\/et\/en\/2019\/10\/29\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\/","name":"Tracking down the developer of Android adware affecting millions of users - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/10\/29\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/10\/29\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/10\/trck.jpg","datePublished":"2019-10-29T08:40:44+00:00","dateModified":"2019-10-29T09:36:17+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/10\/29\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2019\/10\/29\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/10\/29\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/10\/trck.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/10\/trck.jpg","width":1920,"height":1188},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/10\/29\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"Tracking down the developer of Android adware affecting millions of users"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/10\/29\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/3856","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=3856"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/3856\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/3857"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=3856"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=3856"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=3856"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}