New Android Downloader Masquerading as Flash Player Update – ESET Discovery

Next story

Unwary users who fall for installing the malware might find their mobile devices held ransom or bank accounts emptied. ESET researchers discovered a dangerous new app targeting Android devices is capable of downloading and executing additional malware. Detected by ESET security software as Android/TrojanDownloader.Agent.JI, the trojan is distributed via compromised websites and masquerades as a Flash Player update. This and other threats on the Android platform will be among the topics addressed by ESET at the Mobile World Congress.

 

Figure 1: Fake Flash Player update screen 

Following installation, the malware creates a fake ‘Saving Battery’ service in the Android system and urges the victim to grant it crucial permissions within Android’s Accessibility functions. If granted, these permissions - Monitor your actions, Retrieve window content and Turn on Explore by Touch - enable the attacker to mimic the user’s actions and display whatever they want on the user’s screen. “In cases we investigated, this trojan was built to download another trojan designed for siphoning off funds from bank accounts. However, it would take only a small change in the code for the user to get served with spyware or ransomware,” warns Lukáš Štefanko, the ESET Malware Researcher who led the analysis.The key indicator of whether a device has been infected with this malware is the presence of a “Saving Battery” option amongst Services in the Accessibility menu. In such a case, the user should either employ a reputable mobile security app, such as ESET Mobile Security & Antivirus, to remove the threat or uninstall the app manually by going to Settings -> Application Manager -> Flash-Player.In some instances, the user has been successfully tricked into granting Device administrator rights to the app. In such a case, it is necessary to deactivate the administrator rights first, by going to Settings -> Security -> Flash-Player.“Unfortunately, uninstalling the downloader doesn’t remove malicious apps the downloader might have installed. As with the downloader itself, the best way for cleaning up the device is using a mobile security solution,” recommends Lukáš Štefanko.ESET security experts have prepared a set of basic recommendations for preventing infection with mobile malware:- Only download apps or updates from a trustworthy source – in the case of an Adobe Flash Player update, the only safe place to get it from is the official Adobe website. Always check the URL address in your browser. - Pay attention to what permissions and rights your apps request. - Use a reputable mobile security solution. Read more about this dangerous mobile downloader or about ESET’s protective technologies. ESET’s security experts will be ready to provide further information on mobile security at this year’s Mobile World Congress.

About ESET

Since 1987, ESET® has been developing record award-winning security software that now helps over 100 million users to Enjoy Safer Technology. Its broad security product portfolio covers all popular platforms and provides businesses and consumers around the world with the perfect balance of performance and proactive protection. The company has a global sales network covering 200 countries, and regional offices in Bratislava, San Diego, Singapore and Buenos Aires. For more information visit www.eset.com or follow us on LinkedInFacebook and Twitter.

 

The Company has global headquarters in Bratislava (Slovakia), with regional distribution centers in San Diego (U.S.), Buenos Aires (Argentina), and Singapore. ESET has malware research centers in Bratislava, San Diego, Buenos Aires, Singapore, Prague, Košice (Slovakia), Krakow (Poland), Montreal (Canada), Moscow (Russia). ESET Middle East has its regional office in Dubai Internet City and manages an extensive partner network in 11 countries: United Arab Emirates, Saudi Arabia, Kuwait, Qatar, Oman, Bahrain, Yemen, Lebanon, Jordan Egypt and Libya. More information is available via www.eset.com/me