Spammers impersonate well-known developers to publish rogue apps on Android Market
- 09 February, 2012 07:39
Spammers are impersonating well-known Android software developers in order to distribute rogue apps through the official Android Market.
Security researchers from antivirus firm Trend Micro have identified a developer named Rovio MobiIe Ltd. in the Android Market, which had a significant number of rogue applications in its portfolio.
Some users might immediately recognize Rovio Mobile as the name of the company behind one of the world's most popular mobile games -- "Angry Birds."
However, in this case, the letter "l" from the original developer's name was replaced with a capital "i," which has a nearly identical visual representation under some fonts.
The apps distributed by Rovio MobiIe, with the capital "I", through the Android Market were fake copies of legitimate applications that directed users to spam websites.
While these apps are not as dangerous as the premium-rate SMS Trojans distributed from unofficial app stores, they are still malicious in nature and are created to deceive users.
Last week, Google revealed a service called Bouncer, which automatically scans the Android Market for malicious apps. The scanner is capable of executing apps in a virtual environment in order to monitor their behavior, but it doesn't seem to have caught the rogue ones found by Trend Micro.
This is probably because displaying links and opening Web pages is common behavior for legitimate applications as well. "We expect that more cybercriminals will continue with this method, so it is very important for users to be informed of how they can avoid being victimized," Trend Micro threats analyst Kervin Alintanahin said in a blog post on Tuesday.
Installing only apps distributed through the Android Market is not enough to ensure one's protection. Users should also read an application's reviews and carefully consider its permissions before deciding to install it on their devices.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Queensland government to provide 200 services online by 2015
Call Centers Suffer From Big Data Overload
CIO 100: Carsales wins top gong for innovation
How to secure passwords and other critical numbers
Australian National University streamlines IT
At one point, it seemed that phishing was receding to the status of a minor issue threatening only naïve consumers. However new cybercriminals and phishing techniques have lead this to become a greater concern. Download how to find out how phishing became the No. 1 web threat, and which web security solution can best protect your company.
Efficient Data Management in Three Simple Steps
Gartner reports that Business Intelligence, Mobile Technologies and Cloud Computing rank 1-2-3 as the 2013 Global CIO Technology Priorities. These three trends, labelled the “Perfect Storm” of new technologies, are transforming every link in the IT value chain, promising to deliver more efficient, responsive and dynamic IT operations. But this also means massive shifts in the way IT applications and services are created, deployed and maintained. This whitepaper aims to help you begin the journey to efficient modern data management
Robust Data Protection Solutions for Virtual Environments
Organisations face a juggling act with the need to improve backup and recovery, increase server virtualization, manage data growth, while remaining in operation. Virtualization has complicated the protection landscape, as protecting virtual environments can be a challenge, especially as VMs are quickly and easily created, moved, and deleted in data centres and in the cloud. This white paper explores how new backup systems have been invigorated with future-proof functionality aimed at today’s virtualized environments, offering the backup “fountain of youth”.