Antivirus mobile apps are here, and they aren't who they purport to be.
With the world connecting more and more through mobile devices, it is becoming increasingly important to make sure those devices are secured. While many security companies are taking on the challenge of keeping data safe in a mobile world, there are plenty of predators out there who see this as another avenue to exploit.
Case in point: the rise of fake WannaCry "protectors," apps that use the fear and hysteria around the self-propagating ransomware to drive downloads, even though mobile systems are safe from its impact. These apps don't do anything helpful and the possibility that some threat actors will build fake WannaCry apps to propagate malware remains.
Malicious ‘Antivirus’ Apps are Everywhere
Leveraging the threat of malware infections to drive downloads of potentially unwanted programs, worthless mobile apps, and even malware isn’t limited to the WannaCry theme. Using RiskIQ’s mobile database, hundreds of examples of apps that claimed to help defend mobile phones were found, instead, to be preying on unsuspecting users by pushing adware, trojans, and other malware:
Using a title search for “Antivirus” resulted in 6,295 total apps, past and present, claiming to either be an antivirus solution, review antivirus solutions or be associated with antivirus software in some way. More than 700 of these apps triggered blacklist detections from the aggregated antivirus vendors in VirusTotal. Trimming the dataset to compare apps only coming from the Google Play store showed 655 results. Of those, 131 had triggered blacklist detections.
We then refined the data to only apps still labeled as being active. More than 4,290 antivirus apps were still being active, with 525 of those having blacklist hits. The Google Play store has 508, with 55 blacklisted. Comparing the numbers, it shows that historically, the Google Play store has had a greater percentage of blacklisted antivirus apps, at 20% versus the overall 11%. However, the current amount of blacklisted antivirus apps in the Google Play store is at 10.8%, versus the overall of 12.2%.
Using a Title Search for “antivirus” Resulted In:
Of course, not all of these blacklist hits from VirusTotal mean that the app is malicious, and many malicious antivirus apps are not blacklisted at all. After all, even on VirusTotal’s website, they state “it may be used as a means to detect false positives.” VirusTotal can be utilized as a way to gauge the riskiness of scanned files, and if a trusted AV vendor flags an app, or multiple AV vendors flag an app, it may be worth further review. The example apps throughout this blog post have multiple hits from AV vendors, including some of the more trustworthy and well-known ones.
When it comes to the safety of your mobile devices, it is always best to be diligent. Be careful about inviting the bad guys in and giving them access to everything when choosing an antivirus app.
General tips on what to look out for also apply to mobile antivirus solutions:
- Try to only download from official stores. Google, for example, seems to be diligently removing malicious apps at a greater rate than third-party stores.
- Review the permissions requested, make sure the developer email address is not a free email service like Gmail or Hotmail.
- Look over the app description to see if it is riddled with grammatical errors.
- Finally, when possible, check the app against known blacklists; VirusTotal provides an excellent starting point.
Why RiskIQ for Organizations?
RiskIQ automatically runs all mobile applications encountered through a variety of blacklists, including VirusTotal. We differ from other monitoring systems that rely on end users employing their virus scanning tools and/or manual sample submissions. RiskIQ Mobile Threats provides discovery across all the leading app stores as well as more than 150 less popular stores, including focused coverage of high-risk stores and regions for brand impersonation, malware, and fraud. In addition to comprehensive coverage of third-party app stores worldwide, RiskIQ incorporates a unique source of “feral app” binaries, or mobile apps collected outside of dedicated mobile app stores, via drive-by download for example. With this comprehensive mobile presence knowledge, organizations have the unparalleled ability to:
- Monitor Google Play, Apple App Store, and more than 150 other app stores around the world to uncover rogue mobile apps
- Intelligently sort legitimate apps from modified versions, unauthorized fakes, and look-a-likes
- Go beyond just the title and description, automatically analyzing all app content and code to discover logos, brand references, and malicious code hidden within app files
- Track app versions and correlate apps across stores for efficient management and enforcement of related incidents
The RiskIQ Intelligence Connector for Microsoft Azure Sentinel Is the Context-Rich Force Multiplier Security Teams Need
Digital initiatives have changed the enterprise attack surface and how organizations appear online, both to users and malicious actors. Meanwhile, the threat landscape has evo...