Site icon IT World Canada

Understanding Android Malware Families: Riskware – is it worth it? (Article 4)

Malware Graphic

Image from Shutterstock.com

Riskware is defined as a legitimate program that presents potential risks to the security vulnerabilities on a device. Although it is a legitimate program, bad actors use Riskware to steal information from the device and redirect users to malicious websites or perform functions at the expense of device security.

Typically, Riskware is associated with attackers who hijack devices, gain unauthorized access to devices, collect sensitive information, and disrupt services with the intent to steal information for misuse.

These vulnerabilities can pose legal risks and infringements. This article reveals prominent Android families and provides in-depth insights into the functions, activities and communication processes used by attackers. Readers will gain insights into the dangers and indicators of when a smartphone has been infected by riskware. In addition, the article delves deeper into technical features that can detect riskware on a smartphone. Finally, some preventive measures to protect the device from high-risk goods families are presented.

The technical details in this article stem from our public Android malware dataset called CCCS-CIC-AndMal-2020, published by the Canadian Institute for Cybersecurity CIC in collaboration with Canadian Centre for Cyber Security CCCS.

Activities and behaviour of riskware families

This section describes the relevant features of Riskware families. Figure 1 presents twenty-one Riskware families that we analyzed for this article. The most popular Riskware families include mobilepay, metasploit, revmob, smspay, smsreg, and talkw.

Figure 1

Riskware families collect personal and phone information, send/receive SMSs, steal network information, connect to malicious websites, install malicious content on devices, show malicious advertisements, and modify system settings and files on the compromised device. Table 1 presents the activities performed by riskware families.

Table 1: Activities performed by Riskware families:
Malware Family Data Media Hardware Actions Internet C&C Anti-virus Storage
AnyDown I2, I4
BadPac H1, H2 I1, I3
Deng D1 H1, H2 A1 I2
Dnotua A1 I1, I3
Jiagu
Kingroot D1, D5 H1, H3 A1 I3
MobilePay D2 I3, I4
Metasploit A1
Nqshield D3 I4
RemoteCode I3
RevMob D1 H1 I1, I2, I3, I4
Secneo D2, D5 M1, M2 H1, H2 A3 I1, I3
SkyMobi D1 H1 I3
SmsPay D5 I4
SmsReg D5 H1, H2 I1, I4
Talkw I2, I4
TenCentProtect H1 I1, I3
Tordow D2, D5 M1 A2, A3 I3
Triada D5 H1 A1
Wapron D1, D4 I2, I4
WiFiCrack H2 I1
D1: Collect personal information (phone number, email address, app accounts) and browser history

D2: Collect user contacts 

D3: Send / receive spam emails

D4: Steal banking credentials

D5: Send / receive SMS

M1: Make call / collect call history

M2: Record audio / use microphone

H1: Collect phone information (IMEI, ID, status)

H2: Get location (GPS)

H3: Lock phone or change PIN

A1: Ask for root privileges

A2: Block / delete / use phone apps

A3: Execute after phone reboot

I1: Steal network information (WiFi, IP, DNS)

I2: Access / redirect user to malicious websites

I3: Install malicious apps

I4: Show popup-ad, warnings, and notifications 

 

The following observations derive from table 1:

Important activities of high-risk families fall into 4 categories: 1) Collection of sensitive personal and phone information 2) Interaction with hardware 3) connection to the Internet, and 4) access to storage settings on compromised devices.

Some Riskware families such as Metasploit, tencentprotect and tordow connect to the Command and control (C & C server to remotely receive instructions and report collected data to a remote server that controls the Riskware).

Riskware families steal network information from the victim’s device, access malicious websites, install malicious apps, and display pop-up ads, notifications, and warnings.

In addition, a significant change in behaviour is observed in all of the Riskware families mentioned below:

Further analysis of similar families of Riskware compared to other Android malware families shows that Riskware families closely resemble some families of Adware and Trojan malware.

Types of riskware

Based on the activities performed by riskware, Figure 2 presents four categories of Riskware, which are summarized below.

Figure 2
  1. File Downloader: It downloads and installs malicious apps. These apps are programmed to exploit software vulnerabilities in the target device.
  2. Activity monitoring apps: These apps collect and store sensitive information such as personal information and phone data. These apps continuously monitor user behaviour for infiltration and are used to launch other attacks.
  3. Dialer programs: These programs execute calls and record the call history.
  4. Remote Support Utilities: These utilities connect to remote C & C servers for a dual functionality: First, they tend to transfer captured sensitive information to a remote server, and second, they receive instructions from a remote server to perform malicious activities on the compromised device.

Essential indicators to detect riskware on a smartphone:

A remarkable Android Riskware called WhatsApp Plus, launched in 2017, illustrates the dangers of Riskware. Once installed, this application displayed a message on an installed device indicating that the app was outdated and needed to be updated. Afterwards, the app provided a link to download and install the update.

It is clear that it is important to be aware of such dangers and threats to mobile devices. The following indicators help to detect the presence of Riskware malware on Android phones:

Technical features for the detection of riskware

Based on our research in a representative Android dataset called CCCS-CIC-AndMal-2020, there are certain technical characteristics that can be used to identify at-risk families.

Delving deeper into riskware behaviour, significant changes in memory features contribute to significant behavioural changes when running risk wares samples. Although there are important changes in API, network and Logcat functions for risk wares families, these changes are small compared to the storage functions used by risk wares families.

Preventive measures to protect your device

Riskware protection is an uncertain concept. However, in order to avoid risk capital, the following preventive measures are very helpful:

Conclusion

This article introduces the basics of the Riskware malware families. It is equipped with malicious features that are run by Riskware on the target device. Based on our public record of Android malware, called CCCS-CIC-AndMal-2020, we open ourselves to the activities of twenty-one notable Riskware families. We establish compelling compromise indicators indicating that the phone is infected by Riskware families. The article highlights technical features that can be used to detect Riskware on a smartphone. Finally, it introduces preventive measures to protect the device. The next article in the UAMF series will dig into adware that serves pop-up advertisements and backdoor that secretly exploits malware categories.

Exit mobile version