Here at VMX Labs, learning that 60 mobile apps are carrying the same Android malware isn’t necessarily any more shocking than other potentially far-reaching malware attacks involving mobile devices. However, it’s an opportunity to illustrate to our readers why the actual code (or source of code) needs significant attention during the app development process.
After all, the recent Goldoson malware, as reported by Bleeping Computer, appears to have extended its tentacles via the more than 100 million downloads associated with those 60 infected mobile apps. Just two of the larger apps involved were L.POINT with L.PAY and Money Manager Expense & Budget (both of which with more than 10 million downloads). Bleeping computer reports that the Goldoson malicious malware component is part of a third-party library that all the apps used. And thus, the mass production of headaches begins for many developers.
Supply chain attacks like these, where attackers inject their code into free open source libraries (or libraries from untrusted sources) can be difficult for app developers to avoid, since even if they only use peer reviewed FOSS, injections of malware code into these libraries still can happen. Since this malware does not unfold its activity until the app is deployed, security scanners, even security reviews, and also those of the app stores do not find these attacks. To have any semblance of peace of mind, App developers need to have the ability to continuously monitor their app in the field, identify such problems when they unfold their activity, and remediate the threat ASAP. The affected third-party libraries are often a crucial part of an apps’ anatomy, so is its cybersecurity posture, to have this additional layer of control.
Discovered by McAfee, Goldoson reportedly collects data on a device’s apps, Wi-Fi and Bluetooth devices as well as the device’s location – all while also fraudulently and quietly clicking ads in the background. Once a user launches an app that used the infected library, Goldoson gets to working, telling it what data to steal and which ads to click. Involved apps that have been given lots of permissions from the user are the clear drivers for the most stolen data.
Most consumers don’t realize that app stores such as Google Play are not responsible for securing individual apps that aren’t made by Google. That’s not their role. That’s illustrated by Google’s normal policy to simply remove apps that don’t comply with their policies due to known issues. This places the responsibility of mobile app security solely on the app developer. Ironically, the theme of frequent security problems associated with “third-party” anything, especially for mobile apps, continues not only with the need to remediate the related third-party library infection, but also with the fact that third-party Android app stores could still harbor the same malicious library.
Further illustrating the significant threat that unmonitored or unvetted anatomy of a mobile app can cause, these types of attacks are fueling the industry’s push for a software supply chain that not only prioritizes knowledge surrounding the background of all its anatomy (also known as constituents) , but also the ability to determine when something is amiss with an app’s activity and needs to be remediated because something was overlooked in the initial software supply chain review. This can involve both open source code as well as proprietary code, as outlined in this TechTarget explanation.
Commentary
Goldoson and the Dark Side of Third-Party Mobile App Libraries
Table of Contents
Here at VMX Labs, learning that 60 mobile apps are carrying the same Android malware isn’t necessarily any more shocking than other potentially far-reaching malware attacks involving mobile devices. However, it’s an opportunity to illustrate to our readers why the actual code (or source of code) needs significant attention during the app development process.
After all, the recent Goldoson malware, as reported by Bleeping Computer, appears to have extended its tentacles via the more than 100 million downloads associated with those 60 infected mobile apps. Just two of the larger apps involved were L.POINT with L.PAY and Money Manager Expense & Budget (both of which with more than 10 million downloads). Bleeping computer reports that the Goldoson malicious malware component is part of a third-party library that all the apps used. And thus, the mass production of headaches begins for many developers.
Supply chain attacks like these, where attackers inject their code into free open source libraries (or libraries from untrusted sources) can be difficult for app developers to avoid, since even if they only use peer reviewed FOSS, injections of malware code into these libraries still can happen. Since this malware does not unfold its activity until the app is deployed, security scanners, even security reviews, and also those of the app stores do not find these attacks. To have any semblance of peace of mind, App developers need to have the ability to continuously monitor their app in the field, identify such problems when they unfold their activity, and remediate the threat ASAP. The affected third-party libraries are often a crucial part of an apps’ anatomy, so is its cybersecurity posture, to have this additional layer of control.
Discovered by McAfee, Goldoson reportedly collects data on a device’s apps, Wi-Fi and Bluetooth devices as well as the device’s location – all while also fraudulently and quietly clicking ads in the background. Once a user launches an app that used the infected library, Goldoson gets to working, telling it what data to steal and which ads to click. Involved apps that have been given lots of permissions from the user are the clear drivers for the most stolen data.
Most consumers don’t realize that app stores such as Google Play are not responsible for securing individual apps that aren’t made by Google. That’s not their role. That’s illustrated by Google’s normal policy to simply remove apps that don’t comply with their policies due to known issues. This places the responsibility of mobile app security solely on the app developer. Ironically, the theme of frequent security problems associated with “third-party” anything, especially for mobile apps, continues not only with the need to remediate the related third-party library infection, but also with the fact that third-party Android app stores could still harbor the same malicious library.
Further illustrating the significant threat that unmonitored or unvetted anatomy of a mobile app can cause, these types of attacks are fueling the industry’s push for a software supply chain that not only prioritizes knowledge surrounding the background of all its anatomy (also known as constituents) , but also the ability to determine when something is amiss with an app’s activity and needs to be remediated because something was overlooked in the initial software supply chain review. This can involve both open source code as well as proprietary code, as outlined in this TechTarget explanation.
5 things app developers can do to protect their code anatomy
With the majority of all mobile apps remaining unprotected from today’s latest threats, the VMX Lab team works to highlight the deep gap in confidence and security that this foundational failure can create – underscoring the vital role that app developers play in cybersecurity and how they can harness the cost-effective power of Verimatrix XTD to consistently combat it. Verimatrix XTD provides a library of defense and monitoring features, that among other capabilities, highlight suspicious behaviour of malware carrying libraries like the one described above.
Subscribe to our newsletter
Get the latest cybersecurity insights delivered straight to your inbox.
Written by
Klaus Schenk
Klaus Schenk is senior vice president of security and threat research at Verimatrix and serves as head of its VMX Labs.
Share this cybersecurity insight
Other cybersecurity insights
Screen Spoofing: Dangerous Mobile App Overlay Attacks On the Rise
Overlay attacks are a long-known major threat to mobile apps that have made their presence known in a big way in the last few months, becoming more dangerous with new logistics of attack.
Enhancing Application Security Protections: A Look at the Zero-Code Injection Approach to Prevent Reverse-Engineering
Zero-code injection technology serves as a high-value yet low-effort security measure that significantly enhances an application’s protection against reverse-engineering.
By HOOK Or By Crook: The Insidious Launch Overlay Attack Targeting Financial Institutions
HOOK a relatively new mobile app malware largely targeting financial institutions in Poland that has now spread worldwide.
Cybersecurity Threat Roundup #1: Chameleon, Hiddad, DAAM Android Botnet and more
In our inaugural issue, we list down the most pressing cybersecurity threats and vulnerabilities facing businesses across the globe. Stay updated with our quick snippets, intelligence reports, and direct links to more in-depth resources.
Hackers Use GoatRAT Variant to Exploit Android Accessibility Services to Attack Mobile Apps
The recent GoatRAT variant targeting Brazilian banks shows that app developers need to implement greater protections that can sniff out this abuse on a mobile device. Where we see smoke today, there is likely to be a fire tomorrow.
Is Mobile App Security Your Organization’s Weakest Link?
Mobile applications are the main way organizations communicate with their customers. It is also the newest pathway for hackers to gain access to sensitive data.
A Look Beyond Traditional RASP, MTD and WAF Technologies
The need for proven measures to protect them against malicious attacks remains more important than ever for any organization dependent on the success of critical applications.
The Importance of Code Obfuscation and Polymorphism to Application Security
By making source, byte, or machine code significantly more difficult to understand by humans, code obfuscation stands as an essential aspect of application security.