Security Architecture, Endpoint/Device Security, Endpoint/Device Security, Security Strategy, Plan, Budget, Incident Response, TDR, Threat Management, Malware, Endpoint/Device Security, Endpoint/Device Security, Endpoint/Device Security

Blasphemy! Godless malware preys on nearly 90 percent of Android devices

Share

Godless, an emerging mobile malware threat capable of rooting Android phones, has started to adopt the traits of an exploit kit, in that it searches for multiple vulnerabilities through which it can automatically infect a victim. Once it successfully executes, the malware gains root access to the device, granting it full control.

Christopher Budd, global threats communications manager at Trend Micro, told SCMagazine.com in an interview that Godless is essentially an “encyclopedia of known, good attacks against various vulnerabilities… It's loading up on attacks and using whatever will work, similar to what we see with exploit kits on the PC side. And it's consistent with an overall macro trend over the years, where [threats] have migrated from desktop side over to the mobile side.”

In a blog post yesterday, Trend Micro warned that the abuse of numerous exploits gives the sacrilegious-sounding malware a broader target range, making it effective against any Android device running on version 5.1 (Lollipop) or earlier. That's nearly 90 percent of Android devices in use today, which Budd said is on the “high end” in terms of infection coverage, compared to other Android threats.

“The people behind it are taking a page out of the book of exploit kit writers in that they are focused on building a sustainable attack framework that you can continue to evolve,” Budd continued. “Before exploit kits, people would target one or two specific vulnerabilities with their malware and they would have to code that up. But with exploit kits you don' t have to figure out how to attack each vulnerability. You just buy the exploit kit and because you have people maintaining those exploit kits as professional products, they just keep adding to it.”

According to Trend Micro's Mobile App Reputation Service, the malware has affected more than 850,000 devices worldwide with devices in India disproportionately affected. Research shows that India is home to 46.19 percent of devices impacted by Godless, followed by Indonesia (10.27 percent) and Thailand (9.47 percent). Only 1.51 percent of infected devices are in the U.S.

Although Godless scans for numerous vulnerabilities, the two most significant exploits are designated CVE-2015-3636 and CVE-2014-3153, which are susceptible to exploits called PingPongRoot and Towelroot, respectively. Based on its observations, Trend Micro reported that once the malware attains root privilege, it receives instructions for secretly downloading and installing malicious apps via backdoors or stolen Google Play credentials. These apps typically deliver unwanted advertisements.

Godless also has the capability to spy on users, Trend Micro noted.

The malware has already been found in several malicious apps sold by third-party online stores. One especially sneaky variant doesn't even contain the exploit in its coding; rather, it is programmed to wait until the first app update to pull the exploit and the malicious payload from a command-and-control server. This allows the attackers to sneak infected Android apps into the official Google Play store without being detected. Indeed, Trend Micro has found this variant of Godless in various utilities and gaming apps available in the Google Play store, including a flashlight app named "Summer Flashlight."

“I think it's reasonable to suppose that moving forward, mobile malware authors are going to look at this and learn from it, and so it is unlikely this will be the last time we talk about mobile malware attacks that look like they have exploit kit capabilities,” said Budd.

Bradley Barth

As director of multimedia content strategy at CyberRisk Alliance, Bradley Barth develops content for online conferences, webcasts, podcasts video/multimedia projects — often serving as moderator or host. For nearly six years, he wrote and reported for SC Media as deputy editor and, before that, senior reporter. He was previously a program executive with the tech-focused PR firm Voxus. Past journalistic experience includes stints as business editor at Executive Technology, a staff writer at New York Sportscene and a freelance journalist covering travel and entertainment. In his spare time, Bradley also writes screenplays.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds