Site icon Check Point Blog

Fake Applications: Why mobile users can’t judge a book by its cover. (Social Engineering Ep. 2)

The second post from our series on the different mobile security aspects of social engineering covers another major threat, Fake Applications. Fake apps owes much of its success to users’ susceptibility to pressure, repetition and other methods of social engineering.

For our first entry on mobile social engineering – malvertisements – click here.

Fake apps have proven to be one the most significant methods of distributing mobile malware. Attackers can create carbon copies of the entire app, copy the app’s icon or even just attach malware to the legitimate version of the app. Either way, the apps appear to be legitimate, with relevant screenshots, descriptions, user reviews, and videos.

Ultimately, the users never get the app they want, but instead receive one of the many malicious payloads that exist today – starting with a subscription to an expensive SMS service and finishing with a mobile Remote Access Trojan (mRAT)

How Does a Fake App Campaign Work?
Step 1: The user is lured to download the fake app. Malware authors often set up fake websites advertising the fake version of the app. Many of these are shared on rogue websites, but many are also shared on fake Facebook and Twitter accounts that target legitimate users on social networks.

Step 2: Upon installation, the malware often displays a service agreement that the user is required to accept before they can use the app. In other cases, they’ll need to grant the app permissions to access and edit files the real app wouldn’t normally deal with or download an additional file that has nothing to do with the app. Either way, whether the victim realises it or not, they’re getting more (or less) than they bargained with.

Fake Apps vs. App Stores and Market Places

Examples of dangerous Fake Apps:

 

Fake Apps on other Mobile Platforms

Windows Phone

iOS

Exit mobile version