Hacking Team’s evil Android app had code to bypass Google Play screening

JMH

Emeritus, Contributor
Joined
Apr 2, 2012
Posts
7,197
Security researchers at Trend Micro's Trend Labs have uncovered a trick in a sample of a fake news application for Android created by the network exploitation tool provider Hacking Team that may have allowed the company's customers to sneak spyware through the Google Play store's code review. While the application in question may have only been downloaded fewer than 50 times from Google Play, the technique may have been used in other Android apps developed for Hacking Team customers—and may now be copied by others trying to get malware onto Android devices.

The sample app, called "BeNews," is designed as a Trojan horse for Hacking Team's RCSAndroid "backdoor" malware. It used the name of a defunct news site to make it seem like a legitimate Android application. Wish Wu of Trend Labs wrote in a blog post that Trend Labs team found the source code for the app within the leaked Hacking Team files, along with documentation "that teaches customers how to use it," he wrote. "Based on these, we believe that the Hacking Team provided the app to customers to be used as a lure to download RCSAndroid malware on a target's Android device."
Hacking Team?s evil Android app had code to bypass Google Play screening | Ars Technica
 

Has Sysnative Forums helped you? Please consider donating to help us support the site!

Back
Top