A new family of mobile malware called RedDrop exfiltrates victims’ sensitive data including ambient audio recordings and sends it to cloud storage services.
Wandera, a mobile security firm which spotted weaknesses in the CBS Sports app and mobile site back in 2016, uncovered the malware when a user clicked on an ad for the Chinese search engine Baidu. Their action redirected them to huxiawang[dot]cn, a distribution site which contains landing pages encouraging users to download one of 53 apps tainted by RedDrop. Those affected programs claim to help users learn a new language or dive into space exploration, for example, with engaging functionality.
As it turns out, huxiawang[dot]cn uses a series of redirects across a content delivery network (CDN) consisting of over 4,000 domains. Those responsible for the malware no doubt designed these intricacies intentionally for the purpose of concealing RedDrop’s source.
Upon successful installation, the malicious app requests excessive privileges from the user. It then abuses those rights to silently install seven or more malicious APKs from its command and control (C&C) server.
One of those APKs is a trojan. Another is a dropper capable of installing other APKs. Another still is a capability that sends an SMS message to a premium service and then immediately deletes it every time the user taps the screen while interacting with the app.
Those capabilities pale in comparison to RedDrop’s most serious component: spyware which records audio of the device’s surrounding and then exfiltrates it along with application data, SIM-related information, and local data like photos and contacts to attacker-controlled Dropbox and Google Drive folders. There, bad actors can weaponize the information to launch additional attacks.
With its complex structure and intricate CDN, RedDrop stands out in the mind (Read more...)
This is a Security Bloggers Network syndicated blog post authored by David Bisson. Read the original post at: The State of Security