SlideShare une entreprise Scribd logo
1  sur  17
When Android Apps 
Go Evil 
Jing Xie 
jing.xie@lookout.com 
Lookout Inc. 
2014 
2014 
#GHC14 
2014
Evil Outline 
Android OS & App Development 
Malware Landscape 
Reverse Engineering 
Analysis Insights & Challenges 
2014
Android OS 
2014 
Linux based 
 Open sourced 
Java for app dev 
Dalvik VM 
 (ART since 4.4) 
Security & Privacy 
 Sandboxing 
 Permissions 
 Secure IPC 
 Cryptography
Making of Apps 
2014
Android Malware (NOT VIRUS PLZ!) 
2014
Threat Landscape 
2014
Depending on Origin 
USA France + Spain Russia India Vietnam China 
2014 
• Trojan 
• Toll Fraud 
• Spyware 
• Chargeware 
• Surveillanceware 
• Spam 
• Ransomware 
• RootEnabler 
• Exploit 
• Riskware
Malware as a Business 
2014
Agile Malware Development 
2014 
 SMSActor 
distribution 
 SMS Toll Fraud: 
sending 
premium text 
messages 
without consent 
April 2012 
April 2014 
SMSActor: Russian Toll Fraud 
Variant Life Span: 
• Activated 
• Deactivated 
• Decommissioned
Incentive and Feasibility 
A HUGE NUMBER OF Apps 
Not in Google Play Store 
http://www.onepf.org/appstores/ 
http://www.techinasia.com/10-android-app-stores-china-2014-edition/ 
2014 
• Anzhi 
• AppChina 
• D.cn Games Center 
• gFan 
• HiAPK 
• Aptoide 
• Panda App 
• Taobao App Market 
• Tencent App Gem 
• Xiaomi 
• Mumayi 
 SK T-Store 
 Naver NStore 
 APPZIL 
 olleh Market 
o Yandex.Store 
 SlideMe.org 
 AppBrain 
 1MobileMarket 
 Mobile9 
 Mobango 
 Barzaar 
 Amazon appstore 
 AppZoom 
 AppsLib
Incentive and Feasibility 
2014 
http://www.theguardian.com/technology/2014/aug/22/android-fragmented-developers-opensignal
Reverse Machinery 
(一) 
baksmali; apktool 
dex2jar + jd-gui/luyten; 
2014 
input: apk/dex 
Output: smali 
Output: pseudo Java
Reverse Machinery 
(二) 
Demo Time 
(Click to watch video on YouTube) 
2014
Scents of Android Malware 
(UN) 
Disingenuous advertisement 
• Facebook icon && titled facebook; 
package name: com.facebook.sms 
2014 
• com.facebook.katana 
More than advertised 
• Irrelevant code package 
• Payment SDK with no pay button (UI) 
Cost money APIs in unexpected context 
• A system utility app sends SMS or make phone calls 
• Free game that requires costs money permission 
Unnecessary outbound communications 
• A battery saving app talks to a remote server 
• Calculator that downloads stuff
Scents of Android Malware 
(DEUX) 
Interesting Log Statements 
• IsFuckSendIsLuckReceiverIsLuckReceiver的finally已经开始加锁 
• ** WHELCOME TO HELL ********* 
Interesting File Assets 
• /assets/libremotecontrol.so 
• PNG is actually dex file 
System Level Operations 
• Checks the root as a game app 
Peer Information Exhange 
• Virus Total says apps is malicious 
2014
Analysis Challenges 
Technical Contextual 
• Evasion Techniques 
• Complicated Apps 
• Sheer Volume 
• Constraints on Devices 
2014 
• Nuanced Context 
• Malware Purpose 
• Levels of Puzzle 
Solving
When Android Apps Go 
2014 
Evil 
Jing Xie 
jing.xie@lookout.com 
Lookout Inc. 
2014 
#GHC14 
2014 
Thank You! 
Thanks to security team + designer @ lookout

Contenu connexe

Tendances

How to configure monkey talk android agent
How to configure monkey talk android agentHow to configure monkey talk android agent
How to configure monkey talk android agentDasun Eranthika
 
Mobile test automation with Selenium, Selendroid and ios-driver
Mobile test automation with Selenium, Selendroid and ios-driverMobile test automation with Selenium, Selendroid and ios-driver
Mobile test automation with Selenium, Selendroid and ios-driverMichael Palotas
 
Windows 10 UWP Development Overview
Windows 10 UWP Development OverviewWindows 10 UWP Development Overview
Windows 10 UWP Development OverviewDevGAMM Conference
 
Appium an introduction
Appium   an introductionAppium   an introduction
Appium an introductionVivek Shringi
 
Selenium and Open Source Advanced Testing
Selenium and Open Source Advanced TestingSelenium and Open Source Advanced Testing
Selenium and Open Source Advanced TestingAustin Marie Gay
 
The operational side of Mobile Apps
The operational side of Mobile AppsThe operational side of Mobile Apps
The operational side of Mobile AppsMobile Delivery Days
 
SauceCon19: Fashionable XCUITest for iOS App
SauceCon19: Fashionable XCUITest for iOS App SauceCon19: Fashionable XCUITest for iOS App
SauceCon19: Fashionable XCUITest for iOS App Shashikant Jagtap
 
4 Ways to Speed Up Your Mobile App Dev Daily Grind
4 Ways to Speed Up Your Mobile App Dev Daily Grind4 Ways to Speed Up Your Mobile App Dev Daily Grind
4 Ways to Speed Up Your Mobile App Dev Daily GrindPerfecto by Perforce
 
Mobile DevOps - Get faster release cycles & higher quality android & ios apps
Mobile DevOps - Get faster release cycles & higher quality android & ios appsMobile DevOps - Get faster release cycles & higher quality android & ios apps
Mobile DevOps - Get faster release cycles & higher quality android & ios appsMayur Tendulkar
 
3x3: Speeding Up Mobile Releases
3x3: Speeding Up Mobile Releases3x3: Speeding Up Mobile Releases
3x3: Speeding Up Mobile ReleasesDrew Hannay
 
Wso2 italia Open Break session #7 - Test di API e microservizi nelle architet...
Wso2 italia Open Break session #7 - Test di API e microservizi nelle architet...Wso2 italia Open Break session #7 - Test di API e microservizi nelle architet...
Wso2 italia Open Break session #7 - Test di API e microservizi nelle architet...Profesia Srl, Lynx Group
 
apidays LIVE New York - API Code First vs Design First by Phil Sturgeon
apidays LIVE New York - API Code First vs Design First by Phil Sturgeonapidays LIVE New York - API Code First vs Design First by Phil Sturgeon
apidays LIVE New York - API Code First vs Design First by Phil Sturgeonapidays
 
CLI, SDK, Doc... What if we generate them?
CLI, SDK, Doc... What if we generate them?CLI, SDK, Doc... What if we generate them?
CLI, SDK, Doc... What if we generate them?Scaleway
 
Automated Testing and Continuous Deployment for Mobile Apps with Jenkins
Automated Testing and Continuous Deployment for Mobile Apps with Jenkins Automated Testing and Continuous Deployment for Mobile Apps with Jenkins
Automated Testing and Continuous Deployment for Mobile Apps with Jenkins CloudBees
 
Appium - Reality check on the world’s leading Open Source Framework for Mobil...
Appium - Reality check on the world’s leading Open Source Framework for Mobil...Appium - Reality check on the world’s leading Open Source Framework for Mobil...
Appium - Reality check on the world’s leading Open Source Framework for Mobil...Asaf Saar
 
Mobile automation using appium.pptx
Mobile automation using appium.pptxMobile automation using appium.pptx
Mobile automation using appium.pptxSai Krishna
 

Tendances (20)

How to configure monkey talk android agent
How to configure monkey talk android agentHow to configure monkey talk android agent
How to configure monkey talk android agent
 
Mobile test automation with Selenium, Selendroid and ios-driver
Mobile test automation with Selenium, Selendroid and ios-driverMobile test automation with Selenium, Selendroid and ios-driver
Mobile test automation with Selenium, Selendroid and ios-driver
 
Windows 10 UWP Development Overview
Windows 10 UWP Development OverviewWindows 10 UWP Development Overview
Windows 10 UWP Development Overview
 
Monkey Talk
Monkey TalkMonkey Talk
Monkey Talk
 
Appium an introduction
Appium   an introductionAppium   an introduction
Appium an introduction
 
Selenium and Open Source Advanced Testing
Selenium and Open Source Advanced TestingSelenium and Open Source Advanced Testing
Selenium and Open Source Advanced Testing
 
The operational side of Mobile Apps
The operational side of Mobile AppsThe operational side of Mobile Apps
The operational side of Mobile Apps
 
SauceCon19: Fashionable XCUITest for iOS App
SauceCon19: Fashionable XCUITest for iOS App SauceCon19: Fashionable XCUITest for iOS App
SauceCon19: Fashionable XCUITest for iOS App
 
4 Ways to Speed Up Your Mobile App Dev Daily Grind
4 Ways to Speed Up Your Mobile App Dev Daily Grind4 Ways to Speed Up Your Mobile App Dev Daily Grind
4 Ways to Speed Up Your Mobile App Dev Daily Grind
 
Mobile DevOps - Get faster release cycles & higher quality android & ios apps
Mobile DevOps - Get faster release cycles & higher quality android & ios appsMobile DevOps - Get faster release cycles & higher quality android & ios apps
Mobile DevOps - Get faster release cycles & higher quality android & ios apps
 
3x3: Speeding Up Mobile Releases
3x3: Speeding Up Mobile Releases3x3: Speeding Up Mobile Releases
3x3: Speeding Up Mobile Releases
 
BCS Selenium Workshop
BCS Selenium WorkshopBCS Selenium Workshop
BCS Selenium Workshop
 
Wso2 italia Open Break session #7 - Test di API e microservizi nelle architet...
Wso2 italia Open Break session #7 - Test di API e microservizi nelle architet...Wso2 italia Open Break session #7 - Test di API e microservizi nelle architet...
Wso2 italia Open Break session #7 - Test di API e microservizi nelle architet...
 
apidays LIVE New York - API Code First vs Design First by Phil Sturgeon
apidays LIVE New York - API Code First vs Design First by Phil Sturgeonapidays LIVE New York - API Code First vs Design First by Phil Sturgeon
apidays LIVE New York - API Code First vs Design First by Phil Sturgeon
 
CLI, SDK, Doc... What if we generate them?
CLI, SDK, Doc... What if we generate them?CLI, SDK, Doc... What if we generate them?
CLI, SDK, Doc... What if we generate them?
 
Visual studio 2019 launch
Visual studio 2019 launch Visual studio 2019 launch
Visual studio 2019 launch
 
IOS ecosystem
IOS ecosystemIOS ecosystem
IOS ecosystem
 
Automated Testing and Continuous Deployment for Mobile Apps with Jenkins
Automated Testing and Continuous Deployment for Mobile Apps with Jenkins Automated Testing and Continuous Deployment for Mobile Apps with Jenkins
Automated Testing and Continuous Deployment for Mobile Apps with Jenkins
 
Appium - Reality check on the world’s leading Open Source Framework for Mobil...
Appium - Reality check on the world’s leading Open Source Framework for Mobil...Appium - Reality check on the world’s leading Open Source Framework for Mobil...
Appium - Reality check on the world’s leading Open Source Framework for Mobil...
 
Mobile automation using appium.pptx
Mobile automation using appium.pptxMobile automation using appium.pptx
Mobile automation using appium.pptx
 

En vedette

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsLookout
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notLookout
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneLookout
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingLookout
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring HackersLookout
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLookout
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidLookout
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google AccountLookout
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatibleLookout
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity PredictionsLookout
 
(Sadn1013 h) kump 2
(Sadn1013 h) kump 2(Sadn1013 h) kump 2
(Sadn1013 h) kump 2sadn1013
 
Mobile VAS: Video Consumption and Future
Mobile VAS: Video Consumption and FutureMobile VAS: Video Consumption and Future
Mobile VAS: Video Consumption and FutureAnish Chaturvedi
 
Deep Ocean
Deep OceanDeep Ocean
Deep Oceanlwag2143
 
Goodby Hatena, hello Sphinx
Goodby Hatena, hello SphinxGoodby Hatena, hello Sphinx
Goodby Hatena, hello SphinxKouhei Maeda
 
حقائق علمية وطبية في القرآن
حقائق علمية وطبية في القرآنحقائق علمية وطبية في القرآن
حقائق علمية وطبية في القرآنguest30004e2c
 
The enigma of us productivity slowdown a theoretical analysis
The enigma of us productivity slowdown a theoretical analysisThe enigma of us productivity slowdown a theoretical analysis
The enigma of us productivity slowdown a theoretical analysisAlexander Decker
 
Delivering Happiness - Big Omaha - 5-15-10
Delivering Happiness - Big Omaha - 5-15-10Delivering Happiness - Big Omaha - 5-15-10
Delivering Happiness - Big Omaha - 5-15-10Delivering Happiness
 
All about web design trend of 2015
All about web design trend of 2015All about web design trend of 2015
All about web design trend of 2015Davis Brown
 
Синтетический пептидный биостимулятор доимплантационного развития эмбрионов м...
Синтетический пептидный биостимулятор доимплантационного развития эмбрионов м...Синтетический пептидный биостимулятор доимплантационного развития эмбрионов м...
Синтетический пептидный биостимулятор доимплантационного развития эмбрионов м...kulibin
 

En vedette (20)

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhone
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring Hackers
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatible
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
 
(Sadn1013 h) kump 2
(Sadn1013 h) kump 2(Sadn1013 h) kump 2
(Sadn1013 h) kump 2
 
Mobile VAS: Video Consumption and Future
Mobile VAS: Video Consumption and FutureMobile VAS: Video Consumption and Future
Mobile VAS: Video Consumption and Future
 
Deep Ocean
Deep OceanDeep Ocean
Deep Ocean
 
Goodby Hatena, hello Sphinx
Goodby Hatena, hello SphinxGoodby Hatena, hello Sphinx
Goodby Hatena, hello Sphinx
 
حقائق علمية وطبية في القرآن
حقائق علمية وطبية في القرآنحقائق علمية وطبية في القرآن
حقائق علمية وطبية في القرآن
 
The enigma of us productivity slowdown a theoretical analysis
The enigma of us productivity slowdown a theoretical analysisThe enigma of us productivity slowdown a theoretical analysis
The enigma of us productivity slowdown a theoretical analysis
 
Delivering Happiness - Big Omaha - 5-15-10
Delivering Happiness - Big Omaha - 5-15-10Delivering Happiness - Big Omaha - 5-15-10
Delivering Happiness - Big Omaha - 5-15-10
 
Zaragoza Turismo - Zaragoza news 12
Zaragoza Turismo - Zaragoza news 12Zaragoza Turismo - Zaragoza news 12
Zaragoza Turismo - Zaragoza news 12
 
All about web design trend of 2015
All about web design trend of 2015All about web design trend of 2015
All about web design trend of 2015
 
Синтетический пептидный биостимулятор доимплантационного развития эмбрионов м...
Синтетический пептидный биостимулятор доимплантационного развития эмбрионов м...Синтетический пептидный биостимулятор доимплантационного развития эмбрионов м...
Синтетический пептидный биостимулятор доимплантационного развития эмбрионов м...
 

Similaire à When Android Apps Go Evil

I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maalHarsimran Walia
 
Hacking your Android (slides)
Hacking your Android (slides)Hacking your Android (slides)
Hacking your Android (slides)Justin Hoang
 
I haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperI haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperHarsimran Walia
 
Domo Arigato Mr. Roboto - Open Source Bridge 2009
Domo Arigato Mr. Roboto - Open Source Bridge 2009Domo Arigato Mr. Roboto - Open Source Bridge 2009
Domo Arigato Mr. Roboto - Open Source Bridge 2009sullis
 
Introduction to android mobile app development.pptx
Introduction to android mobile app development.pptxIntroduction to android mobile app development.pptx
Introduction to android mobile app development.pptxridzah12
 
TDC2018SP | Trilha Mobile - Case VC+: Como tornar seguro um aplicativo mobile...
TDC2018SP | Trilha Mobile - Case VC+: Como tornar seguro um aplicativo mobile...TDC2018SP | Trilha Mobile - Case VC+: Como tornar seguro um aplicativo mobile...
TDC2018SP | Trilha Mobile - Case VC+: Como tornar seguro um aplicativo mobile...tdc-globalcode
 
Case VC+: Como tornar seguro um aplicativo mobile payment sem penalizar a exp...
Case VC+: Como tornar seguro um aplicativo mobile payment sem penalizar a exp...Case VC+: Como tornar seguro um aplicativo mobile payment sem penalizar a exp...
Case VC+: Como tornar seguro um aplicativo mobile payment sem penalizar a exp...Márcio Rosa
 
001-Mobile Application.pptx
001-Mobile Application.pptx001-Mobile Application.pptx
001-Mobile Application.pptxAhmedDarre
 
Introduction to Hybrid Application Development
Introduction to Hybrid Application DevelopmentIntroduction to Hybrid Application Development
Introduction to Hybrid Application DevelopmentDotitude
 
Ii 1100-android development for fun and profit
Ii 1100-android development for fun and profitIi 1100-android development for fun and profit
Ii 1100-android development for fun and profitAdrian Mikeliunas
 
android Security
android Security android Security
android Security darkC0de
 
Daffodil Android App Development Portfolio
Daffodil Android App Development PortfolioDaffodil Android App Development Portfolio
Daffodil Android App Development PortfolioAshok Surendran
 
Android application development guide for beginners
Android application development guide for beginnersAndroid application development guide for beginners
Android application development guide for beginnersMobiers Ltd
 
android presentation
android presentationandroid presentation
android presentationSandipan Deb
 
Digital Apps Development & Debugging
Digital Apps Development & DebuggingDigital Apps Development & Debugging
Digital Apps Development & DebuggingExperitest
 
Mobile Development Platforms
Mobile Development PlatformsMobile Development Platforms
Mobile Development PlatformsAndri Yadi
 
Hacking By Nirmal
Hacking By NirmalHacking By Nirmal
Hacking By NirmalNIRMAL RAJ
 

Similaire à When Android Apps Go Evil (20)

I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maal
 
Hacking your Android (slides)
Hacking your Android (slides)Hacking your Android (slides)
Hacking your Android (slides)
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maal
 
Hijack rat android malware
Hijack rat android malwareHijack rat android malware
Hijack rat android malware
 
I haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperI haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaper
 
Domo Arigato Mr. Roboto - Open Source Bridge 2009
Domo Arigato Mr. Roboto - Open Source Bridge 2009Domo Arigato Mr. Roboto - Open Source Bridge 2009
Domo Arigato Mr. Roboto - Open Source Bridge 2009
 
Introduction to android mobile app development.pptx
Introduction to android mobile app development.pptxIntroduction to android mobile app development.pptx
Introduction to android mobile app development.pptx
 
TDC2018SP | Trilha Mobile - Case VC+: Como tornar seguro um aplicativo mobile...
TDC2018SP | Trilha Mobile - Case VC+: Como tornar seguro um aplicativo mobile...TDC2018SP | Trilha Mobile - Case VC+: Como tornar seguro um aplicativo mobile...
TDC2018SP | Trilha Mobile - Case VC+: Como tornar seguro um aplicativo mobile...
 
Case VC+: Como tornar seguro um aplicativo mobile payment sem penalizar a exp...
Case VC+: Como tornar seguro um aplicativo mobile payment sem penalizar a exp...Case VC+: Como tornar seguro um aplicativo mobile payment sem penalizar a exp...
Case VC+: Como tornar seguro um aplicativo mobile payment sem penalizar a exp...
 
001-Mobile Application.pptx
001-Mobile Application.pptx001-Mobile Application.pptx
001-Mobile Application.pptx
 
Introduction to Hybrid Application Development
Introduction to Hybrid Application DevelopmentIntroduction to Hybrid Application Development
Introduction to Hybrid Application Development
 
Ii 1100-android development for fun and profit
Ii 1100-android development for fun and profitIi 1100-android development for fun and profit
Ii 1100-android development for fun and profit
 
android Security
android Security android Security
android Security
 
You installed what Thierry Sans
You installed what  Thierry SansYou installed what  Thierry Sans
You installed what Thierry Sans
 
Daffodil Android App Development Portfolio
Daffodil Android App Development PortfolioDaffodil Android App Development Portfolio
Daffodil Android App Development Portfolio
 
Android application development guide for beginners
Android application development guide for beginnersAndroid application development guide for beginners
Android application development guide for beginners
 
android presentation
android presentationandroid presentation
android presentation
 
Digital Apps Development & Debugging
Digital Apps Development & DebuggingDigital Apps Development & Debugging
Digital Apps Development & Debugging
 
Mobile Development Platforms
Mobile Development PlatformsMobile Development Platforms
Mobile Development Platforms
 
Hacking By Nirmal
Hacking By NirmalHacking By Nirmal
Hacking By Nirmal
 

Plus de Lookout

5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile SecurityLookout
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?Lookout
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing PrivacyLookout
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple AccountLookout
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone GuideLookout
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World CupLookout
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneLookout
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to MeasureLookout
 
Security & Privacy at the Olympics
Security & Privacy at the OlympicsSecurity & Privacy at the Olympics
Security & Privacy at the OlympicsLookout
 
5 Types of Shady Apps
5 Types of Shady Apps5 Types of Shady Apps
5 Types of Shady AppsLookout
 
10 Beautiful Enterprise Products
10 Beautiful Enterprise Products10 Beautiful Enterprise Products
10 Beautiful Enterprise ProductsLookout
 
Hacking the Internet of Things for Good
Hacking the Internet of Things for GoodHacking the Internet of Things for Good
Hacking the Internet of Things for GoodLookout
 
What is a Mobile Threat?
What is a Mobile Threat?What is a Mobile Threat?
What is a Mobile Threat?Lookout
 
Dragon lady
Dragon ladyDragon lady
Dragon ladyLookout
 
Dragon Lady
Dragon LadyDragon Lady
Dragon LadyLookout
 
History of Lookout
History of LookoutHistory of Lookout
History of LookoutLookout
 
Scaling Up Lookout
Scaling Up LookoutScaling Up Lookout
Scaling Up LookoutLookout
 
Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21Lookout
 
Sécurité Mobile 101
Sécurité Mobile 101Sécurité Mobile 101
Sécurité Mobile 101Lookout
 

Plus de Lookout (19)

5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing Privacy
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone Guide
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your Smartphone
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to Measure
 
Security & Privacy at the Olympics
Security & Privacy at the OlympicsSecurity & Privacy at the Olympics
Security & Privacy at the Olympics
 
5 Types of Shady Apps
5 Types of Shady Apps5 Types of Shady Apps
5 Types of Shady Apps
 
10 Beautiful Enterprise Products
10 Beautiful Enterprise Products10 Beautiful Enterprise Products
10 Beautiful Enterprise Products
 
Hacking the Internet of Things for Good
Hacking the Internet of Things for GoodHacking the Internet of Things for Good
Hacking the Internet of Things for Good
 
What is a Mobile Threat?
What is a Mobile Threat?What is a Mobile Threat?
What is a Mobile Threat?
 
Dragon lady
Dragon ladyDragon lady
Dragon lady
 
Dragon Lady
Dragon LadyDragon Lady
Dragon Lady
 
History of Lookout
History of LookoutHistory of Lookout
History of Lookout
 
Scaling Up Lookout
Scaling Up LookoutScaling Up Lookout
Scaling Up Lookout
 
Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21
 
Sécurité Mobile 101
Sécurité Mobile 101Sécurité Mobile 101
Sécurité Mobile 101
 

Dernier

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Dernier (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

When Android Apps Go Evil

  • 1. When Android Apps Go Evil Jing Xie jing.xie@lookout.com Lookout Inc. 2014 2014 #GHC14 2014
  • 2. Evil Outline Android OS & App Development Malware Landscape Reverse Engineering Analysis Insights & Challenges 2014
  • 3. Android OS 2014 Linux based  Open sourced Java for app dev Dalvik VM  (ART since 4.4) Security & Privacy  Sandboxing  Permissions  Secure IPC  Cryptography
  • 5. Android Malware (NOT VIRUS PLZ!) 2014
  • 7. Depending on Origin USA France + Spain Russia India Vietnam China 2014 • Trojan • Toll Fraud • Spyware • Chargeware • Surveillanceware • Spam • Ransomware • RootEnabler • Exploit • Riskware
  • 8. Malware as a Business 2014
  • 9. Agile Malware Development 2014  SMSActor distribution  SMS Toll Fraud: sending premium text messages without consent April 2012 April 2014 SMSActor: Russian Toll Fraud Variant Life Span: • Activated • Deactivated • Decommissioned
  • 10. Incentive and Feasibility A HUGE NUMBER OF Apps Not in Google Play Store http://www.onepf.org/appstores/ http://www.techinasia.com/10-android-app-stores-china-2014-edition/ 2014 • Anzhi • AppChina • D.cn Games Center • gFan • HiAPK • Aptoide • Panda App • Taobao App Market • Tencent App Gem • Xiaomi • Mumayi  SK T-Store  Naver NStore  APPZIL  olleh Market o Yandex.Store  SlideMe.org  AppBrain  1MobileMarket  Mobile9  Mobango  Barzaar  Amazon appstore  AppZoom  AppsLib
  • 11. Incentive and Feasibility 2014 http://www.theguardian.com/technology/2014/aug/22/android-fragmented-developers-opensignal
  • 12. Reverse Machinery (一) baksmali; apktool dex2jar + jd-gui/luyten; 2014 input: apk/dex Output: smali Output: pseudo Java
  • 13. Reverse Machinery (二) Demo Time (Click to watch video on YouTube) 2014
  • 14. Scents of Android Malware (UN) Disingenuous advertisement • Facebook icon && titled facebook; package name: com.facebook.sms 2014 • com.facebook.katana More than advertised • Irrelevant code package • Payment SDK with no pay button (UI) Cost money APIs in unexpected context • A system utility app sends SMS or make phone calls • Free game that requires costs money permission Unnecessary outbound communications • A battery saving app talks to a remote server • Calculator that downloads stuff
  • 15. Scents of Android Malware (DEUX) Interesting Log Statements • IsFuckSendIsLuckReceiverIsLuckReceiver的finally已经开始加锁 • ** WHELCOME TO HELL ********* Interesting File Assets • /assets/libremotecontrol.so • PNG is actually dex file System Level Operations • Checks the root as a game app Peer Information Exhange • Virus Total says apps is malicious 2014
  • 16. Analysis Challenges Technical Contextual • Evasion Techniques • Complicated Apps • Sheer Volume • Constraints on Devices 2014 • Nuanced Context • Malware Purpose • Levels of Puzzle Solving
  • 17. When Android Apps Go 2014 Evil Jing Xie jing.xie@lookout.com Lookout Inc. 2014 #GHC14 2014 Thank You! Thanks to security team + designer @ lookout

Notes de l'éditeur

  1. We are talking about Android malware… but what qualifies an app as a malware. There’s a lot misconceptions in the public because the media just picks whatever’s convenient in terms of terminologies, and there’s also PC legacy that’s not caught up to the mobile sphere. So I just want us to be on the same page, @Lookout, we define malware as>>> Android applications that intentionally interrupt the availability of the device, and other applications: ransomware, bitcoin mining, aggressive adware (ad wall) intentionally cause money loss: sending premium SMS, chargeware intentionally cause data leaking: forwarding SMS, steal the banking authentication. intentionally violate the device owners’ privacy: contacts, pictures, location This is not set in stone. Malicious behavior largely depends on people’s perceptions and values in the society, the perceptions and values change… what we deem as acceptable behavior now might not be acceptable in the future. Also, new app behavior might emerge in the future that is perceived to be not acceptable … so we are open to new behaviors.
  2. We just saw that the distribution is different across the world in terms of quantity. You might wonder, are all malware distributed across all origins share the same nature, are of the same type? I wondered that too. I don’t know since there’s no research done to answer that question. But… according to my observation: Malicious apps do have different characteristics depending on their origins: Sophisticated trojans: China… Oldboot (Mouabad)/DroidDream/Geinimi/Gamex/DeathRing/Imogui SMS toll fraud: Russia (AlphaSMS, SMSActor, depositmobi, badnews, also scareware: scarepakage) Porn Chargeware: Spain & France (few families are big enough to earn any fame) Porn/Game chargeware: Vietnam (DonLoss, VChargelet, HotClipSms, SixPointSixSms, Duchm, SMSCapers) Trojans, Adware, Surveillanceware: US (AndroRAT, MobiStealth, SMSTracker from gizmoquip, KillerMobile) Surveillanceware: India (surging): WrongPath, SkyProductivityTracker
  3. Lookout had a project code named “dragon Lady” to investigate the underground malware distribution and it uncovered the Android malware industry in Russia. Here’s the economic model: Malware HQs handle business logistics, management of SMS shortcodes, platform and promotion programs. Affiliated marketers is in charge of distributing through channels like twitter and websites With that, you have a business that’s driven by huge economic gain.
  4. Let’s back it up with some data: This shows the life spans of each variant of the family. Continuous release of different versions/variants throughout the year, much like the release cycle of legit software. The foremost variant in the graph got pushed into the wild in May 2012 and it was active until August 2012. It then went through a long silent period until it got activated again in July 2013 and it got eventually decommissioned in Nov 2013.
  5. And in many countries, the supply chain is loosely regulated or outright unregulated: Decentralized control of manufacturing Fragmented Android versions (slow patching/upgrade) Loose regulation on app developer practices (e.g. adware) Cultural perception towards privacy Piracy leads to less reputable sources (Russia + RuPaidMarket)
  6. Let the virtual me do the job for a little while.
  7. Whether what is advertised by the app is provided by the app; (e.g. the icon, the package name, the class names, the app name). Whether the app does more than what is advertised, a.k.a, code injection. Whether the app uses APIs that may cost users money (e.g. sending SMS). Whether the app communicates with remote servers through HTTP.
  8. Whether the app’s source code has interesting log statements. (e.g. typos, misspellings, incorrect grammar). Whether the app has interesting files in the assets. (e.g. encrypted data files, dex files, APK files). Whether other vendors think it is potentially bad. Whether the app performs system level operations.
  9. Ever evolving analysis evasion techniques Apps can be really complicated Limited processing power on devices Sheer volume of malicious and legit apps from all over the world Context and interpretation is nuanced (adware) Reversing is a puzzle and puzzles have varying levels (many pieces are involved) Getting the core purpose of a malware family SO by now, I hope I have convinced you that … malware is real, not because of public media sensations. Reverse engineering is fun and has a low bar, there’s a lot of help if you are interested. There’s a lot of challenges and room to grow. We need talents like you, to protect our users, to protect our world. Hop on the ship, ‘cause we are sailing.
  10. The END.