By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
10alert.com10alert.com
  • Threats
    • WordPress ThreatsDanger
    Threats
    A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats include…
    Show More
    Top News
    What is an Exploit? -Kaspersky Daily
    8 months ago
    Darkhotel APT in luxury Asian hotels
    8 months ago
    Kaspersky Lab expert Andrey Pozhogin answers questions about ransomware
    8 months ago
    Latest News
    Triangulation: Trojan for iOS | Kaspersky official blog
    2 days ago
    Wordfence Intelligence Weekly WordPress Vulnerability Report (May 22, 2023 to May 28, 2023)
    2 days ago
    Safeguards against firmware signed with stolen MSI keys
    4 days ago
    WPDeveloper Addresses Privilege Escalation Vulnerability in ReviewX WordPress Plugin
    4 days ago
  • Fix
    Fix
    Troubleshooting guide you need when errors, bugs or technical glitches might ruin your digital experience.
    Show More
    Top News
    Keylogger found on 5500 sites running WordPress
    Keylogger found on 5500 sites running WordPress
    8 months ago
    Windows 11 build 22622.575 (KB5016694) releases in the Beta Channel
    8 months ago
    How to create restore point on Windows 11
    8 months ago
    Latest News
    How automatically delete unused files from my Downloads folder?
    4 months ago
    Now you can speed up any video in your browser
    4 months ago
    How to restore access to a file after EFS or view it on another computer?
    4 months ago
    18 Proven Tips to Speed Up Your WordPress Site and Improve SEO | 2023 Guide
    5 months ago
  • How To
    How ToShow More
    Dynamic data collection with Zaraz Worker Variables
    Dynamic data collection with Zaraz Worker Variables
    1 day ago
    Reduce latency and increase cache hits with Regional Tiered Cache
    Reduce latency and increase cache hits with Regional Tiered Cache
    2 days ago
    Cloudflare is deprecating Railgun
    Cloudflare is deprecating Railgun
    2 days ago
    What is two-factor authentication | Kaspersky official blog
    5 days ago
    Acer refreshes Windows 11 PCs for work and play: Swift Edge 16 and Predator Triton 16
    7 days ago
  • News
    News
    This category of resources includes the latest technology news and updates, covering a wide range of topics and innovations in the tech industry. From new…
    Show More
    Top News
    How to create local account on Windows 10
    4 months ago
    How to enable Nearby Sharing on Windows 11
    4 months ago
    How to enable Previous Versions to recover files on Windows 11
    3 months ago
    Latest News
    How to add CPU, GPU, RAM widgets on Windows 11
    2 days ago
    How to create virtual drive (VHD, VHDX, Dev Drive) on Windows 11
    5 days ago
    How to enable Taskbar End Task option to close apps on Windows 11
    5 days ago
    How to check USB4 devices specs from Settings on Windows 11
    5 days ago
  • Glossary
  • My Bookmarks
Reading: A Pokémon Go Trojan in Google Play
Share
Notification Show More
Aa
Aa
10alert.com10alert.com
  • Threats
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
  • Threats
    • WordPress ThreatsDanger
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
Follow US
ThreatsWordpress Threats

A Pokémon Go Trojan in Google Play

Vitus White
Last updated: 13 October
Vitus White 4 years ago
Share
5 Min Read

Less than three months after Pokémon Go launched, criminals sneaked malware into Google Play to target Pokémon trainers. Our experts discovered the Trojan several days ago and immediately reported it to Google. Unfortunately, by that time, the malicious app called Guide for Pokémon Go had already been downloaded more than 500,000 times.

Contents
How does it work?Just ads? Is that really dangerous?How to protect yourself

In the past few months almost 6 million people gave Pokémon Go a try. It’s no wonder that the massively popular game quickly caught the attention of cybercriminals: The first malware for Pokémon Go was traced in July, soon after the launch of the game. At that time, the situation was not so dangerous. The Trojan was stored in a malicious file vault and waited to be spread online. But now we have quite a different story.

This new Trojan was discovered on Google Play. Like a professional rogue, it masterfully hid itself from security experts and chose victims carefully. To those “chosen” ones, it showed ads — a lot of ads. It also rooted their devices and installed a bunch of other malicious files and unwanted apps.

How does it work?

To hide the malware from antivirus scanners, the Trojan’s executable files were compressed with a commercial software packer. Decompressed files included useful Pokémon Go content (the Trojan’s disguise) and a small module with obfuscated code.

A Pokémon Go Trojan in Google Play

After a user installed Guide for Pokémon Go, the malware waited silently for some time. This break was quite deliberate: The malware needed to learn whether it was on a real device or a virtual machine — an emulated computer system security experts use to check how suspicious apps behave in different conditions.

Having confirmed it was on a real device, the Trojan sent a message to a command-and-control server run by cybercriminals. The report included information about the infected device: model, OS version, country, default language, and more.

A Pokémon Go Trojan in Google Play

The server analyzed the information, decided if the victim suited its needs, and informed the Trojan of its decision. With the server’s permission, Guide for Pokémon Go downloaded additional malicious files (their code also obfuscated). These files were the Trojan’s heavy weaponry; they let it use a number of vulnerabilities discovered from 2012 to 2015.

The armed malware rooted the system, silently installed additional apps, and flooded the phone with ads.

Just ads? Is that really dangerous?

Advertisements are rarely pleasant. Besides, it’s one thing to watch ads from Google — that’s one way you pay for its “free” services. It’s quite another thing when criminals infect your phone with malware to display banners all the time.

However, the worst part of this infection is hidden: Guide for Pokémon Go can secretly install any apps on your device. For now, criminals have chosen a relatively mild way to earn money: ads. Tomorrow, they may decide to increase their income by locking your device and demanding ransom — or stealing money from your bank account.

Why you shouldn’t trust the reviews and ratings on #Google Play https://t.co/aMdYbh3T1F pic.twitter.com/n8QmQtAElm

— Eugene Kaspersky (@e_kaspersky) September 1, 2016

Though the Trojan has been removed from Google Play, half a million people downloaded it. We know for sure that the Trojan infected devices in Russia, India, and Indonesia. But it targets users from English-speaking regions as well, and there are certainly more victims around the world.

How to protect yourself

If you are concerned that your device might be infected with this Trojan, remove the malicious app and scan your device with Kaspersky Antivirus & Security for Android. It’s free. Our security solutions detect the Trojan as HEUR:Trojan.AndroidOS.Ztorg.ad.

While you catch #pokemons, cybercriminals try to catch you on #GooglePlay

Tweet

To protect yourself in the future, follow these rules:

1. Keep in mind that even if you download apps only from official stores, nothing is 100% secure. Criminals sometimes bypass the protections of Google and other companies — Guide for Pokémon Go is a good example.

2. Promptly install security patches on your smartphone (and your computer, too). Cybercriminals pounce on vulnerabilities in both mobile and desktop OSes.

3. Remember that reviews and ratings on Google Play are not necessarily reliable — criminals can fake them using special malware. For example, Guide for Pokémon Go malware had four stars on Google Play.


Source: kaspersky.com

Translate this article

TAGGED: Google Play, Malware, Networking, PoC, Security, Software, Threats, Trojan, Vulnerabilities
Vitus White October 13, 2022 September 30, 2019
Share this Article
Facebook Twitter Reddit Telegram Email Copy Link Print

STAY CONECTED

24.8k Followers Like
253.9k Followers Follow
33.7k Subscribers Subscribe
124.8k Members Follow

LAST 10 ALERT

Dynamic data collection with Zaraz Worker Variables
Dynamic data collection with Zaraz Worker Variables
Apps 1 day ago
How to add CPU, GPU, RAM widgets on Windows 11
News 2 days ago
Reduce latency and increase cache hits with Regional Tiered Cache
Reduce latency and increase cache hits with Regional Tiered Cache
Apps 2 days ago
Cloudflare is deprecating Railgun
Cloudflare is deprecating Railgun
Apps 2 days ago
Triangulation: Trojan for iOS | Kaspersky official blog
Threats 2 days ago

Recent Posts

  • Dynamic data collection with Zaraz Worker Variables
  • How to add CPU, GPU, RAM widgets on Windows 11
  • Reduce latency and increase cache hits with Regional Tiered Cache
  • Cloudflare is deprecating Railgun
  • Triangulation: Trojan for iOS | Kaspersky official blog

You Might Also Like

Dynamic data collection with Zaraz Worker Variables
Apps

Dynamic data collection with Zaraz Worker Variables

1 day ago
Reduce latency and increase cache hits with Regional Tiered Cache
Apps

Reduce latency and increase cache hits with Regional Tiered Cache

2 days ago
Cloudflare is deprecating Railgun
Apps

Cloudflare is deprecating Railgun

2 days ago
Threats

Triangulation: Trojan for iOS | Kaspersky official blog

2 days ago
Show More

Related stories

How to Use Cloudflare to Secure Your WordPress Site
How To Starting Chrome from the command line
How to fix error 0x80070057 in Chrome?
Windows 10 How To Disable Slide to Shutdown
Windows search not working (FIX)
How to watch movies and TV series for free on Kinopoisk?
Previous Next

10 New Stories

Wordfence Intelligence Weekly WordPress Vulnerability Report (May 22, 2023 to May 28, 2023)
Safeguards against firmware signed with stolen MSI keys
WPDeveloper Addresses Privilege Escalation Vulnerability in ReviewX WordPress Plugin
How to create virtual drive (VHD, VHDX, Dev Drive) on Windows 11
How to enable Taskbar End Task option to close apps on Windows 11
How to check USB4 devices specs from Settings on Windows 11
Previous Next
Hot News
Dynamic data collection with Zaraz Worker Variables
How to add CPU, GPU, RAM widgets on Windows 11
Reduce latency and increase cache hits with Regional Tiered Cache
Cloudflare is deprecating Railgun
Triangulation: Trojan for iOS | Kaspersky official blog
10alert.com10alert.com
Follow US

© 10 Alert Network. All Rights Reserved.

  • Privacy Policy
  • Contact
  • Customize Interests
  • My Bookmarks
  • Glossary
Go to mobile version
adbanner
AdBlock Detected
Our site is an advertising supported site. Please whitelist to support our site.
Okay, I'll Whitelist
Welcome Back!

Sign in to your account

Lost your password?