Fake Netflix app reads text messages and steals mobile files

Fake Netflix app reads text messages and steals mobile files

Zscaler, the cloud security provider, has discovered a fake app posing as the popular television service, Netflix. Zscaler discovered this malicious app on a third party app store and advises all users to only purchase form authorised Google play stores in the future.

Read on for their full research on this threat:

Mobile Malware

As users have become more attached to their mobile devices, they want everything on those devices. There’s an app for just about any facet of one’s personal and professional life, from booking travel and managing projects, to buying groceries and binge-watching the latest Netflix series.

The iOS and Android apps for Netflix are enormously popular, effectively turning a mobile device into a television with which users can stream full movies and TV programs anytime, anywhere. But the apps, with their many millions of users, have captured the attention of the bad actors, too, who are exploiting the popularity of Netflix to spread malware.

Recently, the ThreatLabZ research team came across a fake Netflix app, which turned out to be a well-crafted piece of spyware we’re calling SpyNote RAT (remote access Trojan).

SpyNote RAT was capable of performing a variety of alarming functions, including:

  • Activating the device’s microphone and listening to live conversations
  • Executing commands on the device
  • Copying files from the device to a Command & Control (C&C) centre
  • Recording screen captures
  • Viewing contacts
  • Reading SMS messages

The Zscaler sandbox successfully detected the SpyNote RAT, giving it highly malicious ratings. The screenshot below shows part of the sandbox’s report on the SpyNote RAT’s signature and detected functions:

Fake Netflix app reads text messages and steals mobile files
Figure 1: Zscaler Cloud Detection

Soon enough, Zscaler signatures figured out that this spyware was a product of a spyware Trojan builder called SpyNote, which was leaked last year. The Netflix spyware we are analysing seems to have been built using an updated version of SpyNote.

Technical details

Please note that our research is not about the legitimate Netflix app on Google Play. The spyware in this analysis was portraying itself as the Netflix app. Once installed, it displayed the icon found in the actual Netflix app on Google Play.

Fake Netflix app reads text messages and steals mobile files
Figure 2- Fake Netflix vs. legitimate Netflix

As soon as the user clicks the spyware’s icon for the first time, nothing seems to happen and the icon disappears from the home screen. This is a common trick played by malware developers, making the user think the app may have been removed. But, behind the scenes, the malware has not been removed; instead it starts preparing its onslaught of attacks.

For contacting C&C, the spyware was found to be using free DNS services, as shown in the screenshot below:

Fake Netflix app reads text messages and steals mobile files
Figure 3. Server Details

SpyNote RAT uses an unusual trick to make sure that it remains up and running and that the spying does not stop. It does so using the Services, Broadcast Receivers, and Activities components of the Android platform.

Services can perform long-running operations in the background and does not need a user interface. Broadcast Receivers are Android components that can register themselves for particular events. Activities are key building blocks, central to an app’s navigation, for example.

The SpyNote RAT registers a service called AutoStartup and a broadcast receiver named BootComplete.
MainActivity registers BootComplete with a boot event, so that whenever the device is booted, BootComplete gets triggered.

BootComplete starts the AutoStartup service and the AutoStartup service makes sure that MainActivity is always running.

What follows are some of the features exhibited by SpyNote RAT.

Command execution

Command execution can create havoc for victim if the malware developer decides to execute commands in the victim’s device. Leveraging this feature, the malware developer can root the device using a range of vulnerabilities, well-known or zero-day.

The following screenshot shows the command execution functionality in action:

Fake Netflix app reads text messages and steals mobile files
Figure 4: Command Execution

The paramString parameter shown in the above screenshot can be any command received from C&C.

Screen capture and audio recording

SpyNote RAT was able to take screen captures and, using the device’s microphone, listen to audio conversations. This capability was confirmed when the Android permission, called android.permission.RECORD_AUDIO, was being requested along with code found in the app.
SpyNote RAT captured the device’s screen activities along with audio using the MediaProjectionCallback functionality (available with Lollipop, the Android 5.0 release, and later) and saved the output in a file named “video.mp4” as shown in the following screenshot:

Fake Netflix app reads text messages and steals mobile files
Figure 5: Output File

SMS stealing

SpyNote RAT was also observed stealing SMS messages from the affected devices, as shown in screenshot below:

Fake Netflix app reads text messages and steals mobile files
Figure 6: Reading SMS messages

Stealing contacts

The ability to steal contacts is a favorite feature for spyware developers, as the stolen contacts can be used to further spread the spyware.

The following screenshot shows the contacts being stolen and written in a local array, which is then sent to C&C:

Fake Netflix app reads text messages and steals mobile files
Figure 7: Stealing and writing contacts

Uninstalling apps

Uninstalling apps is another function favored by developers of Android spyware and malware. They tend to target any antivirus protections on the device and uninstall them, which increases the possibility of their malware persisting on the device. Following screenshot shows this functionality in action:

Fake Netflix app reads text messages and steals mobile files
Figure 8: Uninstalling functionality

Other functions

In addition to the functionalities we’ve described, the SpyNote RAT was exhibiting many other behaviors that make it more robust than most off-the-shelf malware.

SpyNote RAT was designed to function only over Wi-Fi, which is the preferable mode for Android malware to send files to C&C.

The screenshot below shows SpyNote RAT scanning for Wi-Fi and enabling it if a known channel is found:

 

Fake Netflix app reads text messages and steals mobile files
Figure 9: Scanning Wi-Fi

In addition

  • SpyNote RAT could click photos using the device’s camera, based on commands from C&C.
  • There were two interesting sub-classes found inside Main Activity: Receiver and Sender. Receiver was involved in receiving commands from the Server and the main functionality of Sender was to send all the data collected to the C&C over Wi-Fi.
  • SpyNote RAT was also collecting the device’s location to identify the exact location of the victim.

SpyNote Survey

The SpyNote Remote Access Trojan (RAT) builder is gaining popularity in the hacking community, so we decided to study its pervasiveness. What we found were several other fake apps developed using the SpyNote builder, which should come as a warning to Android users. Some of the targeted apps were:

  • Whatsapp
  • YouTube Video Downloader
  • Google Update
  • Instagram
  • Hack Wifi
  • AirDroid
  • WifiHacker
  • Facebook
  • Photoshop
  • SkyTV
  • Hotstar
  • Trump Dash
  • PokemonGo

With many more to come…

Furthermore, we found that in just the first two weeks of 2017, there have been more than 120 such spyware variants already built using the same SpyNote Trojan builder as SpyNote RAT and roaming in the wild. A complete list of hashes will be shared soon.

Conclusion

The days when one needed in-depth coding knowledge to develop malware are long gone. Nowadays, script kiddies can build a piece of malware that can create real havoc. Moreover, there are many toolkits like the SpyNote Trojan builder that enable users to build malware with ease and few clicks.

Because mobile devices are everywhere, malware is everywhere, too. That’s why Zscaler advises all mobile users to take precautions when downloading anything to their devices, including apps.

In particular, avoid side-loading apps from third-party app stores and avoid the temptation to play games that are not yet available on Android. Yes, we are talking about SuperMarioRun, which was recently launched by Nintendo only for iOS users. Recent blogs by the Zscaler research team explain how some variants of Android malware are exploiting the popularity of this game and tricking Android users into downloading a fake version. (Have a look here and here.)

You should also avoid the temptation to play games from sources other than legitimate app stores; such games are not safe and may bring harm to your reputation and your bank account.

Zscaler users are protected from such attacks with multiple levels of security. For more information go to: www.zscaler.com

[su_button url=”https://www.zscaler.com/” target=”blank” style=”flat” background=”#df2027″ color=”#ffffff” size=”10″ radius=”20″ icon=”icon: arrow-circle-right”]For more information on Zscaler click here[/su_button]

Georgina Turner image

Georgina Turner

Sales Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Graphic displaying a lockdown solution

Netgenium debuts next gen display and touchscreen technologies

Power-over-Ethernet (PoE) solutions specialist Netgenium will be showcasing its new range of IP…

ICT® Launches New TSL Access Reader Series

Integrated Control Technology (ICT®), a leading manufacturer of intelligent access control and…
Image Provided by Paxton

Paxton Partners with Skills for Security

The security technology manufacturer Paxton is proud to announce a partnership with Skills for Security…
Image Provided by ICT

ICT and Ingram Micro sign distribution agreement MEA

Integrated Control Technology (ICT), award-winning global manufacturer of intelligent electronic access control and security solutions..
Image Provided by Toshiba

Toshiba launches new HDD Innovation Lab

Toshiba Electronics Europe GmbH (Toshiba) has inaugurated a new HDD Innovation Laboratory (HDD Innovation Lab) at its site in Düsseldorf..
Image Provided by Verkada

Verkada Doubles Down on the Channel with Strategic New Hire

Verkada, a leader in cloud-based physical security, today announced the appointment of Micah Deriso as Head of Global Channel…
Image Provided by IPSA

IPSA Appoint Frontline Hero as Ambassador

Abdullah, the courageous security officer praised for foiling a horrific knife attack at Leicester Square, has been appointed as…
Image Provided by Codelocks

New Surface Latch from Codelocks

Codelocks is expanding its Gate Solutions by Codelocks range with the introduction of the new Codelocks’ Surface Latch…
Image provided by Genetec

Nicholas Smith to Lead Genetec UK and Ireland Operations

Genetec, provider of enterprise physical security software, announced the appointment of Nicholas Smith as its new Regional Sales Director…

News Desk

View all the latest, product, project and people news

News Desk

Click Here

Technology News

Keep up-to-date with the latest product innovation

Technology News

Click Here

Industry Sectors

Discover technology in action in all applications

Industry Sectors

Click Here

Enter The Awards

Showcase personal or organisation excellence

Advertise With Us

Reach decision makers and amplify your marketing

Advertise With Us

Click Here
Scroll to Top