www.welivesecurity.com Open in urlscan Pro
2a02:26f0:3500:12::1730:1797  Public Scan

Submitted URL: https://t.co/oqL80J3BNR
Effective URL: https://www.welivesecurity.com/2021/07/20/url-shortener-services-android-malware-banking-sms-trojans/
Submission: On September 24 via manual from RU — Scanned from DE

Form analysis 5 forms found in the DOM

GET https://www.welivesecurity.com/

<form action="https://www.welivesecurity.com/" class="basic-searchform imc dark col-md-12 col-sm-10 col-xs-12" method="get" role="search">
  <div class="search-input clearfix">
    <input type="text" name="s" value="" placeholder="Search..." class="imc">
    <button class="imc">
      <span class="icomoon icon-icon_search imc"></span>
    </button>
  </div>
</form>

GET https://www.welivesecurity.com/

<form action="https://www.welivesecurity.com/" class="basic-searchform imc dark col-md-12 col-sm-10 col-xs-12" method="get" role="search">
  <div class="search-input clearfix">
    <input type="text" name="s" value="" placeholder="Search..." class="imc">
    <button class="imc">
      <span class="icomoon icon-icon_search imc"></span>
    </button>
  </div>
</form>

GET https://www.welivesecurity.com/

<form action="https://www.welivesecurity.com/" class="basic-searchform imc  col-md-12 col-sm-10 col-xs-12" method="get" role="search">
  <div class="search-input clearfix">
    <input type="text" name="s" value="" placeholder="Search..." class="imc">
    <button class="imc">
      <span class="icomoon icon-icon_search imc"></span>
    </button>
  </div>
</form>

POST https://enjoy.eset.com/pub/rf

<form action="https://enjoy.eset.com/pub/rf" class="basic-searchform col-md-12 col-sm-12 col-xs-12 no-padding newsletter" method="post" role="search">
  <div class="search-input clearfix">
    <input type="text" name="EMAIL_ADDRESS_" value="" placeholder="Email...">
    <input type="hidden" name="TOPIC" value="We Live Security Ukraine Newsletter">
    <input type="hidden" name="_ri_" value="X0Gzc2X%3DAQpglLjHJlTQGgXv4jDGEK4KW2uhw0qgUzfwuivmOJOPCgzgo9vsI3VwjpnpgHlpgneHmgJoXX0Gzc2X%3DAQpglLjHJlTQGzbD6yU2pAgzaJM16bkTA7tOwuivmOJOPCgzgo9vsI3">
    <input type="hidden" name="_ei_" value="Ep2VKa8UKNIAPP_2GAEW0bY">
    <input type="hidden" name="_di_" value="m0a5n0j02duo9clmm4btuu5av8rdtvqfqd03v1hallrvcob47ad0">
    <input type="hidden" name="EMAIL_PERMISSION_STATUS_" value="O">
    <input type="hidden" name="CONTACT_SOURCE_MOST_RECENT" value="WLS_Subscribe_Form">
    <button class="button-flag"> Submit </button>
  </div>
</form>

POST https://enjoy.eset.com/pub/rf

<form action="https://enjoy.eset.com/pub/rf" class="basic-searchform col-md-12 col-sm-12 col-xs-12 no-padding newsletter" method="post" role="search">
  <div class="search-input clearfix">
    <input type="text" name="EMAIL_ADDRESS_" value="" placeholder="Email...">
    <input type="hidden" name="NEWSLETTER" value="We Live Security">
    <input type="hidden" name="_ri_" value="X0Gzc2X%3DAQpglLjHJlTQGgXv4jDGEK4KW2uhw0qgUzfwuivmOJOPCgzgo9vsI3VwjpnpgHlpgneHmgJoXX0Gzc2X%3DAQpglLjHJlTQGzbD6yU2pAgzaJM16bkTA7tOwuivmOJOPCgzgo9vsI3">
    <input type="hidden" name="_ei_" value="Ep2VKa8UKNIAPP_2GAEW0bY">
    <input type="hidden" name="_di_" value="m0a5n0j02duo9clmm4btuu5av8rdtvqfqd03v1hallrvcob47ad0">
    <input type="hidden" name="EMAIL_PERMISSION_STATUS_" value="O">
    <input type="hidden" name="CONTACT_SOURCE_MOST_RECENT" value="WLS_Subscribe_Form">
    <button class=""> Submit </button>
  </div>
</form>

Text Content

In English
 * Em Português
 * En français
 * En Español
 * In Deutsch

Menu toggle menu

 * All Posts
 * Ukraine Crisis – Digital Security Resource Center
 * We Live Progress
 * Research
 * How To
 * Videos
 * Conference Materials
 * White Papers
 * Threat Reports
 * Magazine
 * Our Experts

 * Em Português
 * En français
 * En Español
 * In Deutsch





Award-winning news, views, and insight from the ESET security community


SOME URL SHORTENER SERVICES DISTRIBUTE ANDROID MALWARE, INCLUDING BANKING OR SMS
TROJANS

On iOS we have seen link shortener services pushing spam calendar files to
victims’ devices.
Lukas Stefanko
20 Jul 2021 - 02:00PM
Share

On iOS we have seen link shortener services pushing spam calendar files to
victims’ devices.

We hope you already know that you shouldn’t click on just any URLs. You might be
sent one in a message; somebody might insert one under a social media post or
you could be provided with one on basically any website. Users or websites
providing these links might use URL shortener services. These are used to
shorten long URLs, hide original domain names, view analytics about the devices
of visitors, or in some cases even monetize their clicks.

Monetization means that when someone clicks on such a link, an advertisement,
such as the examples in Figure 1, will be displayed that will generate revenue
for the person who generated the shortened URL. The problem is that some of
these link shortener services use aggressive advertising techniques such as
scareware ads: informing users their devices are infected with dangerous
malware, directing users to download dodgy apps from the Google Play store or to
participate in shady surveys, delivering adult content, offering to start
premium SMS service subscriptions, enabling browser notifications, and making
dubious offers to win prizes.

We’ve even seen link shortener services pushing “calendar” files to iOS devices
and distributing Android malware – indeed, we discovered one piece of malware we
named Android/FakeAdBlocker, which downloads and executes additional payloads
(such as banking trojans, SMS trojans, and aggressive adware) received from its
C&C server.

Below we describe the iOS calendar-event-creating downloads and how to recover
from them, before spending most of the blogpost on a detailed analysis of the
distribution of Android/FakeAdBlocker and, based on our telemetry, its alarming
number of detections. This analysis is mainly focused on the functionality of
the adware payload and, since it can create spam calendar events, we have
included a brief guide detailing how to automatically remove them and uninstall
Android/FakeAdBlocker from compromised devices.

Figure 1. Examples of shady aggressive advertisements


DISTRIBUTION

Content displayed to the victim from monetized link shorteners can differ based
on the running operating system. For instance, if a victim clicked on the same
link on a Windows device and on a mobile device, a different website would be
displayed on each device. Besides websites, they could also offer an iOS device
user to download an ICS calendar file, or an Android device user to download an
Android app. Figure 2 outlines options we have seen in the campaign analyzed
here.

Figure 2. Malware distribution process

While some advertisements and Android applications served by these monetized
shortened links are legitimate, we observed that the majority lead to shady or
unwanted behavior.


IOS TARGETS

On iOS devices, besides flooding victims with unwanted ads, these websites can
create events in victims’ calendars by automatically downloading an ICS file. As
the screenshots in Figure 3 show, victims must first tap the subscribe button to
spam their calendars with these events. However, the calendar name “Click OK To
Continue (sic)” is not revealing the true content of those calendar events and
only misleads the victims into tapping the Subscribe and Done button.

These calendar events falsely inform victims that their devices are infected
with malware, hoping to induce victims to click on the embedded links, which
lead to more scareware advertisements.

Figure 3. Scam website requests user to subscribe to calendar events on iOS
platform




ANDROID TARGETS

For victims on Android devices, the situation is more dangerous because these
scam websites might initially provide the victim with a malicious app to
download and afterwards proceed with visiting or downloading the actual expected
content searched for by the user.

There are two scenarios for Android users that we observed during our research.
In the first one, when the victim wants to download an Android application other
than from Google Play, there is a request to enable browser notifications from
that website, followed by a request to download an application called adBLOCK
app.apk. This might create the illusion that this adBLOCK app will block
displayed advertisements in the future, but the opposite is true. This app has
nothing to do with the legitimate adBLOCK application available from the
official source.

When the user taps on the download button, the browser is redirected to a
different website where the user is apparently offered an ad-blocking app named
adBLOCK, but ends up downloading Android/FakeAdBlocker. In other words, the
victim’s tap or click is hijacked and used to download a malicious application.
If the victim returns to the previous page and taps on the same download button,
the correct legitimate file that the intended victim wanted is downloaded onto
the device. You can watch one of the examples in the video below.



In the second Android scenario, when the victims want to proceed with
downloading the requested file, they are shown a web page describing the steps
to download and install an application with the name Your File Is Ready To
Download.apk. This name is obviously misleading; the name of the app is trying
to make the user think that what is being downloaded is the app or a file they
wanted to access. You can see the demonstration in the video below.



In both cases, a scareware advertisement or the same Android/FakeAdBlocker
trojan is delivered via a URL shortener service. Such services employ the Paid
to click (PTC) business model and act as intermediaries between customers and
advertisers. The advertiser pays for displaying ads on the PTC website, where
part of that payment goes to the party that created the shortened link. As
stated on one of these link shortening websites in the privacy policy section,
these ads are via their advertising partners and they are not responsible for
delivered content or visited websites.

One of the URL shortener services states in its terms of service that users
should not create shortened links to transmit files that contain viruses,
spyware, adware, trojans or other harmful code. To the contrary, we have
observed that their ad partners are doing it.


TELEMETRY

Based on our detection data, Android/FakeAdBlocker was spotted for the first
time in September 2019. Since then, we have been detecting it under various
threat names. From the beginning of this year till July 1st, we have seen more
than 150,000 instances of this threat being downloaded to Android devices.

Figure 4. ESET detection telemetry for Android/FakeAdBlocker

Figure 5. Top ten countries by proportion of Android/FakeAdBlocker detections
(January 1st – July 1st 2021)


ANDROID/FAKEADBLOCKER ANALYSIS

After downloading and installing Android/FakeAdBlocker, the user might realize
that, as seen in Figure 6, it has a white blank icon and, in some cases, even
has no app name.

Figure 6. App icon of Android/FakeAdBlocker

After its initial launch, this malware decodes a base64-encoded file with a .dat
extension that is stored in the APK’s assets. This file contains C&C server
information and its internal variables.

Figure 7. Decoded config file from APK assets

From its C&C server it will request another configuration file. This has a
binary payload embedded, which is then extracted and dynamically loaded.

Figure 8. Android/FakeAdBlocker downloads an additional payload

For most of the examples we have observed, the this payload was responsible for
displaying out-of-context ads. However, in hundreds of cases, different
malicious payloads were downloaded and executed. Based on our telemetry, the C&C
server returned different payloads based on the location of the device. The
Cerberus banking trojan was downloaded to devices in Turkey, Poland, Spain,
Greece and Italy. It was disguised as Chrome, Android Update, Adobe Flash
Player, Update Android, or Google Guncelleme app (guencelleme is Turkish for
“update” so the name of the app is Google Update). In Greece we have also seen
the Ginp banking trojan being downloaded. The same malware family variant of SMS
trojan was distributed in the Middle East. Besides these trojans, Bitdefender
Labs also identified the TeaBot (also known as Anatsa) banking trojan being
downloaded as a payload by Android/FakeAdBlocker. Payloads are downloaded to
external media storage in the files subdirectory of the parent app package name
using various app names. A list of payload APK names is included in the IoCs
section.

The emerging fact that the C&C server can at any time distribute different
malicious payloads makes this threat unpredictable. Since all aforementioned
trojans have already been analyzed, we will continue with the analysis of the
adware payload that was distributed to more than 99% of the victims. The adware
payload bears many code similarities with the downloader so we are classifying
both in the same Android/FakeAdBlocker malware family.

Although the payloads download in the background, the victim is informed about
actions happening on the mobile device by the activity displayed saying file is
being downloaded. Once everything is set up, the Android/FakeAdBlocker adware
payload asks the victim for permission to draw over other apps, which will later
result in it creating fake notifications to display advertisements in the
foreground, and for permission to access the calendar.

Figure 9. Activity shown after start

Figure 10. Permission request to control what is displayed in foreground

Figure 11. Permission request to edit calendar events

After all permissions are enabled, the payload silently starts to create events
in Google Calendar for upcoming months.

Figure 12. Scareware calendar events created by malware (above) and detail
(below)

It creates eighteen events happening every day, each of them lasts 10 minutes.
Their names and descriptions suggest that the victim’s smartphone is infected,
user data is exposed online or that a virus protection app is expired.
Descriptions of each event include a link that leads the victim to visit a
scareware advertisement website. That website again claims the device has been
infected and offers the user to download shady cleaner applications from Google
Play.

Figure 13. Titles and descriptions of the events (left) and the reminder
displayed by one of them (right)

All the event title names and their descriptions can be found the malware’s
code. Here are all scareware event texts created by the malware, verbatim. If
you find one of these in your Google Calendar, you are or were most likely a
victim of this threat.
⚠ Hackers may try to steal your data!
Block ads, viruses and pop-ups on YouTube, Facebook, Google, and your favorite
websites. CLICK THE LINK BELOW TO BLOCK ALL ADS

⚠ YOUR Device can be infected with A VIRUS ⚠
Block ads, viruses and pop-ups on YouTube, Facebook, Google, and your favorite
websites. CLICK THE LINK BELOW TO BLOCK ALL ADS

☠️Severe Viruses have been found recently on Android devices
Block ads, viruses and pop-ups on YouTube, Facebook, Google, and your favorite
websites. CLICK THE LINK BELOW TO BLOCK ALL ADS

🛑 Your Phone is not Protected ?! Click To Protect it!
It’s 2021 and you haven’t found a way to protect your Device? Click below to fix
this!

⚠ Android Virus Protection Expired ?! Renew for 2021
We have all heard stories about people who got exposed to malware and expose
their data at risk. Don’t be silly, protect yourself now by clicking below!

⚠ You May Be Exposed Online Click To Fix!
Hackers can check where you live by checking your device’s IP while you are at
home. Protect yourself by installing a VPN. Protect your self by clicking below.

✅ Clear Your Device from Malicious Attacks!
Your Device is not invincible from viruses. Make sure that it is free from
infection and prevent future attacks. Click the link below to start scanning!

⚠ Viruses Alert – Check Protection NOW
Hackers and practically anyone who want it can check where you live by breaking
into your device. Protect your self by clicking below.

☠️ Viruses on your Device?! CLEAN THEM NOW
It’s 2021 and you haven’t found a way to protect your Device? Click below to fix
this!

🛡️ Click NOW to Protect your Priceless Data!
Your identity and other important information can be easily stolen online
without the right protection. VPN can effectively avoid that from happening.
Click below to avail of that needed protection.

⚠ You Are Exposed Online, Click To Fix!
Hackers can check where you live by checking your device’s IP while you are at
home. Protect yourself by installing a VPN. Protect your self by clicking below.

🧹 Clean your Phone from potential threats, Click Now.
Going online exposes you to various risks including hacking and other fraudulent
activities. VPN will protect you from these attacks. Make your online browsing
secured by clicking the link below.

🛑 Your Phone is not Protected! Click To Protect it!
It’s 2021 and you haven’t found a way to protect your iPhone? Click below to fix
this!

⚠ YOUR Device can be infected with A VIRUS ⚠
Block ads, viruses and pop-ups on YouTube, Facebook, Google, and your favorite
websites. CLICK THE LINK BELOW TO BLOCK ALL ADS

⚠ You May Be Exposed Online Click To Fix!
Hackers can check where you live by checking your device’s IP while you are at
home. Protect yourself by installing a VPN. Protect your self by clicking below.

☠️Severe Viruses have been found recently on Android devices
Block ads, viruses and pop-ups on YouTube, Facebook, Google, and your favorite
websites. CLICK THE LINK BELOW TO BLOCK ALL ADS

☠️ Viruses on your Device?! CLEAN THEM NOW
It’s 2021 and you haven’t found a way to protect your Device? Click below to fix
this!

⚠ Android Virus Protection Expired ?! Renew for 2021
We have all heard stories about people who got exposed to malware and expose
their data at risk. Don’t be silly, protect yourself now by clicking below!

Besides flooding the calendar with scam events, Android/FakeAdBlocker also
randomly displays full screen advertisements within the mobile browser, pops up
scareware notifications and adult advertisements, and displays a Messenger-like
“bubble” in the foreground mimicking a received message with a scammy text next
to it.

Figure 14. Examples of displayed scareware ads

Clicking on any of these would lead the user to a website with further scareware
content that suggests that the victim install cleaners or virus removers from
Google Play. We have already written about similar shady apps impersonating
security software in 2018.


UNINSTALL PROCESS

To identify and remove Android/FakeAdBlocker, including its dynamically loaded
adware payload, you need to first find it among your installed applications, by
going to Settings -> Apps. Because the malware doesn’t have an icon or an app
name (see Figure 15), it should be easy to spot. Once located, tap it once to
select it and then tap on Uninstall button and confirm the request to remove the
threat.

Figure 15. Manual uninstallation of malware


HOW TO AUTOMATICALLY REMOVE SPAM EVENTS

Uninstalling Android/FakeAdBlocker will not remove the spam events it created in
your calendar. You can remove them manually; however, it would be a tedious job.
This task can also be done automatically, using an app. During our tests we
successfully removed all these events using a free app available from the Google
Play store called Calendar Cleanup. A problem with this app is that it removes
only past events. Because of that, to remove upcoming events, temporarily change
the current time and date in the settings of the device to be the day after the
last spam event created by the malware. That would make all these events expired
and Calendar Cleanup can then automatically remove them all.

It is important to state that this app removes all events, not just the ones
created by the malware. Because of that, you should carefully select the
targeted range of days.

Once the job is done, make sure to reset the current time and date.


CONCLUSION

Based on our telemetry, it appears that many users tend to download Android apps
from outside of Google Play, which might lead them to download malicious apps
delivered through aggressive advertising practices that are used to generate
revenue for their authors. We identified and demonstrated this vector of
distribution in the videos above. Android/FakeAdBlocker downloads malicious
payloads provided by its operator’s C&C server; in most cases, after launch
these hide themselves from user view, deliver unwanted scareware or adult
content advertisements and create spam calendar events for upcoming months.
Trusting these scareware ads might cost their victims money either by sending
premium rate SMS messages, subscribing to unnecessary services, or downloading
additional and often malicious applications. Besides these scenarios, we
identified various Android banking trojans and SMS trojans being downloaded and
executed.


IOCS

HashDetection name
B0B027011102B8FD5EA5502D23D02058A1BFF1B9Android/FakeAdBlocker.A
E51634ED17D4010398A1B47B1CF3521C3EEC2030Android/FakeAdBlocker.B
696BC1E536DDBD61C1A6D197AC239F11A2B0C851Android/FakeAdBlocker.C


C&CS

emanalyst[.]biz
mmunitedaw[.]info
ommunite[.]top
rycovernmen[.]club
ransociatelyf[.]info
schemics[.]club
omeoneha[.]online
sityinition[.]top
fceptthis[.]biz
oftongueid[.]online
honeiwillre[.]biz
eaconhop[.]online
ssedonthep[.]biz
fjobiwouldli[.]biz
offeranda[.]biz


FILE PATHS OF DOWNLOADED PAYLOADS

/storage/emulated/0/Android/data/com.intensive.sound/files/Download/updateandroid.apk
/storage/emulated/0/Android/data/com.intensive.sound/files/Download/Chrome05.12.11.apk
/storage/emulated/0/Android/data/com.intensive.sound/files/Download/XXX_Player.apk
/storage/emulated/0/Android/data/com.confidential.pottery/files/Download/Google_Update.apk
/storage/emulated/0/Android/data/com.confidential.pottery/files/Download/System.apk
/storage/emulated/0/Android/data/com.confidential.pottery/files/Download/Android-Update.5.1.apk
/storage/emulated/0/Android/data/com.cold.toothbrush/files/Download/Android_Update.apk
/storage/emulated/0/Android/data/com.cold.toothbrush/files/Download/chromeUpdate.apk
/storage/emulated/0/Android/data/com.cold.toothbrush/files/Download/FreeDownloadVideo.apk
/storage/emulated/0/Android/data/com.anaconda.brave/files/Download/MediaPlayer.apk
/storage/emulated/0/Android/data/com.anaconda.brave/files/Download/GoogleChrome.apk
/storage/emulated/0/Android/data/com.dusty.bird/files/Download/Player.apk


MITRE ATT&CK TECHNIQUES

This table was built using version 9 of the ATT&CK framework.

TacticIDNameDescription Initial AccessT1476Deliver Malicious App via Other
MeansAndroid/FakeAdBlocker can be downloaded from third-party websites.
T1444Masquerade as Legitimate ApplicationAndroid/FakeAdBlocker impersonates
legitimate AdBlock app. PersistenceT1402Broadcast ReceiversAndroid/FakeAdBlocker
listens for the BOOT_COMPLETED broadcast, ensuring that the app’s functionality
will be activated every time the device starts. T1541Foreground
PersistenceAndroid/FakeAdBlocker displays transparent notifications and pop-up
advertisements. Defense EvasionT1407Download New Code at
RuntimeAndroid/FakeAdBlocker downloads and executes an APK filefiles from a
malicious adversary server. T1406Obfuscated Files or
InformationAndroid/FakeAdBlocker stores base64-encoded file in assets containing
config file with C&C server. T1508Suppress Application
IconAndroid/FakeAdBlocker’s icon is hidden from its victim’s view.
CollectionT1435Access Calendar EntriesAndroid/FakeAdBlocker creates scareware
events in calendar. Command And ControlT1437Standard Application Layer
ProtocolAndroid/FakeAdBlocker communicates with C&C via HTTPS.
ImpactT1472Generate Fraudulent Advertising RevenueAndroid/FakeAdBlocker
generates revenue by automatically displaying ads.




Lukas Stefanko
20 Jul 2021 - 02:00PM


SIGN UP TO RECEIVE AN EMAIL UPDATE WHENEVER A NEW ARTICLE IS PUBLISHED IN OUR
UKRAINE CRISIS – DIGITAL SECURITY RESOURCE CENTER

Submit


NEWSLETTER

Submit


SIMILAR ARTICLES

Malware

HOW EMOTET IS CHANGING TACTICS IN RESPONSE TO MICROSOFT’S TIGHTENING OF OFFICE
MACRO SECURITY

ESET Research

SANDWORM USES A NEW VERSION OF ARGUEPATCH TO ATTACK TARGETS IN UKRAINE

ESET Research

WATERING HOLE DEPLOYS NEW MACOS MALWARE, DAZZLESPY, IN ASIA

Malware

VIRUS BULLETIN: OLD MALWARE NEVER DIES – IT JUST GETS MORE TARGETED


DISCUSSION


 * Home
 * About Us
 * Contact Us

 * Sitemap
 * Our Experts
 * ESET

 * Research
 * How To
 * Categories

 * RSS Configurator
 * News Widget

Privacy Policy Legal Information
Copyright © ESET, All Rights Reserved
Back to top

Cookies make a website a better place
We use cookies to give you the best optimized online experience and consistent
information. You can agree to the collection of all cookies by clicking on the
Accept & Close button or adjust your cookies settings by clicking on Manage
Cookies. For more information please see our Cookie Policy.
Accept all and close
Manage cookies
Essential cookies
These cookies allow our website to function properly , and perform actions like
holding your items in your cart or automatically showing content in your
preferred language.
Analytics cookies
These cookies helps us improve our website by understanding how our visitors
interact with websites by collecting and reporting information anonymously.
Marketing cookies
These cookies allow us, to some extent, to track your online activity. This
benefits you as we can limit the number of ads you see by showing only those
that are relevant to you.
Accept and close
Back