New Android Malware Is Spreading Through Third-Party App Markets

Security researchers at ESET have discovered a new strain of Android malware that is distributed through the unofficial app markets.

The company took a special interest in Krysanec Remote Access Tool (RAT) after it realised that cyber criminals had the nerve to ship malicious code on top of ESET’s own mobile security app.

What makes Krysanec particularly insidious is it still allows for full functionality of the host application, so the victims do not suspect there was something wrong with their download.

False pretenses

According to ESET, Android/Spy.Krysanec gives the attacker full access to the infected device. It enables them to take photos, record audio through the microphone, access current GPS location, list of installed applications, browser history and call history. The RAT can also send SMS, including to premium numbers which could have been set up by cyber criminals in advance.

Android-Spy.Krysanec-control-panelKrysanec has been spotted piggybacking on top of popular applications like 3G Traffic Guard and the mobile banking app for Sberbank, the largest bank in Russia and third largest in Europe.

So far, ‘carrier’ apps have only been spotted on unofficial markets: ESET says Google Play Store is safe thanks to the work of Google Bouncer, an automatic system that constantly scans both new and existing apps. Meanwhile, countless third-party websites blatantly ignore any safety recommendations especially those that offer pirated Android software.

“Interestingly, some of the samples that we analysed connected to a C&C server hosted on a domain belonging to the dynamic DNS provider no-ip.com,” wrote Robert Lipovsky, malware researcher at ESET.

No-IP was in the news recently when Microsoft’s Digital Crimes Unit took over 22 of the company’s domains that were used to distribute malware. Microsoft, however, subsequently dropped the case.

“While remote-access-tools for Android are less common than their Windows desktop counterparts, the main message here is to stress that users should download not only our ESET Mobile Security but any application only from trustworthy sources, such as the official Google Play store. And even there, exercise caution by carefully examining the permissions requested by the app.”

Do you know your famous hackers? Take our quiz!

Max Smolaks

Max 'Beast from the East' Smolaks covers open source, public sector, startups and technology of the future at TechWeekEurope. If you find him looking lost on the streets of London, feed him coffee and sugar.

Recent Posts

Napster Sold And Will Return As Interactive Streaming Service

New chapter for famous name from Internet's early days, Napster, has been acquired and will…

6 hours ago

UK Proposes To Allow Satellites To Resolve UK Mobile Not-Spots

Solving not-spots? Ofcom proposal to make UK the first European country to allow ordinary smartphones…

7 hours ago

Waymo Confirms Washington DC Robotaxi Plan For 2026

Pioneering robotaxi service from Alphabet's Waymo to go live in Washington DC next year, as…

8 hours ago

US Adds 50 Chinese Firms To AI, Chip Blacklist

Dozens of Chinese firms added to US export blacklist, in order to hamper Beijing's AI…

10 hours ago

Tesla Europe Sales Plummet, As Owners Return EVs At Record Levels

Chinese rival BYD overtakes global revenues of Elon Musk's Tesla, as record number of Tesla…

12 hours ago

Signal App In Spotlight Amid Secret Chat Controversy Of US Officials

Messaging app Signal in the headlines after a journalist was invited to a top secret…

14 hours ago