Loapi ! An android malware that will physically hurt your device
Researchers at
Kaspersky Lab have identified a family of modular Android malware dubbed
"Loapi" which is capable of mining the Monero cryptocurrency,
inundating users with advertisements, automatically subscribing the user to
paid services, and participating in DDoS attacks, among other functions. A
surreptitious cryptocurrency miner that's so aggressive it can physically damage
an infected phone.
The cryptocurrency
mining module maintains a load sufficiently high enough to cause physical
damage to a test device after two days the above photo shows a device which
overheated to the point the battery bulged.
Trojan.AndroidOS.Loapi
is hidden inside apps distributed through third-party markets, browser ads, and
SMS-based spam and according to the researchers, the malware is distributed
through advertising campaigns, and is generally disguised as either an
antivirus or pornographic app.
Over the past few
months, a surge of sites and apps have been caught draining people's CPUs
and electricity as they run resource-intensive cryptocurrency mining code. In a
handful of cases, the apps or sites disclose what's happening, throttle down
the mining, and ask users to participate as a form of payment. In the vast
majority of cases, however, the mining is only discovered when users open
monitors that track all processes or apps running on a device.
After installation,
the malware asks the user to grant administrator permissions in a loop until
the permissions are granted. It also checks for but does not use root
permissions.
However, given the modular nature of the malware, this could be
used in the future.
Loapi can
communicate with a number of command & control servers. These servers can
load additional modules and receive lists of apps which may attempt to remove
or limit the permissions granted to the malware. If these apps are installed,
the malware flags the legitimate security app as malware and forces a loop
prompting the user to remove the security app until the user acquiesces.
The malware also
locks the screen and closes the device manager, warning the user that the phone
data will be wiped.
Given the
encumbrances to removing the app on the phone, the best course of action is
likely to uninstall via adb. There is no indication that the malware has been
distributed via Google Play. That said, installing mysterious apps from unknown
sources is not advisable.
Comments
Post a Comment