{"id":6256,"date":"2012-03-06T12:34:19","date_gmt":"2012-03-06T19:34:19","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=6256"},"modified":"2018-01-30T12:21:18","modified_gmt":"2018-01-30T19:21:18","slug":"evolution-of-android-malware-the-touch-the-feel-of-being-tricked-into-sending-premium-sms-messages-the-worst-feeling-of-our-lives-part-3","status":"publish","type":"post","link":"https://www.webroot.com/blog/2012\/03\/06\/evolution-of-android-malware-the-touch-the-feel-of-being-tricked-into-sending-premium-sms-messages-the-worst-feeling-of-our-lives-part-3\/","title":{"rendered":"Evolution of Android Malware \u201cThe touch, the feel of being tricked into sending premium SMS messages, the worst feeling of our lives\u201d (Part 3)"},"content":{"rendered":"<p><strong>by Nathan Collier<\/strong><\/p>\n<p>Android.SMS.FakeInst is a Trojan that aims to do one thing &#8212; trick users into sending premium SMS messages by pretending to be an install for an app.\u00a0 Here&#8217;s how the scam works: The user sends three premium SMS messages in exchange for an app, but there is no guarantee that it will actually install anything after they already have your money.\u00a0 These malicious apps are getting harder and harder to discern as malicious as the look and feel of these apps get better through newer iterations.\u00a0 One variant of these Trojan apps, which\u00a0comes from a known malicious site, looks better with each update.\u00a0 Let&#8217;s start with one of the\u00a0first iterations of this variant.<\/p>\n<p>The icon looks fairly convincing:<\/p>\n<table>\n<col \/>\n<tbody>\n<tr>\n<td><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/03\/1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft size-full wp-image-6258\" title=\"1\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/03\/1.png\" alt=\"\" width=\"73\" height=\"88\" \/><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!--more--><\/p>\n<p>Not very compelling with only simple text asking to agree to download:<\/p>\n<table>\n<col \/>\n<tbody>\n<tr>\n<td><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/03\/2.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft  wp-image-6260\" title=\"Agree to Donwload\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/03\/2.png\" alt=\"\" width=\"230\" height=\"342\" \/><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Here&#8217;s the agreement stating it&#8217;s ok for them to steal from you&#8230; don&#8217;t think it quite works that way in our legal system:<\/p>\n<table>\n<col \/>\n<tbody>\n<tr>\n<td><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/03\/3.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft  wp-image-6261\" title=\"Agreement Disclaimer\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/03\/3.png\" alt=\"\" width=\"230\" height=\"341\" \/><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The first iteration isn&#8217;t too compelling at all.\u00a0 Let&#8217;s look at the next iteration.<\/p>\n<p>Nice looking icon they have here<\/p>\n<table>\n<col \/>\n<tbody>\n<tr>\n<td><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/03\/4.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft size-full wp-image-6262\" title=\"4\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/03\/4.png\" alt=\"\" width=\"57\" height=\"81\" \/><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Oooo, a status bar!\u00a0 This has to be legit, right?<\/p>\n<table>\n<col \/>\n<tbody>\n<tr>\n<td>\n<p style=\"text-align:center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/03\/5.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter  wp-image-6263\" title=\"5\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/03\/5.png\" alt=\"\" width=\"229\" height=\"340\" \/><\/a><\/p>\n<\/td>\n<td><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/03\/6.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter  wp-image-6264\" title=\"6\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/03\/6.png\" alt=\"\" width=\"229\" height=\"338\" \/><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>There&#8217;s that pesky agreement again.<\/p>\n<table>\n<col \/>\n<tbody>\n<tr>\n<td><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/03\/7.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft  wp-image-6265\" title=\"Service Offer Agreement\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/03\/7.png\" alt=\"\" width=\"229\" height=\"339\" \/><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The app was more believable this time.\u00a0 Nice touch with the status bar.\u00a0 On to the last iteration we saw just last month in time for the Beta Google Chrome for Android release.<\/p>\n<p>Say, that icon looks familiar!<\/p>\n<table>\n<col \/>\n<tbody>\n<tr>\n<td><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/03\/8.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-6266\" title=\"8\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/03\/8.png\" alt=\"\" width=\"66\" height=\"76\" \/><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>WOW, looking shrap SMS.FakeInst!<\/p>\n<table>\n<col \/>\n<tbody>\n<tr>\n<td><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/03\/9.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft  wp-image-6267\" title=\"9\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/03\/9.png\" alt=\"\" width=\"227\" height=\"340\" \/><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Even the agreement looks more convincing with that clean looking &#8216;Start&#8217; button<\/p>\n<table>\n<col \/>\n<tbody>\n<tr>\n<td><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/03\/10.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft  wp-image-6259\" title=\"10\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/03\/10.png\" alt=\"\" width=\"228\" height=\"342\" \/><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Each iteration looks better.\u00a0 Nice to see the bad guys have more pride in their work as time goes by.\u00a0 The lesson here is to read the rules and agreements, and if the agreement asks for three payments in the form of premium SMS messages and states that it assumes no liability for damages including loss of profits, it&#8217;s probably not legit.\u00a0 With new variants of these SMS.FakeInst Trojans coming out every other day, and the bad guys hosting their malware on sites that are as convincing as the apps as we discussed in our November blog post, \u201c<a href=\"http:\/\/blog.webroot.com\/2011\/11\/04\/i-dont-think-it-means-what-you-think-it-means-websites-hosting-android-trojans\/\">I don\u2019t think it means what you think it means\u2026<\/a>\u201d, we are working hard to keep you protected, and with <a href=\"https:\/\/market.android.com\/details?id=com.webroot.security&amp;feature=search_result#?t=W251bGwsMSwyLDEsImNvbS53ZWJyb290LnNlY3VyaXR5Il0\">Webroot SecureAnywhere Mobile<\/a> we promise our agreement won&#8217;t ask to you send premium SMS messages.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>by Nathan Collier Android.SMS.FakeInst is a Trojan that aims to do one thing &#8212; trick users into sending premium SMS messages by pretending to be an install for an app.\u00a0 Here&#8217;s how the scam works: The user sends three premium SMS messages in exchange for an app, but there is no guarantee that it will [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[10207,8631,3775,5109,7093,10205,10209,4289,6675,8707,10199,10195,10203,10201,10197,8709,10031,10211,8067,3471],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/6256"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=6256"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/6256\/revisions"}],"predecessor-version":[{"id":23672,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/6256\/revisions\/23672"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=6256"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=6256"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=6256"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=6256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}