Check Point researchers have discovered a virus that can fool Google’s anti-malware control systems and enter the Play Store
Android users are once again in the crosshairs of hackers. This is what Check Point, a well-known Israeli company expert in computer security, has discovered. A malware, called Expensive Wall, has infected some apps in the Google Play Store, which have been downloaded millions of times by the victims before being removed.
According to Check Point’s report, the authors, using sophisticated techniques, have been able to bypass the strict security controls of the official market and hide the malicious code inside the apps. It would seem that in total the virus has been found on at least 50 apps, including “Lovely Wallpaper”. As the researchers suggest, Expensive Wall is an evolved variant of another malware, also found in Google’s store, that was sending SMS and subscriptions on behalf of victims. Expensive Wall strikes in exactly the same way, charging users with costs.
How Expensive Wall affects you
As we have seen, unlike the first version, Expensive Wall stands out due to its ability to infiltrate the Play Store undetected. Right after downloading the fraudulent app, the malware asks victims to get certain permissions. The virus is mainly interested in getting the green light to access the Internet and SMS messages, which are used to subscribe to paid services, thus stealing credit from the victims. The virus code basically makes purchases in the app once all permissions are acquired, without the infected person knowing anything about it.
The purpose of the malware
The purpose of the malware is to allow its authors to make easy money. Expensive Wall, in fact, registers users to non-existent subscription services and sends messages that are always paid for. All this without the victims’ knowledge. According to Check Point’s report, the obfuscation technique employed by the malware could be used to target Android users with even more devious viruses that not only generate profit, but also spy on infected smartphones, capturing images, audio and other personal data.
The case uncovered by Check Point shows how important it is to read the terms of use carefully before downloading apps.