Detected some "clickers" in Google Play simulating apps and games
Since December, a developer has been uploading apps to Google Play, with the only intention of booting with the device and make GET requests in the background. Promising different kind of apps (from remote controls and X video searchers to flight simulators and games) these apps sum up to 50.000 downloads between all of the 32 apps we have spotted. Obviously not all the downloads translate into an infection (VerifyApps and other factor may affect) but they seem to be quite popular.


It worked in a more sophisticated way than the others.
What the app does
When it starts, it always shows a dialog with the text "Application is not compatible" in Italian, Turkish and Spanish, between other languages.


Other variants connect to other URLs like this one:
Or this, depending on the sample: hxxp://pop.oin.systems/commands.php.
Every time a new request is made, the apps get instructions on where to go and click. In every connection they get new domains to connect to.


Most of them are porn sites Indiscriminate visits will be done through a service that builds a WindowManager with a weight and height of "-2" so the user is not able to actually see it in the screen, where a WebView is added. There is where the URLs are loaded.
It will take some other values from some other URL. Every 15 seconds (time to load the web) it will call:
Another task will take care of executing this JavaScript over the loaded URLs. This will result in random clicks on the web.
This strategy of hiding the icon, avoids the user to even bothering in uninstalling an app, because he will think it was never installed in the first place. Moreover, if it keeps quiet until next reboot or when connectivity changes, there are more chances of the user forgetting about it.
Permissions are not very blatant.

Detection
The app was not deteced by any engine during December and January. January 20th we sent it (for the first time) to VirusTotal from ElevenPaths' lab.

Eventually in February, some engines started detecting it. Engines have created a specific signature for this family, called Riskware.Clicker.

The attacker
This is a typical schema, but quite witty in its implementation. We have detected that the attacker has been acting since later December and that he probably is Turkish ( thanks to the information obtained from its ad-hoc certificate). Its current timezone is GMT+2, added to the language used in some apps, makes us think that it's someone developing from Turkey, although with some Italian relationship. Some other specific characteristics has allowed us to spot the other apps very quickly.
The strategy has been the usual one. During most of the time, the app starts in Google Play like an anodyne app. It consolidates in the market and maybe someone downloads it. For the next version, the apps mutate into something more attractive to the user, maybe it changes the code, maybe the icons and description. In this moment a "race" starts, because Google will remove it quickly but it will try to get the more the better installations.

and then mutated into a fake Talking Tom (down in Path5)

