this post was submitted on 02 Jun 2024
406 points (89.6% liked)

Technology

60033 readers
2886 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 2 years ago
MODERATORS
top 50 comments
sorted by: hot top controversial new old
[–] [email protected] 221 points 6 months ago (1 children)
[–] [email protected] 161 points 6 months ago (2 children)

Jup. It just says that "the malware was disguised as PDF and QR code readers".

Not helpful, Mashable. Not helpful at all.

[–] [email protected] 55 points 6 months ago (1 children)

In fairness to Mashable, this isn't their fault. The people that made the report didn't make the list public.

[–] [email protected] 88 points 6 months ago (1 children)

Then why is this the subtitle:

The apps identified have since been removed from Google Play, but make sure you didn't install one.

[–] [email protected] 26 points 6 months ago

Because tech journalism is trash on the best days, and these android malapps articles only ever amount to blogspam to make you nervous. I don't think I've seen more than a handful of these articles that actually warns you about the actual apps instead of just talking about the problem without relevant specifics.

load more comments (1 replies)
[–] [email protected] 131 points 6 months ago (1 children)

These articles are useless without a damn list

[–] [email protected] 13 points 6 months ago
[–] [email protected] 130 points 6 months ago* (last edited 6 months ago) (2 children)

Am I just missing it, or is there no list of of these infected apps on the posted article or the reference the article links to. To me, that is the most important information.

[–] [email protected] 43 points 6 months ago (1 children)

It is about halfway down the article, but you have to dodge a few adds to get to that part.

"The two apps mentioned in the report were called "PDF Reader and File Manager" by Tsarka Watchfaces and "QR Reader and File Manager" by risovanul."

[–] [email protected] 42 points 6 months ago

Well, I did miss that, I was skimming for something like a large list or table. That still leaves 86/90+ unlisted.

[–] [email protected] 19 points 6 months ago

Agreed. If this article didn’t contain a way to check the apps, that would be irritating

[–] [email protected] 51 points 6 months ago (22 children)

Aren't apps on android hermetically sealed from other apps and malware. How could this be achieved ?

[–] [email protected] 37 points 6 months ago

Since the other reply was unhelpful: apps are supposed to have limited privileges and isolation from each other, yes... But the whole point of malware like this is that they figure out ways to break those restrictions and get escalated privileged.

You can get more technical detail from reading the report, in this case it looks like the app does not contain malware, but instead requests an update after install that contains the bad code and then breaks the app limitations and scans for the target banking applications and copies the security certificates.

[–] [email protected] 4 points 6 months ago

Yes, the app doesn't steal any information from other apps. The report says the malware just displays a fake bank login page, in the hope the user gives it their details willingly.

load more comments (20 replies)
[–] [email protected] 40 points 6 months ago (7 children)

And this right here is why you use open source apps.

[–] [email protected] 32 points 6 months ago (15 children)

This only would work if you check every line of source code, even the dependencies and build chain, and then build it yourself. See xz utils backdoor or heartbleed, etc.

[–] [email protected] 40 points 6 months ago (2 children)

The whole point is that at some point somebody can check, and you can have a higher level of trust in that than proprietary software.

And if someone does something like this then it has to be disguised as an innocuous bug, like heartbleed, they can't just install full on malware.

It's a different beast entirely.

[–] [email protected] 19 points 6 months ago (4 children)

If we are talking about bigger projects with hundreds of thousands or millions of downloads, than this may be true. But smal scale projects have so few people actively looking through them that even to automatic scan done by the playstore has a higher chance of catching malware. It doesn't even have to be bad intent, two years ago there was a virus propagating trough the Java class files in minecraft mods which reached the PCs of quite a few devs before it was caught.

I don't dislike FOSS, a lot of the apps I use come straight from github, but all this talk about them beeing constantly monitored by third parties is just wishful thinking.

load more comments (4 replies)
[–] [email protected] 8 points 6 months ago

There is no guarantee that the released app is exactly the same as the source code when getting it on Google Play. You'd have to decompile or compile from source and try to compare.

Using F-Droid is good alternative.

[–] [email protected] 9 points 6 months ago (1 children)

The thing is we only know about these vulnerabilities in such great detail because the projects are open source. God knows what kund of vulnerabilities are hidden in closed source software.

[–] [email protected] 5 points 6 months ago (1 children)

Yes, but we don't know what we don't know. There are many problems like that in open source too, and even if we can look nobody does.

Therefore I find it problematic to say that just because you use open source programs you're safe like the parent tried to.

[–] [email protected] 7 points 6 months ago (1 children)

Yes, important to keep in mind that software being open source doesn't automagically make it secure™.

Still, I think it's important to stress that the benefits of open source outweigh the risks when it comes to security (imho).

load more comments (1 replies)
[–] [email protected] 7 points 6 months ago (1 children)

Yes, of course. However, when it's open source, at least somebody is capable of checking those things, even if it is not you. Somebody in the community is capable of doing so.

[–] [email protected] 9 points 6 months ago (2 children)

Yes, that is true, but let's not pretend that just because some one is theoretically able to, that all source code is constantly monitored by 3rd parties.

[–] [email protected] 6 points 6 months ago

Oh, absolutely, that's true. Definitely smaller projects have less audited code, and even bigger projects can have bugs. Heart bleed ring a bell, LOL. However, when open source software has a bug and it is discovered, it is fixed by somebody in record time, whereas in closed source software, you don't know that there is a bug that can be exploited and it definitely won't be fixed until it's reverse engineered or something or exploited.

load more comments (1 replies)
load more comments (12 replies)
load more comments (6 replies)
[–] [email protected] 38 points 6 months ago (3 children)

As somebody who occasionally had to develop for android: the churn of improvements to app security was a huge pita. And as a user I know many of the abandoned apps that I liked that lost compatibility was for that reason.

So the fact that in spite of this pain, Android security still allows apps to do horrible crap like that is infuriating.

[–] [email protected] 22 points 6 months ago (2 children)

If you read the original report, it says that it basically just displays a fake banking login page. It also says that it requested accessibility service permissions, which makes me think maybe it brought up the fake login pages "in the right moment" (as in as users opened their banking apps) to make it more convincing, even though the article doesn't specify that.

Either way, IMO the problem here is clearly with the Play Store allowing this app in, and not with Android's security itself. These apps are misusing the accessibility service system, which is obviously necessary for a ton of important use cases (and of course also requires the user to grant very explicit permission). The fact that the accessibility services are a thing doesn't delegitimize Android's security improvements over the years.

load more comments (2 replies)
[–] [email protected] 8 points 6 months ago (2 children)

The app doesn't contain malware when it's uploaded to the play store. It forced an update after it's installed that contains the malware.

[–] [email protected] 9 points 6 months ago (3 children)

That's not what I mean. I'm not thinking about Play Store security, but Android OS security. Like, your app physically has to ask for permission (or even require the user manually change settings) to do most unsafe things.

load more comments (3 replies)
load more comments (1 replies)
load more comments (1 replies)
[–] [email protected] 30 points 6 months ago

From the actual report:

"Over the past few months, we identified and analyzed more than 90 malicious applications uploaded to the Google Play store. These malware-infected applications have collectively garnered over 5.5 million installs.

Recently, we noticed an increase in instances of the Anatsa malware (a.k.a. TeaBot). "

So not 5.5M installs of this specific malware, FWIW

[–] [email protected] 28 points 6 months ago (1 children)

I got many apps installed. I don't keep in my memory what I have. How do I check that I don't have any from those compromised?

[–] [email protected] 18 points 6 months ago

Go to Settings and search for Google Play Protect. Tap Scan, and if it results in No harmful apps found, you're safe.

[–] [email protected] 15 points 6 months ago

AI probably "wrote" that

[–] [email protected] 13 points 6 months ago

Hello EVERYONE here's a list of 50 unbelieveable products that will change your life and grant you immortality:

[–] [email protected] 12 points 6 months ago

Anatsa uses advanced techniques to avoid >detection and gain access to banking >information.

Anyone who knows what those advanced techniques are?

[–] [email protected] 9 points 6 months ago
[–] [email protected] 6 points 6 months ago (11 children)

Can't steal my bank info if I use cash only...

[–] [email protected] 5 points 6 months ago (5 children)

How though. Over here cash isn't accepted anymore at most places. I only use cash for buying drugs. Most stores and groceries only accept card. Same with bars and clubs. I honestly have no idea besides drugs what to use cash for.

load more comments (5 replies)
load more comments (10 replies)
load more comments
view more: next ›