Cybersecurity

Agent Smith: The new virus to hit mobile devices

Check Point researchers recently discovered a new variant of mobile malware that has quietly infected around 25 million devices, while the user remains completely unaware. Disguised as a Google-related application, the core part of the malware exploits various known Android vulnerabilities and automatically replaces installed apps on the device with malicious versions without the user’s interaction.

So far, the primary victims are based in India although other Asian countries such as Pakistan and Bangladesh are also impacted, as are even a noticeable number of devices in Australia, the United Kingdom, and the United States.

Dubbed “Agent Smith,” the malware currently uses its broad access to the device’s resources to show fraudulent ads for financial gain. This activity resembles previous campaigns such as Gooligan, Hummingbad, and CopyCat malware and can infect all smartphones updated beyond even Android v.7.

In this case, “Agent Smith” is being used for financial gain through the use of malicious advertisements. However, it could easily be used for far more intrusive and harmful purposes such as banking credential theft and eavesdropping. Indeed, due to its ability to hide its icon from the launcher and impersonate existing user-trusted popular apps, there are endless possibilities for this sort of malware to harm a user’s device.

What does “Agent Smith” do?

Agent Smith has primarily three phases in its attack flow.

In the first phase, the attacker lures users to download a dropper application from an app store such as 9Apps. These droppers are usually disguised as free games, utility applications or adult entertainment applications, yet contain an encrypted malicious payload. The dropper application then checks if any popular applications, such apps including WhatsApp, MXplayer, ShareIt and more from the attacker’s pre-determined list, are installed on the device. If any targeted application is found, “Agent Smith” will then attack those innocent applications at a later stage.

In the second phase, after the dropper gains a foothold on victim device, it automatically decrypts the malicious payload into its original form — an APK (Android installation file) file which serves as the core part of “Agent Smith’s attack. The dropper then abuses several known system vulnerabilities to install the core malware without any user interaction at all.

In the third phase, the core malware conducts attacks against each installed application on the device which appears on its target list. The core malware quietly extracts a given innocent application’s APK file, patches it with extra malicious modules and finally abuses a further set of system vulnerabilities to silently swap the innocent version with a malicious one.

Agent Smith Malware.png
Diagram: “Agent Smith”’s Attack Flow

Lessons learned

As “Agent Smith” was originally downloaded from the widely used third-party app store, 9Apps, targeted mostly at Arab, Indian (Hindi), Indonesian, and Russian speaking users, it is not surprising that it reached such a high infection rate. After all, third-party app stores often lack the security measures required to block adware loaded apps.

With such a devious infection method of replacing existing device apps with the malicious version of those apps, users are reminded that apps should only be downloaded from trusted app stores to mitigate the risk of infection.

Given “Agent Smith’s main approach is to attack user-installed applications from third-party app stores silently, it is very challenging for common Android users to fight against such threats. Having an advanced threat prevention solution such as SandBlast Mobile installed on the device, though, would have detected and blocked the malicious version of these apps from being installed while alerting the user to the suspicious attempted activity.

Within the mobile threat landscape, the best protection against invasive mobile malware attacks like “Agent Smith” is to leverage advanced threat prevention technologies, powered by advanced threat intelligence, combined with a “hygiene-first” approach to protecting your organization’s digital assets.

SandBlast Mobile’s unique security infrastructure, On-device Network Protection, delivers threat prevention capabilities to enterprise mobile devices that were previously only available in network and endpoint security solutions. By inspecting and controlling all network traffic on the device, SandBlast Mobile prevents phishing attacks across all apps, email, SMS, iMessage, and messaging apps. In addition, the solution prevents accessing malicious or restricted websites and infected devices from accessing corporate resources and communicating with botnets. To ensure data and user privacy, SandBlast Mobile validates cellular traffic on the device itself without routing data through a corporate gateway.

Users who have been infected by apps such as those described in “Agent Smith,” here are a few steps to remove the malicious apps.

For Android:

  • Go to Settings Menu
  • Click on Apps or Application Manager
  • Scroll to the suspected app and uninstall it.
  • If it can’t be found then remove all recently installed apps.

For iPhone:

  • Go to Settings Menu
  • Scroll to “Safari”
  • On the list of options, ensure that ‘block pop-ups’ is selected.
  • Then go to ‘Advanced’ -> Website Data.
  • For any unrecognized sites listed, delete this site.

Image from Pixabay

Advertisements

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.