A newly discovered mobile malware campaign cloaks itself as an Amazon voucher app before using a victim's contact list to spread to new targets. The campaign called "Gazon", discovered by AdaptiveMobile, is touted as "one of the single largest messaging-initiated mobile malware outbreaks" recorded.
The malware sends messages to a victim's contacts laden with malicious links — which when opened, install malware on Android-based mobile devices. Gazon masquerades as an application which offers Amazon discounts and vouchers.
Since its original launch in the USA on 25th February, the campaign has infected thousands of mobile devices in more than 30 countries around the world — including Canada, the UK, France, India, Korea, Mexico, Australia and the Philippines, according to the security team. Gazon has spread through social media like wildfire, generating over 16,000 click-throughs across channels including Facebook and email. However, SMS messaging is the top route for the malware to spread — accounting for over 99 percent of malicious message sending.
"By using the victims' own contacts, the attack exploits peoples' inherent trust when receiving messages from one of their own contacts. The speed with which this was able to spread around the globe shows how attackers are using mobile messaging as one of the most effective methods of distributing malware and achieving rapid global reach," said Simeon Coney, SVP of Security Practice at AdaptiveMobile. "To be able to detect, protect against and remediate from new threats it is critical to undertake constant proactive monitoring and control."
When the fake app is downloaded and opened, users are asked to participate in a survey to access Amazon vouchers. Victims are then required to click-through to other pages and download games from the Google Play store. While a victim is busy clicking, the malware author is earning money — just as the security team have seen with other examples of mobile malware. In addition, the malware is performing another task at the same time — harvesting your contacts and sending a spam message to each of them with the URL pointing to the body of the worm.
The security firm says it has seen over 4,000 infected devices in "all of the major networks" in the US, and has blocked over 200,000 spam messages generated by these devices. When AdaptiveMobile traced back the shortened URL further, it seems the campaign is linked to a Facebook account potentially owned by the malware author — as the same account has also been linked to a now-defunct WhatsApp spam campaign. While the new campaign's URL and account have been disabled, it is worth remembering that links in text messages are often suspect — even if sent by trusted sources.
Earlier cyber security experts have discovered a massive flaw called FREAK that allows attackers to decrypt HTTPS-protected traffic passing between millions of websites worldwide and users of vulnerable devices, including Android and Apple smartphones and tablets.
Earlier, tech firms have discovered a disastrous security flaw called FREAK, stemming from the US government’s requirement of lower encryption standards, that for over a decade left millions of users visiting 'safe' websites exposed to potential attacks.
Axarhöfði 14,
110 Reykjavik, Iceland