• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

Malware disguised as Pokemon Go Help in Android App

September 18, 2016 by Noah J Berson 6 Comments

Sometimes aspiring Pokemon masters want that extra edge to their game and go looking for guides on how to play the game better. Looking in the Google Play Store may have led the players astray as one guide was secretly malware. Kaspersky was able to detect a trojan inside the app but said that multiple defenses made it difficult to reverse engineer to see how it fully works. One defense is that it delays any bad activity by two hours to try to thwart those who are trying to see what it can do. It also doesn’t do anything bad until it receives a respond from the server that is calling the shots. Once its determined its a desireable victim, it downloads files to attempt to root the phone and then grant itself root access. The Play Store reports half a million installs but Kaspersky claims they have only confirmed 6,000 infections live right now. Luckily the worst thing the app has done so far is install its own ads to make money.

 

The hacker may continue to publish under other psuedonyms for the next big gaming craze that might hit app stores. It is also worrying that hackers are trying to implement anti-virtual machine technology making it harder to create a testing environment that you can reset if things go wrong.

 

http://news.softpedia.com/news/rogue-pokemon-app-roots-and-hijacks-android-devices-508310.shtml

https://blog.kaspersky.com/pokemon-go-malware/12953/

Filed Under: Week 04: Vulnerability Scanning Tagged With:

Reader Interactions

Comments

  1. Ahmed A. Alkaysi says

    September 19, 2016 at 11:17 am

    I am actually surprised that only 6,000 infections are “live” even though the app has only a half million installs. It is very interesting and scary to hear that the malware is smart enough to not activate itself and do anything detrimental until it is “calling the shots” and 2 hrs have passed. One has to wonder what other malware is hidden in the android playstore.

    Log in to Reply
    • Noah J Berson says

      September 20, 2016 at 9:43 pm

      The 6,000 is the number they were able to record. The biggest android anti-virus apps probably don’t have the huge a base as many people don’t even consider it an issue on phones yet. This is probably what keeps their number low for detection. When malware is successful, imitators always spring up and try to follow them. There are already reports of similar apps from other developers in the Play Store. I think sleeping malware is an old technique as there are some famous viruses that don’t do anything until a specific date.

      Log in to Reply
  2. Wade Mackey says

    September 20, 2016 at 1:33 am

    We do not cover it in this class, but there is a whole discipline of reverse engineering malware. We will talk very briefly about some anti-forensics techniques in the second semester, but it is a technical subject that requires a lot time and study. It also helps to have experience as an assembly language developer.

    Wade

    Log in to Reply
  3. Mengxue Ni says

    September 20, 2016 at 6:14 pm

    I played Pokemon Go for a while, and I downloaded another app that could help me to find the exact position and Pokemon. I think I read another article coupe days ago, it also mentioned Pokemon Go was a major game that hackers used to spread malware. It is a very popular game now, and players all want to get better Pokemons. Therefore, a lot of them will ignore the danger of malware. It is really hard to protect us from this kind of attractions .

    Log in to Reply
    • Noah J Berson says

      September 20, 2016 at 9:47 pm

      There are a few ways to try to stay safe with apps so you can keep catching Pokemon (there are a lot around campus). Do not “sideload” apps onto your device and keep debug mode off. Don’t download apps that are fairly new as Google and Apple do catch them eventually. Deny permissions to apps that request extra access that what you know they should need. The safety added by antivirus on the phone is questionable but they may work too.

      Log in to Reply
  4. Mengqi He says

    September 21, 2016 at 7:34 pm

    I also played Pokemon GO for some time. I was surprised by people’s craze on catching Pokemons. That may be why people downloaded the guide app. To me, the icon of the guide app looks simple,unsophisticated, and even a little suspect. It seems that it was developed by a small company. I usually don’t download apps with wired icons and user interfaces because it means dangers. Although a sophisticated icon does not mean the app is safe, but as least it means the company sends time to design the icon, while attackers usually don’t spend time on that. However, it is also true that attractive icons sometimes are traps to attract victims. Therefore, we have to be careful all the time.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in