{"id":13542,"date":"2019-06-20T06:01:31","date_gmt":"2019-06-20T10:01:31","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/malicious-camera-app\/13542\/"},"modified":"2019-11-15T15:22:13","modified_gmt":"2019-11-15T11:22:13","slug":"malicious-camera-app","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/malicious-camera-app\/13542\/","title":{"rendered":"A photo editor with a difference"},"content":{"rendered":"<p>Whenever we <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/android-app-security\/18505\/\" rel=\"noopener noreferrer nofollow\">discuss Android security<\/a>, we always recommend downloading apps only from the Google Play Store, as it contains significantly fewer malicious apps than other such sites. Still, developers manage to sneak in malware every now and then. So, how do you avoid picking up something nasty when downloading apps from Google Play? Pay close attention to the permissions requested by the app, and think carefully about why the app needs those permissions before you give it the green (or red) light. Today\u2019s post looks at that very issue: the danger posed by a Google Play app that demands seemingly unnecessary permissions.<\/p>\n<p>Not long ago, we discovered a couple of fairly unhealthy programs in Google Play posing as photo apps. Both apps hung around in the store long enough to chalk up 10,000 downloads each. There was nothing particularly eye-catching about them; they were just two members of the \u201cyet another photo editor\u201d class.<\/p>\n<div id=\"attachment_27393\" style=\"width: 982px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/06\/20140314\/malicious-camera-app-screen1.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-27393\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/06\/20140314\/malicious-camera-app-screen1.png\" alt=\"Two almost identical photo editors, said to be from different developers, secretly set up paid subscriptions\" width=\"972\" height=\"633\" class=\"size-full wp-image-13545\"><\/a><p id=\"caption-attachment-27393\" class=\"wp-caption-text\">Two almost identical photo editors, said to be from different developers, secretly set up paid subscriptions<\/p><\/div>\n<p>The only detail that might have alerted the observant user was that both apps persistently requested access to notifications, and they wouldn\u2019t take no for an answer. All incoming messages appear in notifications, which means that the photo editors, if given permission, could read them. A photo editor has no need for such access \u2014 normally, that\u2019s something used for communicating with a smartwatch. So, why would it request that?<\/p>\n<p>Well, after installation, the putative photo editor collected information (phone number, smartphone model, screen size, mobile operator, etc.) and sent it to the cybercriminals\u2019 server. In response, it received a list of Web addresses pointing (via several redirects) to a paid subscription sign-up page.<\/p>\n<div id=\"attachment_27394\" style=\"width: 982px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/06\/20140336\/malicious-camera-app-screen2.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-27394\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/06\/20140336\/malicious-camera-app-screen2.png\" alt=\"How paid subscription sign-up pages look\" width=\"972\" height=\"1183\" class=\"size-full wp-image-13547\"><\/a><p id=\"caption-attachment-27394\" class=\"wp-caption-text\">How paid subscription sign-up pages look<\/p><\/div>\n<p>You\u2019ve probably come across paid subscriptions at some point \u2014 either in the form of a tune that people hear when they call you and that requires daily payments, or a WAP or SMS mailing that you don\u2019t need but that still empties your mobile account, penny by penny. Carriers in various countries are more or less fond of such paid subscriptions. More often than not, people subscribe to them out of sheer carelessness, not on purpose. Fail to read the fine print and before you know it, you\u2019re paying for a horoscope. Victims usually become aware of such subscriptions only when their mobile phone account runs dry earlier than expected.<\/p>\n<p>In this particular case, the malware\u2019s task is to sign the victim up for the paid content in a way that raises no flags whatsoever. To do so, it disables Wi-Fi and, using mobile data, loads malicious pages in a window unseen by the user. To fill out the required fields (for example, with a phone number), it uses the previously harvested information. If the signup process employs a CAPTCHA, the image is sent to a special service for decoding. And the SMS verification code, if required, is intercepted through access to notifications.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-trial-generic\">\n<h2>How to avoid unwanted subscriptions<\/h2>\n<p>It is difficult to immediately gauge an app\u2019s potential for harm. That said, there are ways to recognize a suspicious app and protect against <em>undocumented features<\/em>.<\/p>\n<ul>\n<li>Carefully review the list of permissions that the program requests. We strongly advise reading our separate <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/android-8-permissions-guide\/23981\/\" rel=\"noopener noreferrer nofollow\">post about Android permissions<\/a>. If an app requests access to potentially dangerous permissions that you consider unnecessary, don\u2019t be afraid to refuse. If it insists, delete it.<\/li>\n<li>Use a robust security solution. For example, <a href=\"https:\/\/me-en.kaspersky.com\/mobile-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____3d7d2c33c4c17a10\" target=\"_blank\" rel=\"noopener\">Kaspersky for Android<\/a> detects \u201csubscription pages\u201d and warns you of the danger.<\/li>\n<li>If your mobile operator offers the option, make such subscriptions impossible by opening a separate \u201ccontent account\u201d or activating a subscription-blocking service.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>How a photo editor app from Google Play secretly signed up users for unwanted paid services.<\/p>\n","protected":false},"author":2506,"featured_media":13543,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1486],"tags":[105,109,1825,521],"class_list":{"0":"post-13542","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-android","9":"tag-apps","10":"tag-permissions","11":"tag-threats"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/malicious-camera-app\/13542\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/malicious-camera-app\/16036\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/malicious-camera-app\/6368\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/malicious-camera-app\/17931\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/malicious-camera-app\/16066\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/malicious-camera-app\/14797\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/malicious-camera-app\/18728\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/malicious-camera-app\/17516\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/malicious-camera-app\/22948\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/malicious-camera-app\/6067\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/malicious-camera-app\/27391\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/malicious-camera-app\/11895\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/malicious-camera-app\/11981\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/malicious-camera-app\/10872\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/malicious-camera-app\/19510\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/malicious-camera-app\/23498\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/malicious-camera-app\/18579\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/malicious-camera-app\/22853\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/malicious-camera-app\/22797\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13542","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2506"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=13542"}],"version-history":[{"count":9,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13542\/revisions"}],"predecessor-version":[{"id":14409,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13542\/revisions\/14409"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/13543"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=13542"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=13542"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=13542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}