{"id":23310,"date":"2024-09-23T06:30:52","date_gmt":"2024-09-23T10:30:52","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=23310"},"modified":"2024-09-24T15:26:58","modified_gmt":"2024-09-24T11:26:58","slug":"necro-infects-android-users","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/necro-infects-android-users\/23310\/","title":{"rendered":"How the Necro Trojan attacked 11 million Android users"},"content":{"rendered":"<p>Here at Kaspersky Daily we\u2019re forever <a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/google-play\/\" target=\"_blank\" rel=\"noopener nofollow\">urging<\/a> readers of our blog to be real careful when downloading content to their devices. After all, even <a href=\"https:\/\/www.kaspersky.com\/blog\/malware-in-google-play-2023\/49579\/\" target=\"_blank\" rel=\"noopener nofollow\">Google Play isn\u2019t immune to malware<\/a> \u2014 let alone unofficial sources with mods and hacked versions. For as long as the digital world keeps turning, Trojans will continue to worm their way onto devices that don\u2019t have <a href=\"https:\/\/me-en.kaspersky.com\/mobile-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____3d7d2c33c4c17a10\" target=\"_blank\" rel=\"noopener\">reliable protection<\/a>.<\/p>\n<p>Today we tell the story of how 11 million Android users worldwide may have fallen victim to the Necro Trojan. Read on to learn which apps we found it in \u2014 and how to protect yourself.\n<\/p>\n<h2>What is Necro<\/h2>\n<p>\nOur regular readers may recall reading about Necro when we first <a href=\"https:\/\/www.kaspersky.com\/blog\/camscanner-malicious-android-app\/28156\/\" target=\"_blank\" rel=\"noopener nofollow\">wrote<\/a> about it back in 2019. Back then, our experts discovered a Trojan in CamScanner, a text recognition app, which had clocked up over 100 million downloads on Google Play. Now the \u201cnecromancers\u201d have injected new blood into the old Trojan: we found a version richer in features both in popular apps on Google Play and in various app mods on unofficial sites. Most likely, the developers of these apps used an unverified ad integration tool through which Necro infiltrated the code.<\/p>\n<p>Today\u2019s Necro is a <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/downloader\/\" target=\"_blank\" rel=\"noopener\">loader<\/a> <a href=\"https:\/\/en.wikipedia.org\/wiki\/Obfuscation_(software)\" target=\"_blank\" rel=\"nofollow noopener\">obfuscated<\/a> to avoid detection (but that didn\u2019t stop us from finding it). It downloads the malicious payload in no less a crafty way using <a href=\"https:\/\/www.kaspersky.com\/blog\/digital-steganography\/27474\/\" target=\"_blank\" rel=\"noopener nofollow\">steganography<\/a> to hide its code in a seemingly harmless image.<\/p>\n<p>And downloaded malicious modules are able to load and run any <a href=\"https:\/\/en.wikipedia.org\/wiki\/Dalvik_(software)\" target=\"_blank\" rel=\"nofollow noopener\">DEX<\/a> files (compiled code written for Android), install downloaded apps, tunnel through the victim\u2019s device, and even \u2014 potentially \u2014 take out paid subscriptions. In addition, they can display and interact with ads in invisible windows, as well as open arbitrary links and run any JavaScript code.<\/p>\n<p>Read more about how Necro is designed and how it operates on our <a href=\"https:\/\/securelist.com\/necro-trojan-is-back-on-google-play\/\" target=\"_blank\" rel=\"noopener\">Securelist blog<\/a>.\n<\/p>\n<h2>Where Necro hides<\/h2>\n<p>\nWe found traces of the malware in a user-modded version of Spotify, in the photo editing app Wuta Camera, in Max Browser, and in mods for both WhatsApp and popular games (including Minecraft).\n<\/p>\n<h3>In modded Spotify<\/h3>\n<p>\nAt the very start of our investigation, our eye was caught by an unusual modification of the Spotify Plus app. Users were invited to download a new version of their favorite app from an unofficial source \u2014 for free and with an unlocked subscription offering unlimited listening, both online and off. The nice green <em>Download Spotify MOD APK<\/em> button looks so tempting, right? Stop! It\u2019s malware. Never mind the <em>Security Verified<\/em> and <em>Official Certification<\/em> guarantees; this app will wreak havoc.<\/p>\n<div id=\"attachment_52205\" style=\"width: 1272px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/09\/23143316\/necro-infects-android-users-01.jpeg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-52205\" class=\"size-full wp-image-52205\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/09\/23143316\/necro-infects-android-users-01.jpeg\" alt=\"Well I never, all versions are viewable. Could Necro or other Trojans be lurking there too?\" width=\"1262\" height=\"976\"><\/a><p id=\"caption-attachment-52205\" class=\"wp-caption-text\">Well I never, all versions are viewable. Could Necro or other Trojans be lurking there too?<\/p><\/div>\n<p>When this app was launched, the Trojan sent information about the infected device to the attackers\u2019 C2 server, and in response got a link to download a PNG image. The <a href=\"https:\/\/securelist.com\/necro-trojan-is-back-on-google-play\/\" target=\"_blank\" rel=\"noopener\">malicious payload was hidden<\/a> in this image by means of steganography.\n<\/p>\n<h3>In apps on Google Play<\/h3>\n<p>\nWhile the Spotify mod was distributed through unofficial channels, the Necro-infected Wuta Camera found its way onto Google Play, from where the app was downloaded more than 10 million times. According to our data, the Necro loader penetrated version 6.3.2.148 of Wuta Camera, with clean versions starting from 6.3.7.138. So, if your version is lower than that, you need to update immediately.<\/p>\n<div id=\"attachment_52204\" style=\"width: 1439px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/09\/23143342\/necro-infects-android-users-02.jpeg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-52204\" class=\"size-full wp-image-52204\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/09\/23143342\/necro-infects-android-users-02.jpeg\" alt=\"The impressive download count and decent ratings masked a Trojan\" width=\"1429\" height=\"1139\"><\/a><p id=\"caption-attachment-52204\" class=\"wp-caption-text\">The impressive download count and decent ratings masked a Trojan<\/p><\/div>\n<p>Max Browser\u2019s audience is much smaller \u2014 just one million users. Necro infiltrated its app code in version 1.2.0. The app was removed from Google Play following our notification, but it\u2019s still available on third-party resources. These, of course, should be trusted even less, since trojanized versions of the browser may still live there.\n<\/p>\n<h3>In mods for WhatsApp, Minecraft, and other popular apps<\/h3>\n<p>\nAlternative messenger clients usually boast more features than their official cousins. But you should treat all mods, be they on Google Play or a third-party site, <a href=\"https:\/\/www.kaspersky.com\/blog\/telegram-signal-malware-in-google-play\/48937\/\" target=\"_blank\" rel=\"noopener nofollow\">as suspicious<\/a>, for they often come <a href=\"https:\/\/www.kaspersky.com\/blog\/whatsapp-mods-canesspy\/49656\/\" target=\"_blank\" rel=\"noopener nofollow\">bundled with Trojans<\/a>.<\/p>\n<p>For instance, we found mods for WhatsApp with the Necro loader being distributed from unofficial sources, as well as mods for Minecraft, Stumble Guys, Car Parking Multiplayer, and Melon Sandbox. And this selection sure isn\u2019t random \u2014 attackers always target the <a href=\"https:\/\/www.kaspersky.com\/blog\/how-scammers-attack-young-gamers-2024\/52099\/#:~:text=Attackers%20love%20Minecraft\" target=\"_blank\" rel=\"noopener nofollow\">most popular games and apps<\/a>.\n<\/p>\n<h2>How to guard against Necro<\/h2>\n<p>\nFirst of all, we strongly <a href=\"https:\/\/www.kaspersky.com\/blog\/unknown-apps-android\/41656\/\" target=\"_blank\" rel=\"noopener nofollow\">advise against downloading apps from unofficial sources<\/a> because the risk of device infection is extremely high. Secondly, apps on Google Play and other official platforms should also be treated with a healthy dose of skepticism. Even a popular app like Wuta Camera, with 10 million downloads, proved powerless in the face of Necro.\n<\/p>\n<ul>\n<li>\n<strong>Make sure to <a href=\"https:\/\/me-en.kaspersky.com\/mobile-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____3d7d2c33c4c17a10\" target=\"_blank\" rel=\"noopener\">protect<\/a><\/strong><strong>\u00a0your devices<\/strong> so as not to be caught off guard by a Trojan. <a href=\"https:\/\/me-en.kaspersky.com\/mobile-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____3d7d2c33c4c17a10\" target=\"_blank\" rel=\"noopener\">Kaspersky for Android<\/a>\u00a0detects Necro and other similar malware.<\/li>\n<li>\n<strong>Check the app page in the store before downloading.<\/strong> We particularly recommend looking at reviews with low ratings, as these generally give heads-up about potential pitfalls. Rave reviews could be fake, while a high overall score is easy to inflate.<\/li>\n<li>\n<strong>Don\u2019t look for mods or hacked versions. <\/strong>Such apps are almost always stuffed with all kinds of Trojans: from the most harmless to mobile spyware like <a href=\"https:\/\/www.kaspersky.com\/blog\/whatsapp-mods-canesspy\/49656\/#:~:text=Trojan%2DSpy.AndroidOS.CanesSpy\" target=\"_blank\" rel=\"noopener nofollow\">CanesSpy<\/a><strong>.<\/strong>\n<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic-3\">\n","protected":false},"excerpt":{"rendered":"<p>At risk are users of modified versions of Spotify, WhatsApp, Minecraft, and other apps from Google Play.<\/p>\n","protected":false},"author":2739,"featured_media":23312,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1486],"tags":[105,183,97,738,692],"class_list":{"0":"post-23310","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-android","9":"tag-google-play","10":"tag-security-2","11":"tag-surveillance","12":"tag-trojans"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/necro-infects-android-users\/23310\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/necro-infects-android-users\/28045\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/necro-infects-android-users\/12082\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/necro-infects-android-users\/28199\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/necro-infects-android-users\/27720\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/necro-infects-android-users\/30445\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/necro-infects-android-users\/29209\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/necro-infects-android-users\/38274\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/necro-infects-android-users\/12842\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/necro-infects-android-users\/52201\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/necro-infects-android-users\/22245\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/necro-infects-android-users\/31661\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/necro-infects-android-users\/37250\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/necro-infects-android-users\/28308\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/necro-infects-android-users\/34130\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/necro-infects-android-users\/33785\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23310","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2739"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=23310"}],"version-history":[{"count":6,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23310\/revisions"}],"predecessor-version":[{"id":23318,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23310\/revisions\/23318"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/23312"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=23310"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=23310"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=23310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}