Mateusz Slodkowski/SOPA Images/LightRocket via Getty Images
Researchers on Wednesday said they found fake apps in Google Play that masqueraded as legitimate ones for the Signal and Telegram messaging platforms. The malicious apps could pull messages or other sensitive information from legitimate accounts when users took certain actions.
An app with the name Signal Plus Messenger was available on Play for nine months and had been downloaded from Play roughly 100 times before Google took it down last April after being tipped off by security firm ESET. It was also available in the Samsung app store and on signalplus[.]org, a dedicated website mimicking the official Signal.org. An app calling itself FlyGram, meanwhile, was created by the same threat actor and was available through the same three channels. Google removed it from Play in 2021. Both apps remain available in the Samsung store.
Both apps were built on open source code available from Signal and Telegram. Interwoven into that code was an espionage tool tracked as BadBazaar. The Trojan has been linked to a China-aligned hacking group tracked as GREF. BadBazaar has been used previously to target Uyghurs and other Turkic ethnic minorities. The FlyGram malware was also shared in a Uyghur Telegram group, further aligning it to previous targeting by the BadBazaar malware family.
Signal Plus could monitor sent and received messages and contacts if people connected their infected device to their legitimate Signal number, as is normal when someone first installs Signal on their device. Doing so caused the malicious app to send a host of private information to the attacker, including the device IMEI number, phone number, MAC address, operator details, location data, Wi-Fi information, emails for Google accounts, contact list, and a PIN used to transfer texts in the event one was set up by the user.
The following screenshot shows the information in transit from the infected device to the attacker server:
Enlarge/ BadBazaar uploading device information to its C&C server.
ESET
Signal Plus also abused a legitimate Signal feature that links the device running signal to a desktop or iPad so that users can send and receive texts across a wider range of devices. The linking process requires a user to download the desktop or iPad app and, once installed, use it to display a QR code that links to a unique key, such as sgnl://linkdevice?uuid=fV2MLK3P_FLFJ4HOpA&pub_key=1cCVJIyt2uPJK4fWvXt0m6XEBN02qJG7pc%2BmvQa. Signal Plus represents the first known case of an app spying on a victim’s Signal communications by secretly auto-linking the compromised device to the attacker’s Signal device.
ESET researcher Lukas Stefanko wrote:
Signal Plus Messenger can spy on Signal messages by misusing the link device feature. It does this by automatically connecting the compromised device to the attacker’s Signal device. This method of spying is unique, as we haven’t seen this functionality being misused before by other malware, and this is the only method by which the attacker can obtain the content of Signal messages.
BadBazaar, the malware responsible for the spying, bypasses the usual QR code scan and user click process by receiving the necessary URI from its C&C server, and directly triggering the necessary action when the Link device button is clicked. This enables the malware to secretly link the victim’s smartphone to the attacker’s device, allowing them to spy on Signal communications without the victim’s knowledge, as illustrated in Figure 12.
Enlarge/ Mechanism of linking the victim’s Signal communications to the attacker.
ESET
ESET Research has informed Signal’s developers about this loophole. The encrypted messaging service indicated that threat actors can alter the code of any messaging app and promote it in a deceptive or misleading manner. In this case, if the official Signal clients were to display a notification whenever a new device is linked to the account, the fake version could simply disable that code path to bypass the warning and hide any maliciously linked devices. The only way to prevent becoming a victim of a fake Signal—or any other malicious messaging app—is to download only official versions of such apps, only from official channels.
During our research, the server hasn’t returned to the device a URI for linking, indicating this is most likely enabled only for specifically targeted users, based on the data previously sent by the malware to the C&C server.
In a statement, Signal Foundation President Meredith Whittaker wrote:
We’re glad that the Play Store took this pernicious malware masquerading as Signal off their platform, and we hope they do more in the future to prevent predatory scams via their platform.
We’re deeply concerned for anyone who trusted and downloaded this app. We urge Samsung and others to move rapidly to remove this malware.
The discovery of this capability has largely gone unnoticed until now. It underscores the importance of downloading only the legitimate version of Signal and periodically checking Settings > Linked Devices to ensure no unrecognized devices appear.
Unstoppable Private Websites – Ownership for lifetime. Live News Magazine. Own a private website for life with WebFi. Our private servers offer the best in security and performance,and our lifetime license means you'll never have to worry about renewing your hosting again.
Get your own Webfi space to host your website for a single donation that allows you to host your project for life without the need for recurring payments, You only pay for your domain annuities to your domain provider and that's it!LEARN MORE
⚖News Balance🇺🇲
The WEBFI algorithm collects the active news on the Internet and temporarily exposes it on this platform, both in written and video format. WEBFI Network - News Balance Security, does not show advertising in its contents, does not redirect to other sites, and filters any graphic content evaluated as insecure, sensitive, or private. In this way, we ensure that all visitors are informed without distraction and safely. The opinions and content issued on this platform do not necessarily reflect the opinion, philosophy, or vision of WEBFINET.
We strongly believe in freedom of speech.
In a significant development for the autonomous trucking industry, Waabi, an emerging player in self-driving technology, and Uber Freight, the digital freight brokerage division of...
Why is Y Combinator so defensive lately? Y Combinator, one of the most renowned startup accelerators and seed funders in the world, has recently exhibited...
In the ever-evolving world of agriculture, technology is playing an increasingly vital role in streamlining processes and improving efficiency. One area where technology is making...
Agtech, or agricultural technology, has emerged as a rapidly growing industry that is revolutionizing the way farming and food production is conducted. From farm management...
JB Straubel, co-founder and former chief technical officer of Tesla, recently shared insights into his new venture, Redwood Materials, and the importance of maintaining a...
error: WEBFI NETWORK website Protection and Privacy for Publishers. This content may not be copied.
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.