{"id":12953,"date":"2016-09-14T09:31:31","date_gmt":"2016-09-14T13:31:31","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=12953"},"modified":"2019-11-15T06:53:34","modified_gmt":"2019-11-15T11:53:34","slug":"pokemon-go-malware","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/pokemon-go-malware\/12953\/","title":{"rendered":"Guide for Pok\u00e9mon Go Trojan catches Pok\u00e9mon trainers"},"content":{"rendered":"<p>Less than three months after Pok\u00e9mon Go launched, criminals sneaked malware into Google Play to target Pok\u00e9mon trainers. Our experts <a href=\"https:\/\/securelist.com\/blog\/mobile\/76081\/rooting-pokemons-in-google-play-store\/\" target=\"_blank\" rel=\"noopener noreferrer\">discovered the Trojan<\/a> several days ago and immediately reported it to Google. Unfortunately, by that time, the malicious app called Guide for Pok\u00e9mon Go had already been downloaded more than 500,000 times.<\/p>\n<p>In the past few months almost 6 million people gave Pok\u00e9mon Go a try. It\u2019s no wonder that the massively popular game quickly <a href=\"https:\/\/www.kaspersky.com\/blog\/gotta-catch-em-all-with-caution\/12564\/\" target=\"_blank\" rel=\"noopener nofollow\">caught the attention of cybercriminals<\/a>: The first malware for Pok\u00e9mon Go was traced <a href=\"https:\/\/threatpost.com\/malicious-pokemon-go-app-installs-backdoor-on-android-devices\/119174\/\" target=\"_blank\" rel=\"noopener nofollow\">in July<\/a>, soon after the launch of the game. At that time, the situation was not so dangerous. The Trojan was stored in a malicious file vault and waited to be spread online. But now we have quite a different story.<\/p>\n<p>This new Trojan was discovered on Google Play. Like a professional rogue, it masterfully hid itself from security experts and chose victims carefully. To those \u201cchosen\u201d ones, it showed ads \u2014 a lot of ads. It also rooted their devices and installed a bunch of other malicious files and unwanted apps.<\/p>\n<h3>How does it work?<\/h3>\n<p>To hide the malware from antivirus scanners, the Trojan\u2019s executable files were compressed with a commercial <a href=\"https:\/\/en.wikipedia.org\/wiki\/executable_compression\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">software packer<\/a>. Decompressed files included useful Pok\u00e9mon Go content (the Trojan\u2019s disguise) and a small module with <a href=\"https:\/\/en.wikipedia.org\/wiki\/obfuscation_(software)\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">obfuscated<\/a> code.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/09\/06021607\/pokemon-go-trojan-screenshot-1.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-12955\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/09\/06021607\/pokemon-go-trojan-screenshot-1.png\" alt=\"A Pok\u00e9mon Go Trojan in Google Play\" width=\"1247\" height=\"947\"><\/a><\/p>\n<p>After a user installed Guide for Pok\u00e9mon Go, the malware waited silently for some time. This break was quite deliberate: The malware needed to learn whether it was on a real device or a <a href=\"https:\/\/en.wikipedia.org\/wiki\/virtual_machine\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">virtual machine<\/a> \u2014 an emulated computer system security experts use to check how suspicious apps behave in different conditions.<\/p>\n<p>Having confirmed it was on a real device, the Trojan sent a message to a <a href=\"https:\/\/en.wikipedia.org\/wiki\/command_and_control_(malware)\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">command-and-control server<\/a> run by cybercriminals. The report included information about the infected device: model, OS version, country, default language, and more.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/09\/06021606\/pokemon-go-trojan-screenshot-2.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-12956\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/09\/06021606\/pokemon-go-trojan-screenshot-2.png\" alt=\"A Pok\u00e9mon Go Trojan in Google Play\" width=\"1223\" height=\"931\"><\/a><\/p>\n<p>The server analyzed the information, decided if the victim suited its needs, and informed the Trojan of its decision. With the server\u2019s permission, Guide for Pok\u00e9mon Go downloaded additional malicious files (their code also obfuscated). These files were the Trojan\u2019s heavy weaponry; they let it use a number of vulnerabilities discovered from 2012 to 2015.<\/p>\n<p>The armed malware rooted the system, silently installed additional apps, and flooded the phone with ads.<\/p>\n<h3>Just ads? Is that really dangerous?<\/h3>\n<p>Advertisements are rarely pleasant. Besides, it\u2019s one thing to watch ads from Google \u2014 that\u2019s one way you pay for its \u201cfree\u201d services. It\u2019s quite another thing when criminals infect your phone with malware to display banners all the time.<\/p>\n<p>However, the worst part of this infection is hidden: Guide for Pok\u00e9mon Go can secretly install <em>any<\/em> apps on your device. For now, criminals have chosen a relatively mild way to earn money: ads. Tomorrow, they may decide to increase their income by locking your device and demanding ransom \u2014 or stealing money from your bank account.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Why you shouldn\u2019t trust the reviews and ratings on <a href=\"https:\/\/twitter.com\/hashtag\/Google?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Google<\/a> Play <a href=\"https:\/\/t.co\/aMdYbh3T1F\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/aMdYbh3T1F<\/a> <a href=\"https:\/\/t.co\/n8QmQtAElm\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/n8QmQtAElm<\/a><\/p>\n<p>\u2014 Eugene Kaspersky (@e_kaspersky) <a href=\"https:\/\/twitter.com\/e_kaspersky\/status\/771360767547277316?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">September 1, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Though the Trojan has been removed from Google Play, half a million people downloaded it. We know for sure that the Trojan infected devices in Russia, India, and Indonesia. But it targets users from English-speaking regions as well, and there are certainly more victims around the world.<\/p>\n<h3>How to protect yourself<\/h3>\n<p>If you are concerned that your device might be infected with this Trojan, remove the malicious app and scan your device with <a href=\"https:\/\/app.appsflyer.com\/com.kms.free?pid=smm&amp;c=ww_kdaily\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Kaspersky Antivirus &amp; Security for Android<\/a>. It\u2019s free. Our security solutions detect the Trojan as HEUR:Trojan.AndroidOS.Ztorg.ad.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>While you catch #pokemons, cybercriminals try to catch you on #GooglePlay<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fj6KS&amp;text=While+you+catch+%23pokemons%2C+cybercriminals+try+to+catch+you+on+%23GooglePlay\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>To protect yourself in the future, follow these rules:<\/p>\n<p>1. Keep in mind that even if you download apps only from official stores, nothing is 100% secure. Criminals sometimes bypass the protections of Google and other companies \u2014 Guide for Pok\u00e9mon Go is a good example.<\/p>\n<p>2. Promptly install security patches on your smartphone (and your computer, too). Cybercriminals pounce on vulnerabilities in both mobile and desktop OSes.<\/p>\n<p>3. Remember that reviews and ratings on Google Play are not necessarily reliable \u2014 criminals can <a href=\"https:\/\/www.kaspersky.com\/blog\/dont-believe-google-play-ratings\/12882\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">fake them<\/a> using special malware. For example, Guide for Pok\u00e9mon Go malware had four stars on Google Play.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We discovered a Pok\u00e9mon Go Trojan in Google Play. It had already been downloaded 500,000 times.<\/p>\n","protected":false},"author":522,"featured_media":12954,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2683],"tags":[105,109,22,36,423,1445,1703,45,723],"class_list":{"0":"post-12953","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-android","10":"tag-apps","11":"tag-google","12":"tag-malware-2","13":"tag-mobile-devices","14":"tag-play-store","15":"tag-pokemon-go","16":"tag-smartphones","17":"tag-trojans"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/pokemon-go-malware\/12953\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/pokemon-go-malware\/5567\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/pokemon-go-malware\/3892\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/pokemon-go-malware\/7648\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/pokemon-go-malware\/7649\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/pokemon-go-malware\/7671\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/pokemon-go-malware\/9095\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/pokemon-go-malware\/8938\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/pokemon-go-malware\/13044\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/pokemon-go-malware\/2414\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/pokemon-go-malware\/6063\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/pokemon-go-malware\/6543\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/pokemon-go-malware\/5388\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/pokemon-go-malware\/8703\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/pokemon-go-malware\/12577\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/pokemon-go-malware\/13044\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/pokemon-go-malware\/12953\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/pokemon-go-malware\/12953\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12953","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/522"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=12953"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12953\/revisions"}],"predecessor-version":[{"id":30154,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12953\/revisions\/30154"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/12954"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=12953"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=12953"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=12953"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}