{"id":20510,"date":"2017-12-18T10:35:09","date_gmt":"2017-12-18T15:35:09","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=20510"},"modified":"2019-11-15T06:42:55","modified_gmt":"2019-11-15T11:42:55","slug":"loapi-trojan","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/loapi-trojan\/20510\/","title":{"rendered":"Loapi \u2014 this Trojan is hot!"},"content":{"rendered":"<p>Virus writers are creating all sorts of unpleasantness for Android device owners. We all know about the theft of personal data that later turns up on the black market. And about money leaking out of credit cards. But what about a Trojan that can make your device literally go up in smoke? Well, <a href=\"https:\/\/securelist.com\/jack-of-all-trades\/83470\/\" target=\"_blank\" rel=\"noopener noreferrer\">it\u2019s here<\/a>.<\/p>\n<h2>How does jack-of-all-trades Loapi operate<\/h2>\n<p>Users pick up the Loapi Trojan by clicking on an ad banner and downloading a fake AV or adult-content app (the most likely vehicles for this Trojan). After installation, Loapi demands administrator rights \u2014 and it doesn\u2019t take no for an answer; notification after notification appears on the screen until the desperate user finally gives in and taps OK.<\/p>\n<p>If the smartphone owner later tries to deprive the app of administrator rights, the Trojan locks the screen and closes the settings window. And if the user tries to download apps that genuinely protect the device (for example, a real AV, not a fake one), Loapi declares them to be malware and demands their removal. Another notification to that effect pops up endlessly, until the user throws in the towel.<\/p>\n<div id=\"attachment_20513\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/12\/18101729\/loapi-hidden-in-apps.jpeg\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" aria-describedby=\"caption-attachment-20513\" class=\"size-large wp-image-20513\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/12\/18101729\/loapi-hidden-in-apps-1024x536.jpeg\" alt=\"\" width=\"1024\" height=\"536\"><\/a><p id=\"caption-attachment-20513\" class=\"wp-caption-text\">Icons of fake apps in which Loapi conceals itself<\/p><\/div>\n<p>Because of Loapi\u2019s modular structure, it can switch functions on the fly at a remote server\u2019s command, downloading and installing the necessary add-ons all by itself. Let\u2019s take a look at some consequences of an encounter with the new Trojan.<\/p>\n<h3>1. Unwanted ads<\/h3>\n<p>Loapi relentlessly plagues the owner of the infected smartphone with banner and video ads. This module of the Trojan can also download and install other apps, visit links, and open pages in Facebook, Instagram, and VKontakte \u2014 apparently to drive up various ratings.<\/p>\n<h3>2.\u00a0Paid subscriptions<\/h3>\n<p>Another module of the Trojan can sign up users to paid services. Such subscriptions usually need to be confirmed by SMS \u2014 but that doesn\u2019t stop Loapi either. It has yet another special module that sends a text message to the required number, and does so secretly. What\u2019s more, all messages (both outgoing and incoming) are immediately deleted.<\/p>\n<h3>3.\u00a0DDoS attacks<\/h3>\n<p>The Trojan can turn your phone into a zombie and hijack it to use in <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/dos-denial-of-service-attack\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">DDoS attacks<\/a> against Web resources. To do so, it uses a built-in proxy server and sends HTTP requests from the infected device.<\/p>\n<h3>4.\u00a0Cryptomining<\/h3>\n<p>Loapi also uses smartphones to mine Monero tokens. It is this activity that can overheat your device as a result of the prolonged operation of the processor at maximum load. During our research, the battery of the test smartphone overcooked 48 hours after the device was infected.<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/12\/18101727\/loapi-battery-overheat-photo.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-20511\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/12\/18101727\/loapi-battery-overheat-photo.jpg\" alt=\"\" width=\"960\" height=\"600\"><\/a><\/p>\n<h3>5. Downloading new modules<\/h3>\n<p>Now for the most interesting bit. At the command of a remote center, the malware can download new modules \u2014 that is, adapt to any new cash-out strategy its creators develop. For example, one day it might transform into ransomware, spyware, or a banking Trojan. In the code of the current version, our experts discovered functions that have yet to be deployed and are clearly intended for use further down the line.<\/p>\n<h2>How to protect yourself from the Loapi Trojan<\/h2>\n<p>As is often the case, prevention is better than cure. To avoid swallowing the malware bait, observe some simple rules.<\/p>\n<ul>\n<li>Install apps only from official stores. Google Play has a dedicated team responsible for catching mobile malware. Trojans do occasionally infiltrate official stores, but the chances of encountering one there are far lower than on dubious sites.<\/li>\n<li>Disable the installation of apps from unknown sources for added security. To do so, in <em>Settings<\/em> go to <em>Security<\/em> and ensure that the <em>Unknown sources<\/em> check box is not selected.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic\">\n<ul>\n<li>Don\u2019t install what you don\u2019t really need. As a general rule, the fewer applications you install, the more secure your device is.<\/li>\n<li>Get a reliable and proven AV for Android and regularly scan your device with it. Even free applications, such as the basic version of <a href=\"https:\/\/app.appsflyer.com\/com.kms.free?pid=smm&amp;c=ww_kdaily\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Kaspersky Internet Security for Android<\/a>, offer good protection.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The new Loapi Trojan will recruit your smartphone for DDoS attacks, bombard it with ads, or use it to mine cryptocurrency, making it red-hot.<\/p>\n","protected":false},"author":2484,"featured_media":20512,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683],"tags":[105,2640,1058,2792,2756,422,723],"class_list":{"0":"post-20510","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-android","9":"tag-cryptocurrencies","10":"tag-ddos","11":"tag-loapi","12":"tag-miners","13":"tag-threats","14":"tag-trojans"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/loapi-trojan\/20510\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/loapi-trojan\/12017\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/loapi-trojan\/10004\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/loapi-trojan\/14245\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/loapi-trojan\/12461\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/loapi-trojan\/12224\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/loapi-trojan\/15024\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/loapi-trojan\/14846\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/loapi-trojan\/19382\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/loapi-trojan\/4552\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/loapi-trojan\/8690\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/loapi-trojan\/9041\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/loapi-trojan\/19061\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/loapi-trojan\/19228\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/loapi-trojan\/19216\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20510","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=20510"}],"version-history":[{"count":11,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20510\/revisions"}],"predecessor-version":[{"id":29847,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20510\/revisions\/29847"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/20512"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=20510"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=20510"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=20510"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}