{"id":21087,"date":"2018-02-08T09:14:36","date_gmt":"2018-02-08T14:14:36","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=21087"},"modified":"2019-11-15T06:41:39","modified_gmt":"2019-11-15T11:41:39","slug":"porn-related-android-threats","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/porn-related-android-threats\/21087\/","title":{"rendered":"Mobile malware masked as porn apps"},"content":{"rendered":"<p>A top safety tip for Android users is to <a href=\"https:\/\/www.kaspersky.com\/blog\/android-app-security\/18718\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">install apps only from the official store<\/a>. However, there are times when this advice is difficult or even impossible to heed. For example, when it comes to porn, such content is (unsurprisingly) barred from Google Play. Aficionados have to seek out third-party sites for that \u2014 and, of course, those sites are populated by scammers.<\/p>\n<p>Our researchers studied various \u201c18+\u201d mobile threats. Their detailed report is available <a href=\"https:\/\/www.kaspersky.com\/blog\/porn-themed-threats-report\/20891\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">here<\/a>; this article presents a summary of the most salient points.<\/p>\n<h2>The wrong kind of porn<\/h2>\n<p>Cybercriminals are well-armed when it comes to targeting fans of adult content. They disguise malware as XXX collections and special porn players, add malicious features to official apps from known porn sites, and even set up their own porn portals to spread their dangerous wares. They often promote their creations by hacking or malvertising on legal porn sites, as <a href=\"https:\/\/www.kaspersky.com\/blog\/pornhub-malvertising\/18988\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">in the case of PornHub last fall<\/a>.<\/p>\n<p>Android-based malware that exploits this hot topic has become incredibly popular: In the past year a quarter of all attacks on mobile devices came from porn-related malware. Interestingly, desktop computers are attacked by such malware far less often \u2014 criminals <a href=\"http:\/\/www.vocativ.com\/343392\/porn-mobile-first\/index.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">are following porn<\/a> into the mobile space.<br>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-porno-try\"><\/p>\n<h3>Mom told you so<\/h3>\n<p>The consequences of porn malware can be nasty or very nasty.<\/p>\n<p>If the victim is \u201clucky,\u201d they will get hit by an ad clicker. These pests account for about half of all attacks. Victim\u2019s smartphone battery indicator will start dropping noticeably, and the device will gobble up gigabytes of mobile Internet traffic (during the study, one piece of malware \u201cclicked\u201d on 100 megabytes\u2019 worth of ads just in several hours). WAP and SMS hacks are in roughly the same weight category: Users are unwittingly signed up for paid services or content, with SMS confirmations deleted for good measure, or calls are made to paid numbers.<\/p>\n<p>Losing money from a mobile account is actually getting off relatively unscathed \u2014 far worse beasts lurk in the Android malware zoo, and they collectively account for the other half of porn-related attacks. For example, a <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/banker-trojan-banker\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener\">Trojan banker<\/a> disguised as an alluring app can steal your login and password and clean out your bank account, and Trojan ransomware will block your device and demand a ransom.<\/p>\n<p>Cybercriminals count on the fact that victims understandably prefer to keep quiet about how they encountered such Trojans. To intensify the effect, an on-screen message might appear about illegal content supposedly detected on the device \u2014 for example, child pornography.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"LOATDhtDnt\"><p><a href=\"https:\/\/www.kaspersky.com\/blog\/loapi-trojan\/20510\/\" target=\"_blank\" rel=\"noopener nofollow\">Loapi \u2014 this Trojan is hot!<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"\u201cLoapi \u2014 this Trojan is hot!\u201d \u2014 Daily - English - Global - blog.kaspersky.com\" src=\"https:\/\/www.kaspersky.com\/blog\/loapi-trojan\/20510\/embed\/#?secret=4PGyDYiJ7M#?secret=LOATDhtDnt\" data-secret=\"LOATDhtDnt\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>In some cases, the malware is a kind of modular infection like <a href=\"https:\/\/www.kaspersky.com\/blog\/loapi-trojan\/19382\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Loapi<\/a>, which starts off with ad clicking but might progress to blocking the smartphone or even frying the insides through cryptomining.<\/p>\n<p>Finally, it\u2019s worth noting another very serious type of malware \u2014 the rootkit. A rootkit gives cybercriminals full access to the smartphone. It\u2019s an all-in-one threat that can show advertising, steal data, and secretly install other apps, including more malware.<\/p>\n<h3>How to stay safe<\/h3>\n<p>The best advice is not to download any porn apps. That said, for those inclined, there are safer ways to view adult content.<\/p>\n<ul>\n<li>Keep an eye on what permissions an app requests. For example, avoid media players that request full access to the operating system.<\/li>\n<li>Install a <a href=\"https:\/\/app.appsflyer.com\/com.kms.free?pid=smm&amp;c=ww_kdaily\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">mobile AV<\/a> product to protect your devices against uninvited guests.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic-2\">\n","protected":false},"excerpt":{"rendered":"<p>Adult content is an ace in the hole for cybercriminals attacking Android devices.<\/p>\n","protected":false},"author":2484,"featured_media":25708,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683],"tags":[105,109,423,1566,97,422,723],"class_list":{"0":"post-21087","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-android","9":"tag-apps","10":"tag-mobile-devices","11":"tag-porn","12":"tag-security-2","13":"tag-threats","14":"tag-trojans"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/porn-related-android-threats\/21087\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/porn-related-android-threats\/12482\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/porn-related-android-threats\/10337\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/porn-related-android-threats\/14630\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/porn-related-android-threats\/12926\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/porn-related-android-threats\/12447\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/porn-related-android-threats\/15277\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/porn-related-android-threats\/15013\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/porn-related-android-threats\/19611\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/porn-related-android-threats\/4717\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/porn-related-android-threats\/8995\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/porn-related-android-threats\/15864\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/porn-related-android-threats\/19513\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/porn-related-android-threats\/16888\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/porn-related-android-threats\/19563\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/porn-related-android-threats\/19565\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/21087","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=21087"}],"version-history":[{"count":11,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/21087\/revisions"}],"predecessor-version":[{"id":29810,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/21087\/revisions\/29810"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/25708"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=21087"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=21087"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=21087"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}