{"id":3013,"date":"2013-10-25T12:30:28","date_gmt":"2013-10-25T16:30:28","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=3013"},"modified":"2020-02-26T10:44:48","modified_gmt":"2020-02-26T15:44:48","slug":"whats-the-deal-with-adware-on-android","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/whats-the-deal-with-adware-on-android\/3013\/","title":{"rendered":"What&#8217;s the Deal with Adware on Android?"},"content":{"rendered":"<p>In most cases, the \u201cfree\u201d Android applications you download from Google\u2019s Play store aren\u2019t free at all. These developers aren\u2019t just developing apps for you out of the kindness of their collective hearts. Like most online services that don\u2019t ask for the tradition up-front payment, the mobile application profit-model relies on advertising and in-app purchases.<\/p>\n<p>During the development process, whoever is building an application will often choose some third party ad library and bundle it into their app. Once an app is live in the Google Play store and starts getting downloaded by Android users, that third-party company is responsible for serving ads and paying the application\u2019s developer.<\/p>\n<p>Neither the developer nor the user have any control over what this ad library is doing, what kind of information it collects, the ads it serves or how it interacts with user-devices. Some ad libraries are perfectly straight-forward and responsible. Some are deceitful and reckless.<\/p>\n<p>One such popular ad library deployed widely on Google\u2019s Android operating system boasts a handful of excessive and <a href=\"https:\/\/www.kaspersky.com\/blog\/tip-of-the-week-how-to-remove-intrusive-banners\/\" target=\"_blank\" rel=\"noopener nofollow\">intrusive<\/a> features, contains a plethora of dynamic and potentially exploitable vulnerabilities, and has been downloaded in apps more than 200 million times. So reckless is the behavior of this particular library that the researchers from FireEye who <a href=\"http:\/\/www.fireeye.com\/blog\/technical\/2013\/10\/ad-vulna-a-vulnaggressive-vulnerable-aggressive-adware-threatening-millions.html\" target=\"_blank\" rel=\"noopener nofollow\">analyzed it<\/a> won\u2019t even mention it by name, instead referring to it as \u201cVulna,\u201d a melding of the two words they claim describe the library best: vulnerable and aggressive.<\/p>\n<div class=\"pullquote\">Neither the developer nor the user have any control over what this ad library is doing<\/div>\n<p>Like many ad libraries, Vulna has the capacity to collect sensitive information like the contents of text messages, call history, and contact lists. In addition \u2013 and more troubling \u2013 these Vulna ads can also execute downloaded code (aka install stuff) on the Android devices in which affiliated apps are installed.<\/p>\n<p>What\u2019s worse yet, the laundry list of vulnerabilities affecting the Vulna advertising service means that remote hackers can <a href=\"https:\/\/www.kaspersky.com\/blog\/exploit\/\" target=\"_blank\" rel=\"noopener nofollow\">exploit<\/a> any number of bugs, taking control of any of the ad network\u2019s features, and using them maliciously against the user whose device Vulna is present on. In other words \u2013 and this is the reason that FireEye isn\u2019t publicly calling the network out by name \u2013 the millions of devices that Vulna is serving ads to are theoretically susceptible to a vast array of attacks.<\/p>\n<p>Taken together with the vulnerabilities, which mostly have to do with <a href=\"https:\/\/www.kaspersky.com\/blog\/digital-certificates-httpss\/\" target=\"_blank\" rel=\"noopener nofollow\">a lack of encryption as data travels<\/a> in both directions between Vulna\u2019s servers and end-user devices, a knowledgeable attacker could theoretically do any of the following bad things: Steal<a href=\"https:\/\/www.kaspersky.com\/blog\/podcast-two-factor-authentication\/\" target=\"_blank\" rel=\"noopener nofollow\"> two-factor codes<\/a> sent via standard messaging service (SMS), <a href=\"https:\/\/www.kaspersky.com\/blog\/beware-of-webcams\/\" target=\"_blank\" rel=\"noopener nofollow\">view photos<\/a> and stored files, install malicious applications and icons on the home screen, delete files and data, impersonate the phone\u2019s true owner for phishing and other purposes, delete incoming text messages, make phone calls, secretly use the camera and change bookmarks so they point to malicious sites. Other malicious possibilities include eavesdropping on affected devices over public Wi-Fi, installing botnet malware, and hijacking Vulna\u2019s domain name system (DNS) servers, allowing the attacker to redirect the ad network\u2019s traffic away from where it is supposed to go and toward a site controlled by the attacker, <a href=\"https:\/\/www.kaspersky.com\/blog\/the-4-biggest-news-media-outlet-hacks-ever\/\" target=\"_blank\" rel=\"noopener nofollow\">which is what happened in a recent and widely publicized attack on Twitter and the New York Times<\/a>.<\/p>\n<p>Adding insult to injury, it\u2019s difficult for a user to even know if they have an application installed on their phone that is affiliated with Vulna because of the way it receives HTTP commands from the controller server. Its code is proprietary and obfuscated (as opposed to open-source), meaning that only its creators are allowed to examine it and it\u2019s generally hard to know what the ad network is up to at any given time.<\/p>\n<p>Luckily, FireEye was much more explicit about the actual identity of Vulna when they contacted Google and the company responsible for the Vulna ad libraries. <a href=\"http:\/\/www.fireeye.com\/blog\/technical\/2013\/10\/update-ad-vulna-continues.html\" target=\"_blank\" rel=\"noopener nofollow\">Just yesterday<\/a> FireEye announced that both Google and the company responsible have made a number of positive changes. Google removed a number of the applications most flagrantly abusing these behaviors and revoked the developer accounts responsible for them. Many developers updated their apps, allowing the invasive version of Vulna while others decided to drop Vulna altogether.<\/p>\n<p>Unfortunately, many Android users do not install application updates and will therefore remain vulnerable to this threat. In fact, FireEye estimates that some 166 million downloads still contain the bad version of Vulna.<\/p>\n<p>We obviously recommend that everybody install updates, because if you refuse to install updates there is almost nothing anyone can do to help you. You also need to be aware of adware. Paid versions of applications may seem like a waste of money when there are free apps that serve the same purpose, but the hard truth is that nothing is free. Most so-called \u201cfree\u201d apps are ad-supported and \u2013 as the case of Vulna so perfectly illustrates \u2013 it\u2019s often impossible to know for certain what these ad libraries are up to and how they are maintained.<\/p>\n<p>Imagine for a second that an attacker were to hijack Vulna\u2019s DNS servers and redirect all of its clicks to a site hosting<a href=\"https:\/\/www.kaspersky.com\/blog\/the-big-four-banking-trojans\/\" target=\"_blank\" rel=\"noopener nofollow\"> a credential-stealing, banking trojan<\/a>. Millions of users could potentially have their bank accounts compromised. The costs, both in terms of time and money, associated with recovering a bank account would surely exceed the couple of dollars it might have cost to use the non-ad-supported app in the first place. Of course, paid apps aren\u2019t always available or affordable. At the very least, read and continually monitor the permissions of the apps you download and disable third-party installs whenever possible.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In most cases, the \u201cfree\u201d Android applications you download from Google\u2019s Play store aren\u2019t free at all. These developers aren\u2019t just developing apps for you out of the kindness of<\/p>\n","protected":false},"author":42,"featured_media":3014,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[810,105],"class_list":{"0":"post-3013","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-ads","9":"tag-android"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/whats-the-deal-with-adware-on-android\/3013\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/whats-the-deal-with-adware-on-android\/2611\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/whats-the-deal-with-adware-on-android\/2502\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/whats-the-deal-with-adware-on-android\/2771\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/whats-the-deal-with-adware-on-android\/2605\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/whats-the-deal-with-adware-on-android\/1878\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/whats-the-deal-with-adware-on-android\/3013\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/whats-the-deal-with-adware-on-android\/3013\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/ads\/","name":"ads"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3013","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=3013"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3013\/revisions"}],"predecessor-version":[{"id":32946,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3013\/revisions\/32946"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/3014"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=3013"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=3013"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=3013"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}