{"id":35234,"date":"2020-04-30T07:50:33","date_gmt":"2020-04-30T11:50:33","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=35234"},"modified":"2020-05-18T07:15:30","modified_gmt":"2020-05-18T11:15:30","slug":"phantomlance-android-backdoor-trojan","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/phantomlance-android-backdoor-trojan\/35234\/","title":{"rendered":"PhantomLance Android backdoor discovered on\u00a0Google Play"},"content":{"rendered":"<p>Last July, our colleagues at Doctor Web <a href=\"https:\/\/news.drweb.com\/show\/?c=0&amp;p=0&amp;lng=en&amp;i=13349\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">detected<\/a> a <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/backdoor\/\" target=\"_blank\" rel=\"noopener noreferrer\">Trojan backdoor<\/a> on Google Play. Such discoveries are not exactly an everyday occurrence, but they\u2019re hardly unheard of\u00a0\u2014 researchers do find Trojans on Google Play, sometimes hundreds at a time.<\/p>\n<p>This Trojan, however, was surprisingly sophisticated for malware found on Google Play, so our experts decided to dig deeper. They conducted <a href=\"https:\/\/securelist.com\/apt-phantomlance\/96772\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">their own investigation<\/a> and found that the malware is part of a malicious campaign (which we dubbed PhantomLance) that\u2019s been ongoing since the end of 2015.<\/p>\n<h2>What PhantomLance can do<\/h2>\n<p>Our experts detected several versions of PhantomLance. Despite their increasing complexity and the differences in time of appearance , they are fairly similar in terms of capabilities.<\/p>\n<p>The main objective of PhantomLance is to harvest confidential information from the victim\u2019s device. The malware is able to supply its handlers with location data, call logs, text messages, lists of installed apps, and full information about the infected smartphone. What\u2019s more, its functionality can be expanded at any moment simply by loading additional modules from the C&amp;C server.<\/p>\n<h2>PhantomLance distribution<\/h2>\n<p>Google Play is the malware\u2019s main distribution platform. It\u2019s also been found in third-party repositories, but for the most part they are only mirrors of the official Google app store.<\/p>\n<p>We can say for sure that apps infected with a version of the Trojan started appearing in the store in the summer of 2018. The malware was found hiding in utilities for changing fonts, removing ads, system cleanup, and so on.<\/p>\n<div id=\"attachment_35236\" style=\"width: 750px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/04\/30073921\/phantomlance-android-backdoor-trojan-app.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-35236\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/04\/30073921\/phantomlance-android-backdoor-trojan-app.png\" alt=\"An app on Google Play found to contain the PhantomLance backdoor\" width=\"740\" height=\"670\" class=\"size-full wp-image-35236\"><\/a><p id=\"caption-attachment-35236\" class=\"wp-caption-text\">An app on Google Play found to contain the PhantomLance backdoor<\/p><\/div>\n<p>Apps containing PhantomLance have all since been removed from Google Play, of course, but copies can still be found in mirrors. Ironically, some of these mirror repositories state that the installation package was downloaded directly from Google Play, and is thus said to be definitely virus-free.<\/p>\n<p>How did the cybercriminals manage to sneak their toy into Google\u2019s official store? First, for added authenticity, the attackers created a profile of each developer on GitHub. These profiles contained only some sort of license agreement. Nevertheless, having a profile on GitHub apparently lends developers respectability.<\/p>\n<p>Second, the apps that PhantomLance\u2019s creators initially uploaded to the store were not malicious. The first versions of the programs did not contain any suspicious features, and therefore they passed Google Play\u2019s checks with flying colors. Only some time later, with updates, did the apps acquire malicious features.<\/p>\n<h2>PhantomLance\u2019s targets<\/h2>\n<p>Judging by the geography of its spread, as well as the presence of Vietnamese versions of malicious apps in online stores, we believe the top targets of PhantomLance creators were users from Vietnam.<\/p>\n<p>Moreover, our experts detected a number of characteristics linking PhantomLance with the OceanLotus group, which is responsible for creating a range of malware also aimed at users from Vietnam.<\/p>\n<p>The set of OceanLotus malware tools previously analyzed includes a family of macOS backdoors, a family of Windows backdoors, and a set of Android Trojans, whose activity was spotted in 2014\u20132017. Our experts came to the conclusion that PhantomLance succeeded the abovementioned Android Trojans starting in 2016.<\/p>\n<div id=\"attachment_35237\" style=\"width: 970px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/04\/30073959\/phantomlance-android-backdoor-trojan-oceanlotus.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-35237\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/04\/30073959\/phantomlance-android-backdoor-trojan-oceanlotus.png\" alt=\"PhantomLance is linked to other OceanLotus malware weapons\" width=\"960\" height=\"640\" class=\"size-full wp-image-35237\"><\/a><p id=\"caption-attachment-35237\" class=\"wp-caption-text\">PhantomLance is linked to other OceanLotus malware weapons<\/p><\/div>\n<h2>How to guard against PhantomLance<\/h2>\n<p>One of the tips we often repeat in posts about Android malware is \u201cInstall apps only from Google Play.\u201d But PhantomLance demonstrates yet again that malware can sometimes hoodwink even the Internet giants.<\/p>\n<p>Google takes great pains to keep its app store clean (otherwise we\u2019d run into suspicious software far more often), but the company\u2019s capabilities are not unlimited, and attackers are inventive. Therefore, the mere fact that an app is on Google Play is no guarantee of its safety. Always consider other factors:<\/p>\n<ul>\n<li>Give preference to apps from trusted developers.<\/li>\n<li>Pay attention to <a href=\"https:\/\/www.kaspersky.com\/blog\/android-app-security\/18505\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">app ratings and user reviews<\/a>.<\/li>\n<li>Look carefully at the <a href=\"https:\/\/www.kaspersky.com\/blog\/android-8-permissions-guide\/23981\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">permissions an app requests<\/a>, and don\u2019t hesitate to refuse if you think it\u2019s being greedy. For example, a weather app probably doesn\u2019t need access to your contacts and messages, and likewise a photo filter doesn\u2019t need to know your location.<\/li>\n<li>Scan the apps you install on your Android device with a <a href=\"https:\/\/www.kaspersky.com\/mobile-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____da04049114cf37d2\" target=\"_blank\" rel=\"noopener nofollow\">reliable security solution<\/a>.<\/li>\n<\/ul>\n<p>For more technical information about PhantomLance, see our experts\u2019 <a href=\"https:\/\/securelist.com\/apt-phantomlance\/96772\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">detailed report on Securelist<\/a>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic-2\">\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky experts found the PhantomLance Trojan backdoor for Android in Google Play.<\/p>\n","protected":false},"author":2506,"featured_media":35238,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683],"tags":[105,499,1449,183,605,3785,2535,337,3762,333,723],"class_list":{"0":"post-35234","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-android","9":"tag-apt","10":"tag-backdoors","11":"tag-google-play","12":"tag-great","13":"tag-phantomlance","14":"tag-root","15":"tag-sas","16":"tag-sas-2020","17":"tag-security-analyst-summit","18":"tag-trojans"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/phantomlance-android-backdoor-trojan\/35234\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/phantomlance-android-backdoor-trojan\/21067\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/phantomlance-android-backdoor-trojan\/16626\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/phantomlance-android-backdoor-trojan\/8197\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/phantomlance-android-backdoor-trojan\/22149\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/phantomlance-android-backdoor-trojan\/19872\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/phantomlance-android-backdoor-trojan\/18620\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/phantomlance-android-backdoor-trojan\/22625\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/phantomlance-android-backdoor-trojan\/21554\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/phantomlance-android-backdoor-trojan\/28278\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/phantomlance-android-backdoor-trojan\/8193\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/phantomlance-android-backdoor-trojan\/14781\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/phantomlance-android-backdoor-trojan\/15150\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/phantomlance-android-backdoor-trojan\/13419\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/phantomlance-android-backdoor-trojan\/23925\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/phantomlance-android-backdoor-trojan\/11405\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/phantomlance-android-backdoor-trojan\/28246\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/phantomlance-android-backdoor-trojan\/25380\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/phantomlance-android-backdoor-trojan\/22153\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/phantomlance-android-backdoor-trojan\/27466\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/phantomlance-android-backdoor-trojan\/27301\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/35234","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2506"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=35234"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/35234\/revisions"}],"predecessor-version":[{"id":35457,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/35234\/revisions\/35457"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/35238"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=35234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=35234"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=35234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}