{"id":40252,"date":"2021-06-11T12:37:33","date_gmt":"2021-06-11T16:37:33","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=40252"},"modified":"2021-10-04T11:48:38","modified_gmt":"2021-10-04T15:48:38","slug":"malware-disguised-as-antivirus","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/malware-disguised-as-antivirus\/40252\/","title":{"rendered":"Malware disguised as antivirus protection"},"content":{"rendered":"<p>In almost every post about Android, we recommend installing apps from official sources only, and that won\u2019t change anytime soon. A recent example illustrates why: Scammers were spreading a banking Trojan disguised as popular media players, a fitness app, a book reader, and one that hit close to home, Kaspersky Internet Security for Android.<\/p>\n<h2>Why it is dangerous to install applications from alternative sources<\/h2>\n<p>Nothing is wrong with third-party app marketplaces per se, but no one can know for sure whether any given store is trustworthy. In an official Android app store, be it Google Play or Huawei AppGallery, employees of the respective owner companies screen every application submitted by developers, weeding out any that are clearly malicious. These are large companies that protect their reputations and customers\u2019 security, and they have both the resources and the motivation to help keep users malware-free.<\/p>\n<p>Sometimes, however, malware <a href=\"https:\/\/www.kaspersky.com\/blog\/dresscode-android-trojan\/13219\/\" target=\"_blank\" rel=\"noopener nofollow\">does get through<\/a>, and even into Google Play, although the chances of encountering it there are much lower than on message boards, torrent trackers, or some other sites. Proudly small, independent marketplaces tend not to run many checks, typically because they lack the resources, and as a result, the apps they host could be anything in disguise, even a Trojan.<\/p>\n<p>We should mention here that downloading malware to an Android device is not usually enough to infect it. Unless the malware relies on some kind of <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/zero-day-exploit\/\" target=\"_blank\" rel=\"noopener\">zero-day uber-exploit<\/a> to get <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/root-access\/\" target=\"_blank\" rel=\"noopener\">superuser permissions<\/a>, installing a dangerous app in Android requires some effort. The operating system queries the user about every step: whether they really want to install the app, whether they agree to grant it the permissions it requests, and so on. Cybercriminals employ social engineering to persuade people to say yes, often with great success.<\/p>\n<h2>Malicious security from an alternative marketplace<\/h2>\n<p>Here is an example. Not so long ago, a group of researchers <a href=\"https:\/\/labs.bitdefender.com\/2021\/06\/threat-actors-use-mockups-of-popular-apps-to-spread-teabot-and-flubot-malware-on-android\/\" target=\"_blank\" rel=\"nofollow noopener\">reported<\/a> on Android applications spreading through various fake sites. The apps included a fake version of Kaspersky Internet Security for Android.<\/p>\n<p>The scammers were spreading their fake app with the name \u201cKaspersky Free Antivirus\u201d (we used to offer a product with that name, but it was for Windows). On Google Play, our mobile antivirus app is currently called <a href=\"https:\/\/www.kaspersky.com\/mobile-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____da04049114cf37d2\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Mobile Antivirus: Applock &amp; Web Security<\/a>.<\/p>\n<p>Ironically, users who downloaded the fake antivirus app received a banking Trojan known as TeaBot, which our security products detect as HEUR: Trojan-Banker.AndroidOS.Teaban or HEUR: Trojan-Banker.AndroidOS.Regon.<\/p>\n<p>Why is this especially problematic in the case of antivirus apps? It\u2019s because the user not only downloads and installs a banking Trojan disguised like this, but also grants it all of the permissions it requests. After all, an authentic antivirus app needs a lot of permissions, including very powerful access such as <a href=\"https:\/\/www.kaspersky.com\/blog\/android-8-permissions-guide\/23981\/\" target=\"_blank\" rel=\"noopener nofollow\">Accessibility services<\/a>.<\/p>\n<p>Worse, in the absence of actual antivirus protection, the device cannot detect the malware.<\/p>\n<p>Completing installation and granting all requested permissions gives the TeaBot Trojan the ability to do almost anything on the Android device. Its capabilities are many: from <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/keylogger\/\" target=\"_blank\" rel=\"noopener\">keylogging<\/a>, stealing Google Authenticator codes, and exploiting Accessibility in other ways all the way to gaining full remote control of the Android device.<\/p>\n<h2>How to make sure an app is legit<\/h2>\n<p>Antivirus isn\u2019t TeaBot\u2019s only disguise. The malware is also available as fake versions of some well-known government, financial, fitness, and reading apps, among others. To stay safe, turn off your smartphone\u2019s ability to install applications from unknown sources altogether \u2014 <a href=\"https:\/\/www.kaspersky.com\/blog\/unknown-apps-android\/41656\/\" target=\"_blank\" rel=\"noopener nofollow\">Android allows that<\/a>. And if you need an app of any kind, find it on an official marketplace.<\/p>\n<p>Be very careful as well about the <a href=\"https:\/\/www.kaspersky.com\/blog\/android-8-permissions-guide\/23981\/\" target=\"_blank\" rel=\"noopener nofollow\">permissions you grant to applications<\/a>. If a fitness app unexpectedly requests permission to use Accessibility, for example, think twice (or more) before answering.<\/p>\n<p>Finally, be sure to use <em>authentic<\/em> antivirus protection. With a completely free edition of Kaspersky Internet Security for Android available, there\u2019s no reason to download it from unofficial sources. You can find our antivirus app in both <a href=\"https:\/\/www.kaspersky.com\/mobile-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____da04049114cf37d2\" target=\"_blank\" rel=\"noopener nofollow\">Google Play<\/a> and the Huawei AppGallery.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic\">\n","protected":false},"excerpt":{"rendered":"<p>A fake Kaspersky Internet Security for Android app highlights the danger of installing apps from outside of official app stores.<\/p>\n","protected":false},"author":675,"featured_media":40254,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683],"tags":[105,734,4627],"class_list":{"0":"post-40252","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-android","9":"tag-banking-trojans","10":"tag-kaspersky-for-android"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/malware-disguised-as-antivirus\/40252\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/malware-disguised-as-antivirus\/22979\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/malware-disguised-as-antivirus\/18461\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/malware-disguised-as-antivirus\/9176\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/malware-disguised-as-antivirus\/24911\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/malware-disguised-as-antivirus\/22933\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/malware-disguised-as-antivirus\/22116\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/malware-disguised-as-antivirus\/25471\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/malware-disguised-as-antivirus\/24941\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/malware-disguised-as-antivirus\/30906\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/malware-disguised-as-antivirus\/9740\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/malware-disguised-as-antivirus\/17120\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/malware-disguised-as-antivirus\/17621\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/malware-disguised-as-antivirus\/14928\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/malware-disguised-as-antivirus\/26927\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/malware-disguised-as-antivirus\/31062\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/malware-disguised-as-antivirus\/27185\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/malware-disguised-as-antivirus\/24012\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/malware-disguised-as-antivirus\/29356\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/malware-disguised-as-antivirus\/29149\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/40252","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/675"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=40252"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/40252\/revisions"}],"predecessor-version":[{"id":42298,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/40252\/revisions\/42298"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/40254"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=40252"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=40252"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=40252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}