Skip to main content

Security Blog

Filter by:

Hong Kong Google Play Store's Apps Security Risk Report (July 2013)

  Hong Kong Computer Emergency Response Team (HKCERT) Coordination Centre cooperates with the National Institute of Network and Information Security (NINIS) for detecting malicious and suspicious behaviors of Apps from the Google Play Store, in order to study the security risk of apps in the Google Play Store for Hong Kong area. NINIS provides us analyzed result, and we collate the detection result and publishes security alerts to the public.   In the report of July, 186 apps were downloaded from Play Store, where 3 apps have been identified as high risk. The detail of report is shown as follow.   Target scope: Top 50 Free Applications in Hong Kong area Top 50 New Free Applications in Hong Kong area Top 50 Free Games in Hong Kong area Top 50 New Free Games in Hong Kong area   Scanned Apps Successful downloaded and scanned: 186 apps Unable to download via the system: 14 apps Downloaded date: 5-July 2013 List of the downloaded apps: "Appendix 1"   Analysis Overview   In this analysis, 186 apps were scanned for bad behaviors. Based on the level of security threat, the apps were divided into 2 categories: apps with malicious and apps with suspicious behaviors. Malicious behavior refers to apps behavior pose malicious level of security risk, which can be identified explicitly, that causes security threat to users. Suspicious behavior refers to apps behavior pose certain level of security risk, but no malicious behavior can be explicitly identified.   1. Scanning Result   Among the 186 scanned apps, 3 apps were identified as security high risk. These 3 Apps were identified with a high risk behavior signature, a.remote.GingerMaster or Android.Trojan.InfoStealer. a.remote.GingerMaster, can connect to the Internet in background, and get the commands from server, to undermine the systems, disclose the information of IMEI, IMSI, and geo-location, etc. Also, it illegally tries to gain the root permission, and install malware silently. Android.Trojan.InfoStealer, is an online banking fraud, which is a Trojan generation tool. Intruder can modify the tool based on the property of target game, and produce a Trojan for the target game.   List of security high risk apps   No. App High risk behavior signature Detail behavior Ad plug-in 1 神魔龍鬥士OL-萬神之王 Android.Trojan.InfoStealer It is an online banking fraud, which is a Trojan generation tool. Intruder can modify the tool based on the property of target game, and produce a ...
Release Date: 30 Jul 2013 3078 Views

Favourite Security Reads of the Week (26 Jul 2013)

   Favourite Security Reads of the Week (26 Jul 2013)   "Favourite Security Reads of the Week". Each week we share five news or articles that we like. We hope you will love this column and we welcome your comment via email to hkcert@hkcert...
Release Date: 26 Jul 2013 2063 Views

Corresponding to the "Master Key" critical vulnerability in Android

In July 2013, Bluebox Security research team reported their discovery of a vulnerability in Android's security model that allows a hacker to modify any APK file (Android application package file) to become a malicious Trojan without breaking the application's cryptographic signature, and...
Release Date: 25 Jul 2013 2867 Views

Favourite Security Reads of the Week (19 Jul 2013)

   Favourite Security Reads of the Week (19 Jul 2013)   "Favourite Security Reads of the Week". Each week we share five news or articles that we like. We hope you will love this column and we welcome your comment via email to hkcert@hkcert...
Release Date: 19 Jul 2013 2242 Views

Favourite Security Reads of the Week (12 Jul 2013)

   Favourite Security Reads of the Week (12 Jul 2013)   "Favourite Security Reads of the Week". Each week we share five news or articles that we like. We hope you will love this column and we welcome your comment via email to hkcert@hkcert...
Release Date: 12 Jul 2013 2280 Views

Do you know your website is secure?

Recently, Hong Kong had multiple websites were successive successful intruded by hackers. Besides of upload the stolen information on the Internet, they also listed in detail throughout the intrusion process. From these incidents, we found that the hacker's attack technique was very systematic...
Release Date: 9 Jul 2013 2983 Views

Favourite Security Reads of the Week (5 Jul 2013)

   Favourite Security Reads of the Week (5 Jul 2013)   "Favourite Security Reads of the Week". Each week we share five news or articles that we like. We hope you will love this column and we welcome your comment via email to hkcert@hkcert...
Release Date: 5 Jul 2013 1894 Views

HKCERT Security Newsletter (July 2013 Issue)

July 2013 Issue of Security Newsletter is available now: /my_url/en/newsletter/1307   Cover Story HKCERT joins with Microsoft and law enforcement to disrupt the Citadel botnet Citadel botnet takedown (b54 operation) enters phase 2 How to detect and remove...
Release Date: 2 Jul 2013 2612 Views

Favourite Security Reads of the Week (28 Jun 2013)

   Favourite Security Reads of the Week (28 Jun 2013)   "Favourite Security Reads of the Week". Each week we share five news or articles that we like. We hope you will love this column and we welcome your comment via email to hkcert@...
Release Date: 28 Jun 2013 2226 Views

Favourite Security Reads of the Week (21 Jun 2013)

   Favourite Security Reads of the Week (21 Jun 2013)   "Favourite Security Reads of the Week". Each week we share five news or articles that we like. We hope you will love this column and we welcome your comment via email to hkcert@...
Release Date: 21 Jun 2013 2585 Views