id
int64
1
14.4k
text
stringlengths
3
5.01k
entities
list
relations
list
Comments
list
913
By comparison, the latest version of the CryptoWall malware family takes roughly 1-3 minutes to complete its encryption routine.
[ { "id": 2888, "label": "malware", "start_offset": 41, "end_offset": 51 }, { "id": 2889, "label": "TIME", "start_offset": 73, "end_offset": 92 } ]
[]
[]
914
It’s also interesting to note that each time PClock2 scans a directory or encrypts a file, it makes an HTTP POST request to the C2 server.
[ { "id": 46436, "label": "Infrastucture", "start_offset": 129, "end_offset": 138 }, { "id": 46435, "label": "malware", "start_offset": 46, "end_offset": 53 } ]
[ { "id": 189, "from_id": 46435, "to_id": 46436, "type": "beacons-to" } ]
[]
915
Figure 7. HTTP POST request indicating a folder is being scanned This resulted in over 1,000 requests being made on a sandbox machine, which contained little data of interest.
[]
[]
[]
916
After it finished the encryption routine, PClock2 generates a VBScript file in the following directory:
[ { "id": 46437, "label": "malware", "start_offset": 43, "end_offset": 50 }, { "id": 46438, "label": "SOFTWARE", "start_offset": 63, "end_offset": 71 } ]
[]
[]
917
This script file contains the following commands, which will delete shadow copies on the Windows operating system.
[ { "id": 46439, "label": "SOFTWARE", "start_offset": 90, "end_offset": 114 } ]
[]
[]
918
Set UAC = CreateObject("Shell.Application") UAC.ShellExecute "vssadmin", "Delete Shadows /All /Quiet", "", "runas", 1 On Windows XP, the following dialog box appears to the victim when this script runs, making it fairly apparent that something suspicious is occurring: Figure 8.
[ { "id": 46440, "label": "SOFTWARE", "start_offset": 123, "end_offset": 133 } ]
[]
[]
919
Dialog box that appears to victim when VBS attempts to run
[]
[]
[]
920
After running the clean up script the malware overwrites the ‘\CData\C’ registry key with a value of zero, which removes the unique SHA256 key.
[ { "id": 46441, "label": "REGISTRYKEY", "start_offset": 62, "end_offset": 70 } ]
[]
[]
921
Finally, the malware changes the victim’s wallpaper and generates a GUI instructing the victim how they can provide payment and retrieve their files.
[]
[]
[]
922
This dialogue mimics the more-capable “CryptoLocker” malware family and provides instructions in both English and Spanish.
[ { "id": 2904, "label": "malware", "start_offset": 39, "end_offset": 51 } ]
[]
[]
923
Figure 9.
[]
[]
[]
924
Ransom demand
[]
[]
[]
925
I originally wished to determine if the new version of PClock, PClock 2, included enough improvements to compete with some of the larger ransomware malware families, such as CryptoWall, TeslaCrypt, or TorrentLocker.
[ { "id": 2911, "label": "malware", "start_offset": 174, "end_offset": 184 }, { "id": 2913, "label": "malware", "start_offset": 201, "end_offset": 214 }, { "id": 46442, "label": "malware", "start_offset": 186, "end_offset": 196 }, { "id": 46446, "label": "malware", "start_offset": 63, "end_offset": 71 }, { "id": 46447, "label": "malware", "start_offset": 55, "end_offset": 61 } ]
[]
[]
926
In truth, this version has made a number of improvements, such as adding more file types to target, ignoring certain directories, and using a better encryption routine.
[]
[]
[]
927
However, a number of strong issues still plague this malware family, such as the following: While this version is an improvement, it still lacks many of the features and stealth that are currently present in the larger ransomware families.
[]
[]
[]
928
While ransomware is a large problem for users, it’s important to realize that not all malware families are created equal.
[]
[]
[]
929
Like most things in life, malware comes in many shapes and forms, from the more elegant and robust solutions, to those that come up lacking.
[]
[]
[]
930
All PClock malware family samples are properly classified as malicious by WildFire.
[ { "id": 44902, "label": "malware", "start_offset": 5, "end_offset": 11 }, { "id": 44903, "label": "identity", "start_offset": 75, "end_offset": 83 } ]
[]
[]
931
AutoFocus users can find more information on samples and indicators related to this attack by viewing the PClock tag.
[ { "id": 46448, "label": "malware", "start_offset": 106, "end_offset": 112 } ]
[]
[]
932
Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!
[]
[]
[]
933
Please mark, I'm not a robot!
[]
[]
[]
934
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
[]
[]
[]
935
Mobile app creators are often looking for ways to monetize their software.
[]
[]
[]
936
One of the most common ways to do this is by displaying advertisements to users or by offering in-app purchases (IAPs).
[]
[]
[]
937
Mobile monetization platforms create software libraries that authors can embed into their apps to start earning money quickly.
[]
[]
[]
938
We previously highlighted the dangers of installing apps that enable IAPs using SMS messages, as these apps typically have access to all SMS messages sent to the phone.
[]
[]
[]
939
While not all SMS-based IAP applications steal user data, we recently identified that the Chinese Taomike SDK has begun capturing copies of all messages received by the phone and sending them to a Taomike controlled server.
[ { "id": 46449, "label": "location", "start_offset": 91, "end_offset": 98 }, { "id": 44904, "label": "attack-pattern", "start_offset": 42, "end_offset": 57 }, { "id": 44905, "label": "malware", "start_offset": 99, "end_offset": 110 }, { "id": 44907, "label": "Infrastucture", "start_offset": 198, "end_offset": 223 } ]
[ { "id": 37, "from_id": 44905, "to_id": 44907, "type": "exfiltrates-to" }, { "id": 38, "from_id": 44905, "to_id": 44907, "type": "communicates-with" }, { "id": 190, "from_id": 44905, "to_id": 46449, "type": "located-at" }, { "id": 191, "from_id": 44905, "to_id": 44904, "type": "uses" } ]
[]
940
Since August 1, Palo Alto Networks WildFire has captured over 18,000 Android apps that contain this library.
[ { "id": 46451, "label": "TIME", "start_offset": 6, "end_offset": 14 }, { "id": 46450, "label": "identity", "start_offset": 16, "end_offset": 43 }, { "id": 46452, "label": "SOFTWARE", "start_offset": 69, "end_offset": 76 } ]
[]
[]
941
These apps are not hosted inside the Google Play store, but are distributed via third party distribution mechanisms in China.
[ { "id": 46453, "label": "SOFTWARE", "start_offset": 37, "end_offset": 54 }, { "id": 46454, "label": "location", "start_offset": 119, "end_offset": 124 } ]
[]
[]
942
Background WildFire captures many samples of mobile malware that intercept and upload SMS messages.
[ { "id": 44908, "label": "identity", "start_offset": 12, "end_offset": 20 } ]
[]
[]
943
Most of these are created by malware authors who set up command and control (C2) servers with third party hosting providers and frequently update their locations to avoid detection.
[]
[]
[]
944
Among these malware we have found many that are created by “mobile monetization” companies who distribute apps that provide little value but have a high cost to the user.
[]
[]
[]
945
These apps are often installed by tricking users into clicking a pop-up, only to find later that a charge has appeared on their phone bill.
[ { "id": 44909, "label": "attack-pattern", "start_offset": 34, "end_offset": 48 } ]
[]
[]
946
Antivirus programs typically identify these apps as malware, the topic of this blog is something different and harder to detect.
[]
[]
[]
947
Taomike is a Chinese company that aims to become the biggest mobile advertisement solution platform in China.
[ { "id": 46455, "label": "identity", "start_offset": 1, "end_offset": 8 }, { "id": 46456, "label": "location", "start_offset": 14, "end_offset": 21 }, { "id": 46457, "label": "location", "start_offset": 104, "end_offset": 109 } ]
[ { "id": 192, "from_id": 46455, "to_id": 46456, "type": "located-at" } ]
[]
948
They provide an SDK and services to help developers display rich advertisements with a high pay rate.
[]
[]
[]
949
Taomike has not previously been associated with malicious activity, but a recent update to their software added SMS theft functionality.
[ { "id": 46458, "label": "identity", "start_offset": 0, "end_offset": 7 } ]
[]
[]
950
The apps this library is embedded in may be legitimate and have significant functionality, but their developer’s choice to use this library has put them at risk. Technical Details:
[]
[]
[]
951
SMS Theft
[ { "id": 44910, "label": "attack-pattern", "start_offset": 0, "end_offset": 9 } ]
[]
[]
952
Not all apps that use the Taomike library steal SMS messages.
[ { "id": 46459, "label": "identity", "start_offset": 26, "end_offset": 33 }, { "id": 46460, "label": "attack-pattern", "start_offset": 42, "end_offset": 60 } ]
[ { "id": 193, "from_id": 46459, "to_id": 46460, "type": "uses" } ]
[]
953
Our analysis indicates that only samples that contain the embedded URL, hxxp://112.126.69.51/2c.php have this functionality.
[ { "id": 46461, "label": "URL", "start_offset": 72, "end_offset": 99 } ]
[]
[]
954
This is the URL to which the software uploads SMS messages, and the IP address belongs to the Taomike API server used by other Taomike services.
[ { "id": 46462, "label": "identity", "start_offset": 127, "end_offset": 134 }, { "id": 44911, "label": "Infrastucture", "start_offset": 94, "end_offset": 112 } ]
[]
[]
955
We have captured around 63,000 Android apps in WildFire that include the Taomike library but only around 18,000 include the SMS theft functionality.
[ { "id": 2996, "label": "SOFTWARE", "start_offset": 47, "end_offset": 55 }, { "id": 46463, "label": "identity", "start_offset": 73, "end_offset": 80 }, { "id": 46464, "label": "attack-pattern", "start_offset": 124, "end_offset": 133 } ]
[]
[]
956
We believe there are different versions of the Taomike SDK and only some of them include SMS uploading behavior.
[ { "id": 46465, "label": "identity", "start_offset": 50, "end_offset": 57 } ]
[]
[]
957
Based on our data, the version that contains the SMS stealing functions is newer and was released around August 2015.
[ { "id": 44912, "label": "TIME", "start_offset": 105, "end_offset": 116 }, { "id": 44913, "label": "attack-pattern", "start_offset": 49, "end_offset": 61 } ]
[]
[]
958
Apps that use earlier versions of the library appear to be safe.
[]
[]
[]
959
The Taomike library is called “zdtpay” and is a component of Taomike’s IAP system. Because Android apps are required to list the permissions they need in their manifest file, we can see that this library requires both SMS and network related permissions.
[ { "id": 46467, "label": "SOFTWARE", "start_offset": 62, "end_offset": 82 }, { "id": 46468, "label": "SOFTWARE", "start_offset": 93, "end_offset": 100 }, { "id": 46466, "label": "identity", "start_offset": 5, "end_offset": 12 } ]
[]
[]
960
The library also registers a receiver named com.zdtpay.Rf2b for both the SMS_RECEIVED and BOOT_COMPLETED actions with highest priority of 2147483647.
[]
[]
[]
961
Figure 1.
[]
[]
[]
962
Registered receiver for SMS_RECEIVED The registered receiver Rf2b reads SMS messages whenever they arrive.
[]
[]
[]
963
The message body and sender phone number are collected as shown in Figure 2. Figure 2.
[]
[]
[]
964
SMS body and sender number read
[]
[]
[]
965
If the device has just booted, it will start the service MySd2e, which then registers a receiver for Rf2b as shown in Figure 3.
[]
[]
[]
966
Figure 3.
[]
[]
[]
967
MySd2e Service registers receiver for Rf2b
[]
[]
[]
968
SMS information collected by the receiver is saved in a hashmap with “other” as the key and sent to a method that uploads the message to 112.126.69.51 as shown in Figure 4.
[ { "id": 3036, "label": "IPV4", "start_offset": 137, "end_offset": 150 } ]
[]
[]
969
Figure 4. Information uploaded to IP Address used by api.taomike.com
[ { "id": 44914, "label": "DOMAIN", "start_offset": 54, "end_offset": 69 } ]
[]
[]
970
All SMS messages sent to the phone are uploaded, not just those that are relevant to Taomike’s platform.
[ { "id": 46470, "label": "identity", "start_offset": 85, "end_offset": 92 } ]
[]
[]
971
Figure 5 shows a packet capture of a test message upload.
[]
[]
[]
972
The message content is “hey test msg” as circled with dashed red box.
[]
[]
[]
973
Figure 5.
[]
[]
[]
974
SMS uploaded via HTTP in pcap The Taomike library makes contact with the following URLs, but only the “2c.php” path is used to capture SMS messages.
[ { "id": 3051, "label": "attack-pattern", "start_offset": 128, "end_offset": 148 }, { "id": 46472, "label": "FILEPATH", "start_offset": 104, "end_offset": 110 }, { "id": 46471, "label": "identity", "start_offset": 35, "end_offset": 42 } ]
[]
[]
975
The rest appear to be used for other parts of the IAP functionality in the library.
[]
[]
[]
976
Risks and Mitigation
[]
[]
[]
977
We have captured over 18,000 samples that contain the SMS stealing library since August 2015, meaning the number of affected users is considerable.
[ { "id": 46473, "label": "TIME", "start_offset": 81, "end_offset": 92 }, { "id": 46474, "label": "attack-pattern", "start_offset": 54, "end_offset": 66 } ]
[]
[]
978
We expect the number of affected apps and users to increase as more developers incorporate the newer version of Taomike library.
[ { "id": 46475, "label": "identity", "start_offset": 112, "end_offset": 119 } ]
[]
[]
979
The infected apps are not limited to a single developer or third party store as many developers appear use the Taomike library.
[ { "id": 46476, "label": "identity", "start_offset": 112, "end_offset": 119 } ]
[]
[]
980
Some of the infected apps purport to contain or display adult content.
[]
[]
[]
981
We do not know how Taomike is using the stolen SMS messages, but no library should capture all messages and send them to a system outside the phone.
[ { "id": 46477, "label": "identity", "start_offset": 20, "end_offset": 27 } ]
[]
[]
982
In version 4.4 of Android (KitKat) Google began preventing apps from capturing SMS messages unless they were defined as the “default” SMS app.
[ { "id": 46479, "label": "identity", "start_offset": 35, "end_offset": 41 }, { "id": 46478, "label": "SOFTWARE", "start_offset": 18, "end_offset": 34 } ]
[]
[]
983
Users outside of China and those that only download apps from the official Google Play store are not at risk from this threat.
[ { "id": 46480, "label": "SOFTWARE", "start_offset": 76, "end_offset": 87 }, { "id": 46481, "label": "location", "start_offset": 18, "end_offset": 23 } ]
[]
[]
984
To protect Palo Alto Networks customers from the Taomike SMS stealer, we’ve made the following protections available:
[ { "id": 44915, "label": "identity", "start_offset": 11, "end_offset": 29 }, { "id": 44916, "label": "malware", "start_offset": 49, "end_offset": 68 } ]
[]
[]
985
Conclusion Even popular third party monetization platforms are not always trustworthy.
[]
[]
[]
986
When developers incorporate the libraries into their apps they need to carefully test them and monitor for any abnormal activities.
[]
[]
[]
987
Identifying monetization and advertising platforms that behave poorly and abuse their users is something that our industry must to do ensure the safety of all mobile devices and their users.
[]
[]
[]
988
Acknowledgement We greatly appreciate the help from Rongbo Shao from Palo Alto Networks in working on the Threat Prevention signature.
[ { "id": 46482, "label": "identity", "start_offset": 71, "end_offset": 89 }, { "id": 46483, "label": "identity", "start_offset": 54, "end_offset": 65 } ]
[]
[]
989
We would also like to thank Ryan Olson, Benjamin Small, Richar Wartell, and Chris Clark from Palo Alto networks in publishing the discovery.
[ { "id": 46484, "label": "identity", "start_offset": 28, "end_offset": 38 }, { "id": 46485, "label": "identity", "start_offset": 40, "end_offset": 54 }, { "id": 46486, "label": "identity", "start_offset": 56, "end_offset": 70 }, { "id": 46487, "label": "identity", "start_offset": 76, "end_offset": 87 }, { "id": 46488, "label": "identity", "start_offset": 93, "end_offset": 111 } ]
[]
[]
990
Related Sample Hash Values Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot!
[]
[]
[]
991
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
[]
[]
[]
992
Recently, we found email accounts from top universities across the world being sold on Taobao, the largest consumer-to-consumer (C2C) e-commerce platform in China.
[ { "id": 46489, "label": "SOFTWARE", "start_offset": 87, "end_offset": 93 }, { "id": 46490, "label": "location", "start_offset": 157, "end_offset": 162 } ]
[ { "id": 194, "from_id": 46489, "to_id": 46490, "type": "located-at" } ]
[]
993
Advertised uses for these accounts included registering for special accounts under software developer programs, receiving student discounts or coupons from retailers, and obtaining access to academic databases.
[]
[]
[]
994
This post describes the scope, associated risks, and implications of this activity.
[]
[]
[]
995
Our investigation began with a Chinese language search for "edu mailbox" in Taobao, which returned 99 results related to stolen university email accounts.
[ { "id": 46491, "label": "SOFTWARE", "start_offset": 77, "end_offset": 83 } ]
[]
[]
996
The most expensive account was listed at ¥2400 RMB ($390.80 USD), while the cheapest was only ¥0.98 RMB ($0.16 USD). Figure 1: Results for Chinese language "edu mailbox" search on Taobao.
[ { "id": 46492, "label": "SOFTWARE", "start_offset": 181, "end_offset": 187 } ]
[]
[]
997
These accounts, which include an education (EDU) top-level domain email address with valid password, represent 42 of the world’s top universities, across 10 countries:
[]
[]
[]
999
The descriptions for these items proposed three main uses for buyers:
[]
[]
[]
1,000
1. Registering for special accounts under software developer programs:
[]
[]
[]
1,001
For example, the most popular account type, which has been bought at least 569 times, was advertised as a Microsoft’s student Windows Phone 7 and 8 developer account.
[ { "id": 46504, "label": "identity", "start_offset": 106, "end_offset": 116 } ]
[]
[]
1,002
By using this kind of account, a user can perform a developer unlock on their Windows Phone devices without incurring a fee.
[]
[]
[]
1,003
Most reviews of this package were favorable, with comments like "very good to use" or "with seller’s help I can unlock my phone now."
[]
[]
[]
1,004
Figure 2: The most popular account type has sold at least 569 times.
[]
[]
[]
1,005
2. Receiving student discounts or coupons from retailers:
[]
[]
[]
1,006
Some accounts advertised candidacy towards registration for student discount at retailers such as Amazon, BestBuy, Apple, and Dell.
[ { "id": 46508, "label": "identity", "start_offset": 126, "end_offset": 130 }, { "id": 46507, "label": "identity", "start_offset": 115, "end_offset": 120 }, { "id": 46505, "label": "identity", "start_offset": 98, "end_offset": 104 }, { "id": 46506, "label": "identity", "start_offset": 106, "end_offset": 113 } ]
[]
[]
1,007
For example, the standard annual fee for Amazon Prime is $99 USD; however, with the student discount, a buyer could enjoy it for free the first six months and then renew at half price for subsequent years.
[ { "id": 46509, "label": "identity", "start_offset": 41, "end_offset": 53 } ]
[]
[]
1,008
Figure 3: The seller showed how to register for student discount accounts.
[]
[]
[]
1,009
3. Obtaining access to academic databases:
[]
[]
[]
1,010
Accounts for big universities (e.g., MIT, Stanford, etc.) are mainly used to access respective library services and resources, "including research help, study spaces, print and electronic books/journals and more."
[ { "id": 46511, "label": "identity", "start_offset": 42, "end_offset": 50 }, { "id": 46510, "label": "identity", "start_offset": 37, "end_offset": 40 } ]
[]
[]
1,011
Figure 4:
[]
[]
[]
1,012
A seller advertises how an MIT account can be used to access online library resources.
[ { "id": 46512, "label": "identity", "start_offset": 27, "end_offset": 30 } ]
[]
[]
1,013
We talked with some sellers through AliWangWang, an instant message (IM) system developed by Taobao for online trading.
[ { "id": 46513, "label": "SOFTWARE", "start_offset": 37, "end_offset": 48 }, { "id": 46514, "label": "identity", "start_offset": 94, "end_offset": 100 } ]
[]
[]