UPDATED 06:08 EDT / JUNE 24 2016

NEWS

New Godless Android malware running rampant, over 850,000 devices affected

New malware that targets Google’s Android mobile operating system and hijacks a target phone has affected over 850,000 devices worldwide.

Security firm Trend Micro said the malware, dubbed Godless (ANDROIDOS_GODLESS.HRX), targets a set of rooting exploits in its pockets and uses multiple exploits that can target virtually any Android device running Android 5.1 (Lollipop) or earlier.

The malware utilizes the open source android-rooting-tools framework, which contains exploits for well-known vulnerabilities such as PingPongRoot and Towelroot. Once it finds its way onto a device and roots it, Godless installs a backdoor for remote access that can be used to download unwanted apps and advertisements, as well as apps that can spy on users.

Godless is also said to be evolving, with the company explaining that “recently, we came across a new Godless variant that is made to only fetch the exploit and the payload from a remote command and control (C&C) server, … We believe that this routine is done so that the malware can bypass security checks done by app stores, such as Google Play.”

Distribution

The Godless malware is being distributed via infected apps, including “various apps” available in Google Play that include utility apps such as flashlights and Wi-Fi apps, to copies of popular games; one example is a malicious flashlight app in Google Play called “Summer Flashlight” that contains the malicious Godless code.

Interestingly, Trend Micro added that they have also found a lot of clean apps on Google Play that have corresponding malicious versions, in that they share the same developer certificate.

Versions on Google Play that do not have the malicious code but share the same certificate run the risk of being upgraded to malicious versions later without the user ever knowing they have been affected.

Trend Micro warned users that along with practicing safe internet (such as having a virus scanner installed on their phone) when downloading apps, regardless if it’s a utility tool or a popular game, the developer should always have reviews; “unknown developers with very little or no background information may be the source of these malicious apps.”

Despite infected apps being available on Google Play, Trend Micro added that as a general rule, it is always best to download apps from trusted stores such as Google Play and Amazon.

Feature image by Uncalno Tekno

A message from John Furrier, co-founder of SiliconANGLE:

Support our open free content by sharing and engaging with our content and community.

Join theCUBE Alumni Trust Network

Where Technology Leaders Connect, Share Intelligence & Create Opportunities

11.4k+  
CUBE Alumni Network
C-level and Technical
Domain Experts
15M+ 
theCUBE
Viewers
Connect with 11,413+ industry leaders from our network of tech and business leaders forming a unique trusted network effect.

SiliconANGLE Media is a recognized leader in digital media innovation serving innovative audiences and brands, bringing together cutting-edge technology, influential content, strategic insights and real-time audience engagement. As the parent company of SiliconANGLE, theCUBE Network, theCUBE Research, CUBE365, theCUBE AI and theCUBE SuperStudios — such as those established in Silicon Valley and the New York Stock Exchange (NYSE) — SiliconANGLE Media operates at the intersection of media, technology, and AI. .

Founded by tech visionaries John Furrier and Dave Vellante, SiliconANGLE Media has built a powerful ecosystem of industry-leading digital media brands, with a reach of 15+ million elite tech professionals. The company’s new, proprietary theCUBE AI Video cloud is breaking ground in audience interaction, leveraging theCUBEai.com neural network to help technology companies make data-driven decisions and stay at the forefront of industry conversations.