Lucian Constantin
CSO Senior Writer

Scareware distributors targeting smartphone users, experts warn

news
Jan 3, 20122 mins

Cyber criminals are poisoning Google search results for popular mobile apps with links that lead to scareware

Scareware distributors are targeting smartphone users who search the Web for popular mobile apps, experts from antivirus vendor Kaspersky Lab warn.

Rogue programs that masquerade as antivirus software have been used to scam computer users for many years. The money generated by such schemes is regularly used to fund other illegal activities.

[ Learn how to secure your systems with InfoWorld’s Malware Deep Dive PDF special report and Security Central newsletter, both from InfoWorld. ]

The high profitability of scareware has pushed some cybercriminal gangs into previously unexploited markets, like those of Mac computers and now smartphones.

According to Kaspersky Lab senior malware analyst Denis Maslennikov, mobile malware creators are using black hat search engine optimization (BHSEO) to poison Google search results for popular mobile apps like Opera Mini with malicious links.

“Cybercriminals have started to use almost the same techniques in order to force [smartphone] users to download and install malware,” Maslennikov said in a blog post last week. “But in this case we talk about SMS Trojans with fake AV rudiments.”

According to the Maslennikov, mobile malware creators are using black hat search engine optimization (BHSEO) to poison Google search results for popular mobile apps like Opera Mini with malicious links. The links lead to scareware pages that ask visitors to perform online malware scans that display bogus privacy and security alerts. After performing the scans, users are advised to download a special anti-malware application that fixes the problems allegedly found on their devices. This application is called VirusScanner and is designed to silently send SMS messages to premium-rate numbers.

Kaspersky has identified versions of this Trojan for Android and older Java-enabled mobile operating systems like Symbian. Even though the samples seen so far only target Russian-speaking users, it’s possible that versions localized in other languages will appear as well, especially as such scams continue to have a high success rate. Last month the FTC gave back $8 million to victims of a large scareware distribution network that was dismantled in 2008.

“It’s not the first time when we’ve seen the adoption of common malware techniques in the mobile malware world and we will definitely see more examples of such adoption in 2012,” Maslennikov said.

Lucian Constantin

Lucian Constantin writes about information security, privacy, and data protection for CSO. Before joining CSO in 2019, Lucian was a freelance writer for VICE Motherboard, Security Boulevard, Forbes, and The New Stack. Earlier in his career, he was an information security correspondent for the IDG News Service and Information security news editor for Softpedia.

Before he became a journalist, Lucian worked as a system and network administrator. He enjoys attending security conferences and delving into interesting research papers. He lives and works in Romania.

You can reach him at lucian_constantin@foundryco.com or @lconstantin on X. For encrypted email, his PGP key's fingerprint is: 7A66 4901 5CDA 844E 8C6D 04D5 2BB4 6332 FC52 6D42

More from this author