FutureFive New Zealand - Consumer technology news & reviews from the future
Story image
Pokemon GO sideloaders potentially risking world full of nasties
Mon, 11th Jul 2016
FYI, this story is more than a year old

Last week we covered how Pokemon GO is taking New Zealand and Australia by storm - but there's a downside - malware attackers can quickly create a storm too.

While fans are sideloading the game onto their phones and bypassing official app stores, along come the nasties.

An Android version of the game has been found by Proofpoint researchers to be infected. Its APK was compromised by DroidJack remote access tool (RAT), which can potentially give an attacker full control of a device.

Proofpoint says that the malicious APK was launched less than 72 hours after the game was released in NZ and Australia, and suspects that the attack was targeting users who just couldn't wait to download the app from their own region.

This was fuelled by some media publications that provided instructions on how to sideload the app from third party websites. What's more, unaware users would not even be aware that the infected app is malicious, as it seemingly looks identical.

The DroidJack RAT has been documended by Symantec and Kaspersky in the past, so it's not a new attack method. It is new to the Pokemon GO app, and Proofpoint recommends that users refrain from sideloading apps that could open their devices up to malicious infections.

Bitdefender has also released a statement, saying that "DroidJack is not a new threat. In December 2015, police cracked down on people who bought DroidJack from underground forums where it was sold for around $200. Police have raided homes across Europe and the US, arresting people suspected of installing the mobile phone malware to spy on their spouse, friends or neighbours".

Users who want to check if they are infected should check the APK's SHA256 hash, which Proofpoint has identified as 15db22fd7d961f4d4bd96052024d353b3ff4bd135835d2644d94d74c925af3c4.

Another way is to check the app's permissions. Infected devices may show extra permissions including directly calling phone numbers, editing text messages, recording audio, modifying contacts, reading web bookmarks, changing network connectivity, viewing Wi-Fi connections, and retrieve running apps.

Proofpoint makes sure to mention that permissions can vary depending on device configuration, and that these could change in future. Proofpoint says this APK is a proof of concept, and that users should always download from legitimate app stores.

Read more in Proofpoint's blog here.