GPlayed Trojan Masquerades as Google Play to Attack Android Devices: Cisco Talos

Advertisement
By Sumit Chakraborty | Updated: 12 October 2018 18:41 IST
Highlights
  • The Trojan is said to be extremely flexible
  • Its design and implementation is of "an uncommonly high level"
  • It is said to be powerful because of its ability to adapt during deployme

'Google Play Marketplace' uses an icon that is similar to the original Google Play icon

Photo Credit: Cisco Talos

Researchers have identified a new Android Trojan, dubbed as 'GPlayed', that comes with several built-in capabilities. The Trojan is said to be extremely flexible, which makes it a very effective tool for cyber-attackers. It has been found to be resembling a popular Google service on infected Android devices - the Google Play store. In order to fool users into believing that it is legitimate software, the malware essentially labels itself as 'Google Play Marketplace' and uses an icon that is similar to the original Google Play app icon. The researchers who found the malware claim that it is extremely powerful because of its capability to adapt during deployment.

As per a blog post by researchers at Cisco Talos, the GPlayed Trojan's design and implementation are of "an uncommonly high level," making it a dangerous threat. They said that such threats will become more common, as more companies decide to publish their software directly to consumers. GPlayed is said to be a full-fledged Trojan with capabilities ranging from those of "a banking Trojan to a full spying Trojan." This essentially means that the malware can do anything from "harvest the user's banking credentials, to monitoring the device's location." This Trojan also shows a new path for threats to evolve. Having the ability to move code from desktops to mobile platforms without any effort.

According to the blog post, the malware is written in .NET using the Xamarin environment for mobile applications. The main DLL is called "Reznov.DLL." and it contains one root class called "eClient," which is the core of the Trojan. It added, "The imports reveal the use of a second DLL called 'eCommon.DLL.' We determined that the "eCommon" file contains support code and structures that are platform independent. The main DLL also contains eClient subclasses that implement some of the native capabilities."

Advertisement

The GPlayed Trojan is highly evolved in its design, says Vitor Ventura, the author of the blog post. It has modular architecture implemented in the form of plugins, or it can receive new .NET source code, which will be compiled on the device in runtime. The blog adds, "This means that the authors or the operators can add capabilities without the need to recompile and upgrade the Trojan package on the device."

Advertisement

To achieve adaptability, the operator has the capability to remotely load plugins, inject scripts, and compile new .NET code that can be executed. "Our analysis indicates that this Trojan is in its testing stage but given its potential, every mobile user should be aware of GPlayed. Mobile developers have recently begun eschewing traditional app stores and instead want to deliver their software directly through their own means. But GPlayed is an example of where this can go wrong, especially if a mobile user is not aware of how to distinguish a fake app versus a real one," Ventura adds.

The Cisco Talos blog provides a list of URLs, Hash Values, and Custom Activity Prefix as indicators of compromise. It has also provided a bunch of ways its products can be used to detect and block GPlayed-like attacks. Cyber attackers are said to be running tests on GPlayed but the Cisco researchers have warned that it is shaping up as a serious threat.

Advertisement

Ventura added, "The average user might not have the necessary skills to distinguish legitimate sites from malicious ones. We've seen that this has been the case for many years with spear-phishing campaigns on desktop and mobile platforms, so, unfortunately, it doesn't seem that this will change any time soon. And this just means attackers will continue to be successful."

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. Cloudflare Is Down Again For the Second Time in Weeks: See Affected Sites
  2. Nothing Phone 3a Lite Goes on Sale in India at This Price
  3. ACT Fibernet Launches New Broadband Plans With Free OTT Subscriptions
  4. OnePlus 15R Surfaces on Benchmarking Site Ahead of India Launch
  5. HMD 101, HMD 100 With Built-In Radio Launched in India at These Prices
  6. Flipkart Buy Buy 2025 Sale: Nothing Phone 3, Phone 3a Deals Revealed
  7. OTT Releases of the Week (Dec 1 – Dec 7): Know What to Watch
  8. Instamart to Provide 10-Minute Delivery of Samsung Galaxy Devices
  9. Airtel Discontinues These Prepaid Recharge Packs in India
  10. NotebookLM App Now Has an In-Built Camera
  1. Google’s Year in Search 2025: Top Trending Topics in India—From Gemini to Squid Games
  2. Vivo S50 Colour Options, Key Features Surface Online; Could Launch in India as Vivo V70
  3. Cloudflare Outage Blocks Access to Several Websites Including BookMyShow, SpaceX, Coinbase
  4. Samsung Galaxy S26 Series to Offer Built-In Support for Company's 25W Magnetic Qi2 Charger: Report
  5. Airtel Discontinues Two Prepaid Recharge Packs in India With Data Benefits, Free Airtel Xtreme Play Subscription
  6. Samsung Galaxy Phones, Devices Are Now Available via Instamart With 10-Minute Instant Delivery
  7. NotebookLM App Gets an In-Built Camera, Lets Users Upload Images as a Source
  8. HMD 101 Launched in India With 1,000mAh Battery, Auto Call Recording Alongside HMD 100: Price, Features
  9. Crypto Traders Await US Fed Signals as Bitcoin Price Drops to $91,900
  10. Nothing Phone 3a Lite Goes on Sale in India: See Price, Offers, Availability
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.