Track Common Adversary Tasks Performed Using Android/AdDisplay.Ashas

 





To know more about it, you can go through my detailed document by clicking here







Overview

Android/AdDisplay.Ashas is a type of adware abundantly found in the multiple apps of google store. After successfully launched, this app communicates with C&C server and send data (like language, number of installed apps, etc.) of the infected device to the operator in order to display fraudulent ads.

Techniques & Tactics

In order to attack stealthily, the threat actors follow the steps given below:
  • Firstly, the attackers or the app determines if they will be tested by the Google Play security mechanism, and if they does, then, the app will not trigger the adware payload or vice versa.

  • After launching, the app can also set custom delays between the displaying ads which will not be detected, as typical test methods takes around 10 minutes to test any kind of unwanted behavior.

  • The app can also hide its icon by creating a shortcut and when a user tries to delete it, only the shortcut will be removed while the app will continue to harm the device secretly. This one is the most popular among the other techniques. 

Effects

As the agenda of these app developers is hidden, they are considered untrustworthy and their adware can do the following along with the other things:
  1. Annoy users with intrusive advertisements, including scam ads.
  2. Waste the device's battery resources.
  3. Generate increased network traffic.
  4. Gather users' personal information.
  5. Hide their presence on the affected device to achieve persistence.
  6. Generate revenue for their operator without any user interaction.






To know more about it, you can go through my detailed document by clicking here


































Comments

Popular posts from this blog

Query, Visualize, & Monitor Data in Azure Sentinel

Planning for Implementing SAP Solutions on Azure (Part 2 of 5)

Work with String Data Using KQL Statements