pearljae.blogg.se

Fir auth gms firebaseapp spyware
Fir auth gms firebaseapp spyware









  1. #Fir auth gms firebaseapp spyware manual
  2. #Fir auth gms firebaseapp spyware android
  3. #Fir auth gms firebaseapp spyware pro
  4. #Fir auth gms firebaseapp spyware download

Top countries with the most number of affected users Through our back-end monitoring and deep research, we were able to see the general distribution of affected users and found that they hailed from a total of 196 different countries.įigure 12. Part of what makes this case interesting is how widely its applications have been distributed. Fake Facebook login pop-up User distribution At which point the malware would already have stolen the user’s credentials.įigure 11. If the user inputs his/her credentials, the fake pop-up will only state that the log-in was unsuccessful. It's capable of displaying fake Facebook and Google pop-ups to phish for the user’s account details.

fir auth gms firebaseapp spyware

In addition to its info-stealing capabilities, the malware can also gather additional credentials through a phishing attack. The malware is even capable of stealing and uploading files found on the device, and will do so as long as it receives the commands as seen in Figures 8 and 9 respectively.įigure 9. Once done, the malware will wait for and perform commands sent from its C&C server through FCM.ĭepending on the command the malware receives, it can steal SMS conversations, contact lists, files, and call logs, as seen from commands in the subsequent figures below. It sends the gathered information to its C&C server, thus registering the device. Examples of all the information it steals can be seen in Figure 3. The malware will then collect certain device information such as the language used, its registered country, package name, device manufacturer etc. Example of configure file being taken from a C&C server It then reads and parses an XML configure file from its C&C server.įigure 2. Once the malicious application is launched, the malware will first check the device's network availability. It uses Firebase Cloud Messaging to send information to its server. MobSTSPY is capable of stealing information like user location, SMS conversations, call logs and clipboard items.

fir auth gms firebaseapp spyware

#Fir auth gms firebaseapp spyware download

Flappy Birr Dog download page Information stealing And as of writing, Google has already removed all of these applications from Google Play.įigure 1. Five out of six of these apps have been suspended from Google Play since February 2018.

#Fir auth gms firebaseapp spyware pro

Other applications included FlashLight, HZPermis Pro Arabe, Win7imulator, Win7Launcher and Flappy Bird. One of the applications we initially investigated was the game called Flappy Birr Dog, as seen in Figure 1. The applications were available for download on Google Play in 2018, with some recorded to have already been downloaded over 100,000 times by users from all over the world.

#Fir auth gms firebaseapp spyware android

onebusaway-android/google-services.json already exists in OBA Android from the ES SDK configuration.We discovered a spyware (detected as ANDROIDOS_MOBSTSPY) which disguised itself as legitimate Android applications to gather information from users.

  • When a google-services.json file is generated by the Firebase console, follow the instructions to add it to the OBA Android project at /onebusaway-android/google-services.jsonĮS SDK shouldn't block me from adding a Firebase project to the OBA Android app - ideally there shouldn't be an existing /onebusaway-android/google-services.json file that's not owned by the OBA app.
  • Try to configure the OneBusAway Android app with a new Firebase project: It's less friction to adopt if the dev doesn't need to change their Firebase config at all to adopt ES SDK.

    #Fir auth gms firebaseapp spyware manual

  • If an app wants to adopt the ES SDK, and they already use Firebase, with the current ES SDK design they'd need to move their default Firebase config to a secondary manual config.
  • It seems a little strange to have the default google-services.json in an app belong to an SDK.
  • It puts all ES SDK config in the same file ( embedded_social_config).
  • fir auth gms firebaseapp spyware

    This design makes sense to me for three reasons: setDatabaseUrl("") // Required for RTDB.įirebaseApp.initializeApp(this /* Context */, options, "secondary") įirebaseApp secondary = FirebaseApp.getInstance("secondary") įirebaseDatabase secondaryDatabase = FirebaseDatabase.getInstance(secondary) setApiKey("AIzaSyADUe90ULnQDuGShD9W23RDP0xmeDc6Mvw") // Required for Auth. FirebaseOptions options = new FirebaseOptions.Builder()











    Fir auth gms firebaseapp spyware