Shedun
{{Short description|Android based malware}}
Shedun is a family of malware software (also known as Kemoge, Shiftybug and Shuanet{{cite web|author=by @HackTheW0r1d |url=https://hackbails.wordpress.com/2015/11/05/trojanized-adware-already-infected-more-than-20000-android-apps/ |title=Shuanet, ShiftyBug and Shedun malware could auto-root your Android – HackBails |publisher=Hackbails.wordpress.com |date=2015-11-05 |accessdate=2016-10-02}}{{cite web|url=http://www.securityweek.com/android-adware-abuses-accessibility-service-install-apps|title=Android Adware Abuses Accessibility Service to Install Apps |website=SecurityWeek.com|date=20 November 2015 |accessdate=2016-04-20}}{{cite web|url=http://gadgets.ndtv.com/apps/news/new-android-adware-can-download-install-apps-without-permission-report-768664|title=New Android Adware Can Download, Install Apps Without Permission: Report|author=Manish Singh|work=NDTV Gadgets360.com|date=23 November 2015 }}) targeting the Android operating system first identified in late 2015 by mobile security company Lookout, affecting roughly 20,000{{cite web|url=http://forums.appleinsider.com/discussion/189949/three-new-malware-strains-infect-20k-apps-impossible-to-wipe-only-affect-android|title=Three new malware strains infect 20k apps, impossible to wipe, only affect Android|work=AppleInsider Forums|date=5 November 2015 }} popular Android applications.{{cite web|last=Eran |first=Daniel |url=http://appleinsider.com/articles/15/11/05/three-new-malware-strains-infect-20k-apps-impossible-to-wipe-only-affect-android |title=Three new malware strains infect 20k apps, impossible to wipe, only affect Android |publisher=Appleinsider.com |date=2015-11-05 |accessdate=2016-10-02}}{{cite web|url=http://www.droidreport.com/articles/2516/20151110/android-malware-loose-shuanet-shiftybug-shedun-signatures-found-20000-apps-outside-google.htm|title=Android Malware On The Loose: Shuanet, ShiftyBug And Shedun Signatures Found On 20,000 Apps Outside Google Play Store|work=Droid Report|date=10 November 2015 }}{{cite web|url=http://darkmatters.norsecorp.com/2015/11/20/shedun/|title=Shedun Trojan goes solo|work=Darkmatters|access-date=18 April 2016|archive-date=8 April 2016|archive-url=https://web.archive.org/web/20160408145243/http://darkmatters.norsecorp.com/2015/11/20/shedun/|url-status=dead}}{{cite web|url=http://lavasoft.com/mylavasoft/company/blog/popular-mobile-apps-repackaged-with-trojans |title=Popular Mobile Apps Repackaged with Trojans |publisher=Lavasoft |date=2015-11-04 |accessdate=2016-10-02}} Lookout claimed the HummingBad malware was also a part of the Shedun family, however, these claims were refuted.{{Cite web|url=http://blog.elevenpaths.com/2016/07/another-month-another-new-rooting.html|title=Another month, another new rooting malware family for Android|website=blog.elevenpaths.com|access-date=2016-10-09|archive-date=10 October 2016|archive-url=https://web.archive.org/web/20161010173521/http://blog.elevenpaths.com/2016/07/another-month-another-new-rooting.html|url-status=dead}}{{Cite web|url=http://blog.checkpoint.com/2016/07/11/diy-attribution-classification-depth-analysis-mobile-malware/|title=DIY Attribution, Classification, and In-depth Analysis of Mobile Malware|date=2016-07-11|website=Check Point Blog|access-date=2016-10-09}}
Avira Protection Labs stated that Shedun family malware is detected to cause approximately 1500-2000 infections per day.{{cite web|url=http://blog.avira.com/shedun/|title=Shedun: adware/malware family threatening your Android device|work=Avira Blog|date=3 September 2015}}
All three variants of the virus are known to share roughly ~80% of the same source code.{{cite web|url=http://www.elektronikpraxis.vogel.de/iot/security/articles/510900/|title=Neue Welle von Android-Malware lässt sich kaum mehr entfernen|website=Elektronikpraxis.vogel.de|accessdate=2016-04-20|archive-date=15 February 2017|archive-url=https://web.archive.org/web/20170215124907/http://www.elektronikpraxis.vogel.de/iot/security/articles/510900/|url-status=dead}}{{cite web|url=http://www.itseccity.de/virenwarnung/hintergrund/lookout021215.html|title=Gemeinsamkeiten: Shuanet, Shedun & ShiftyBug|author=PMK Presse, Messe & Kongresse Verlags GmbH|website=Itseccity.de|accessdate=2016-04-20}}
In mid 2016, arstechnica reported that approximately 10.000.000 devices would be infected by this malware{{cite web|author=Dan Goodin - Jul 7, 2016 5:50 pm UTC |url=https://arstechnica.com/security/2016/07/virulent-auto-rooting-malware-takes-control-of-10-million-android-devices/ |title=10 million Android phones infected by all-powerful auto-rooting apps |publisher=Ars Technica |date=2016-07-07 |accessdate=2016-10-02}} and that new infections would still be surging.{{cite web|url=http://www.bankinfosecurity.com/android-trojanized-adware-shedun-infections-surge-a-9249 |title=Android Trojanized Adware 'Shedun' Infections Surge |publisher=Bankinfosecurity.com |date=2016-07-08 |accessdate=2016-10-02}}{{Cite web|url=https://www.linkedin.com/pulse/android-trojanized-adware-shedun-infections-surge-mike-rogan|title=Android Trojanized Adware 'Shedun' Infections Surge|website=www.linkedin.com}}
The malware's primary attack vector is repackaging legitimate Android applications (e.g. Facebook, Twitter, WhatsApp, Candy Crush, Google Now, Snapchat{{cite web|url=https://blog.botfrei.de/2015/11/android-trojaner-auf-dem-vormarsch/|title=Android-Malware: Adware war gestern. Android-Trojaner auf dem Vormarsch.|work=botfrei Blog|date=9 November 2015}}){{cite web|url=https://arstechnica.com/security/2015/11/new-type-of-auto-rooting-android-adware-is-nearly-impossible-to-remove/|title=New type of auto-rooting Android adware is nearly impossible to remove|work=Ars Technica|date=4 November 2015}}{{cite web|url=https://threatpost.com/shuanet-adware-rooting-android-devices-via-trojanized-apps/115265/|title=Shuanet Adware Roots Android Devices - Threatpost - The first stop for security news|author=Michael Mimoso|work=Threatpost - The first stop for security news|date=4 November 2015 }} with adware included. The app which remains functional is then released to a third party app store;{{cite web|url=http://www.itespresso.de/2015/11/23/shedun-adware-nistet-sich-gegen-den-willen-der-nutzer-in-android-ein/|title=Adware Shedun nistet sich gegen den Willen der Nutzer in Android ein|work=ITespresso.de|date=23 November 2015 |last1=Schneider |first1=Rainer }} once downloaded, the application generates revenue by serving ads (estimated to amount to $2 US per installation), most users cannot get rid of the virus without getting a new device, as the only other way to get rid of the malware is to root affected devices and re-flash a custom ROM.{{cite web|url=http://en.yibada.com/articles/82763/20151108/android-trojan-software-morphs-real-apps-nearly-impossible-remove-device.htm|title=Android Trojan Software Morphs Into Real Apps, Nearly Impossible To Remove From Device's System: Report|work=Yibada}}{{cite web|url=http://www.golem.de/news/android-malware-schadsoftware-rootet-und-infiziert-geraete-unwiederbringlich-1511-117307.html|title=Android-Malware: Neue Schadsoftware rootet Geräte und ist kaum zu entfernen - Golem.de|publisher=}}
In addition, Shedun-type malware has been detected pre-installed on 26 different types{{cite web|url=http://thehackernews.com/2015/09/android-smartphone-malware.html|title=26 Android Phone Models Shipped with Pre-Installed Spyware|author=Swati Khandelwal|date=3 September 2015|work=The Hacker News}} of Chinese Android-based hardware such as Smartphones and Tablet computers.{{cite web |url=https://public.gdatasoftware.com/Presse/Publikationen/Malware_Reports/G_DATA_MobileMWR_Q2_2015_US.pdf |title=G Data : Mobile Malware Report |website=Public.gdatasoftware.com |accessdate=2016-04-20 |archive-date=15 February 2017 |archive-url=https://web.archive.org/web/20170215072736/https://public.gdatasoftware.com/Presse/Publikationen/Malware_Reports/G_DATA_MobileMWR_Q2_2015_US.pdf |url-status=dead }}{{cite web|url=http://news.softpedia.com/news/24-chinese-android-smartphones-models-come-with-pre-installed-malware-490930.shtml|title=24 Chinese Android Smartphone Models Come with Pre-Installed Malware|author=Catalin Cimpanu|date=4 September 2015|work=softpedia}}{{cite web|url=http://www.ibtimes.com/amazon-selling-40-android-tablets-come-pre-installed-malware-2181424|title=Amazon Selling $40 Android Tablets That Come With Pre-Installed Malware|author=David Gilbert|work=International Business Times|date=12 November 2015}}{{cite web|url=http://securityaffairs.co/wordpress/39821/hacking/chinese-smartphones-pre-installed-malware.html|title=Chinese smartphones infected with pre-installed malwareSecurity Affairs|work=Security Affairs|date=2 September 2015}}{{cite web|url=http://www.scmagazine.com/chinese-android-smartphones-now-shipping-with-pre-installed-malware/article/436655/|title=Chinese Android smartphones now shipping with pre-installed malware|work=SC Magazine|access-date=18 April 2016|archive-date=7 May 2016|archive-url=https://web.archive.org/web/20160507000052/http://www.scmagazine.com/chinese-android-smartphones-now-shipping-with-pre-installed-malware/article/436655/|url-status=dead}}{{cite web|url=http://au.idigitaltimes.com/malware-found-pre-installed-xiaomi-huawei-lenovo-phones-107190|title=Malware Found Pre-Installed on Xiaomi, Huawei, Lenovo Phones|author=Diane Samson|work=iDigitalTimes.com|access-date=18 April 2016|archive-date=23 August 2016|archive-url=https://web.archive.org/web/20160823030514/http://au.idigitaltimes.com/malware-found-pre-installed-xiaomi-huawei-lenovo-phones-107190|url-status=dead}}{{cite web|url=http://www.designntrend.com/articles/64631/20151113/amazon-s-40-chinese-android-tablets-infected-pre-installed-malware.htm|title=Amazon's $40 Chinese Android Tablets Infected With Pre-Installed Malware|work=Design & Trend|access-date=18 April 2016|archive-date=15 February 2017|archive-url=https://web.archive.org/web/20170215072603/http://www.designntrend.com/articles/64631/20151113/amazon-s-40-chinese-android-tablets-infected-pre-installed-malware.htm|url-status=dead}}{{cite web|url=http://www.computerworld.com/article/2488173/security0/pre-installed-malware-found-on-new-android-phones.html|title=Pre-installed malware found on new Android phones|author=Jeremy Kirk|date=5 March 2014|work=Computerworld}}{{cite web |url=https://public.gdatasoftware.com/Presse/Publikationen/Malware_Reports/G_DATA_MobileMWR_Q2_2015_EN.pdf |title=G Data : Mobile Malware Report |website=Public.gdatasoftware.com |accessdate=2016-04-20 |archive-date=10 March 2016 |archive-url=https://web.archive.org/web/20160310213705/https://public.gdatasoftware.com/Presse/Publikationen/Malware_Reports/G_DATA_MobileMWR_Q2_2015_EN.pdf |url-status=dead }}{{cite web|url=https://www.hackread.com/amazon-safe-haven-for-android-tablets-malware/|title=Amazon Store, a safe haven for Android Tablets with pre-installed malware|author=Waqas|work=HackRead|date=14 November 2015}}{{cite web|url=https://tafsiran.com/cara-mengatasi-layanan-google-play-terus-berhenti/|title=Pre-Installed Android Malware Raises Security Risks in Supply Chain|publisher=|date=October 2021}}{{cite web|url=http://www.huffingtonpost.com/entry/android-malware-pre-installed_us_55e6f2e8e4b0aec9f355271f|title=Some Android Phones Come With Malware Pre-Installed: Report|work=The Huffington Post|access-date=18 April 2016|archive-date=30 May 2016|archive-url=https://web.archive.org/web/20160530075813/http://www.huffingtonpost.com/entry/android-malware-pre-installed_us_55e6f2e8e4b0aec9f355271f|url-status=dead}}{{cite web|url=http://wccftech.com/brand-android-smartphones-coming-spyware-malware/|title=Brand New Android Smartphones Coming with Spyware and Malware|work=WCCFtech|date=4 September 2015}}
Shedun-family malware is known for auto-rooting the Android OS{{cite web|url=http://techreport.com/news/29281/trojan-adware-on-android-can-give-itself-root-access|title=Trojan adware on Android can give itself root access|work=The Tech Report|date=5 November 2015}} using well-known exploits like ExynosAbuse, Memexploit and Framaroot{{cite web|url=http://praxistipps.chip.de/shedun-shuanet-und-shiftybug-android-smartphone-vor-malware-schuetzen_44475|title=Shedun, Shuanet und Shiftybug: Android-Smartphone vor Malware schützen|publisher=}} (causing a potential privilege escalation{{cite web|url=http://blog.check-and-secure.com/android-nutzer-achtung-vor-trojaner-adware-shedun_15-11-25/|title=Android-Nutzer: Achtung vor Trojaner-Adware Shedun - Check & Secure -|work=- Check & Secure -}}{{cite web|url=http://www.extremetech.com/mobile/217544-new-android-adware-tries-to-root-your-phone-so-you-cant-remove-it|title=New Android adware tries to root your phone so you can't remove it|work=ExtremeTech|date=5 November 2015 }}){{cite web|url=http://www.scmagazineuk.com/more-than-20000-apps-auto-root-android-devices/article/451797/|title=More than 20,000 apps auto-root Android devices|work=SC Magazine UK|date=30 January 2022 }} and for serving trojanized adware and installing themselves within the system partition of the operating system, so that not even a factory reset can remove the malware from infected devices.{{cite web|url=https://www.theregister.co.uk/2015/11/20/shedun_adware/|title=Android's accessibility service grants god-mode p0wn power|website=The Register|publisher=}}{{cite web|url=https://blog.lookout.com/blog/2015/11/19/shedun-trojanized-adware/ |title=Trojanized adware family abuses accessibility service to install whatever apps it wants | Lookout Blog |website=Blog.lookout.com |date=2015-11-19 |accessdate=2016-04-10}}
Shedun malware is known for targeting the Android Accessibility Service,{{cite web|url=http://www.theinquirer.net/inquirer/news/2435721/shedun-trojan-adware-is-hitting-the-android-accessibility-service|archive-url=https://web.archive.org/web/20151120210103/http://www.theinquirer.net/inquirer/news/2435721/shedun-trojan-adware-is-hitting-the-android-accessibility-service|url-status=unfit|archive-date=20 November 2015|title=Shedun trojan adware is hitting the Android Accessibility Service|website=Theinquirer.net|accessdate=2016-04-20}}{{cite web|url=http://securityaffairs.co/wordpress/42164/malware/shedun-trojanized-adware.html|title=Shedun adware can install any malicious mobile appSecurity Affairs|work=Security Affairs|date=22 November 2015}}{{cite AV media|url=https://www.youtube.com/watch?v=VDWmEUm6mQM|title=Shedun gaining accessibility service privileges|date=18 November 2015|publisher=|via=YouTube}}{{cite web|url=http://www.heise.de/security/meldung/Android-Malware-Werbeterror-wie-von-Geisterhand-3009688.html|title=Android-Malware: Werbeterror wie von Geisterhand|author=Dennis Schirrmacher|date=20 November 2015|work=Security}}{{cite web|url=http://www.trojaner-info.de/news2/der-adware-trojaner-shedun.html|title=Der Adware – Trojaner Shedun|date=6 December 2015|work=trojaner-info.de}} as well as for downloading and installing arbitrary applications{{cite web|url=http://thehackernews.com/2015/11/android-malware-auto-install.html|title=This Malware Can Secretly Auto-Install any Android App to Your Phone|author=Swati Khandelwal|date=20 November 2015|work=The Hacker News}} (usually adware) without permission. It is classified as "aggressive adware" for installing potentially unwanted program{{cite web|url=http://www.areamobile.de/news/35337-trojaner-adware-installiert-selbststaendig-ungewollte-android-apps|title=Trojaner-Adware installiert selbstständig ungewollte Android-Apps|website=Areamobile.de|accessdate=2016-04-20}}{{cite web|url=http://androidmag.de/news/technik-news/shedun-neue-android-adware-installiert-apps-ohne-deine-einwilligung/|title=Shedun: Neue Android-Adware installiert Apps ohne deine Einwilligung|work=Androidmag|date=25 November 2015}}{{cite web|url=http://winfuture.de/news,89953.html|title=Installation auch nach Ablehnung: Neue dreiste Android-Adware|author=John Woll|date=23 November 2015|publisher=}} applications and serving ads.{{cite web|url=http://en.yibada.com/articles/90437/20151201/android-shedun-malware.htm|title=Android Shedun Malware: New Malware That Can Grant Access to Your Phone; Malware Impossible To Be Removed?|work=Yibada|date=December 2015 |last1=Smith |first1=Eugene }}
As of April 2016, Shedun malware is considered by most security researchers to be next to impossible to entirely remove.{{cite web|url=http://www.noz.de/deutschland-welt/gut-zu-wissen/artikel/635820/gefahrliche-android-schadsoftware-oft-hilft-nur-neues-gerat-1 |title=Gefährliche Android-Schadsoftware: Oft hilft nur neues Gerät |website=Noz.de |date=9 November 2015 |accessdate=2016-04-20 |last1=Otten |first1=Mark }}{{cite news|url=http://www.theinquirer.net/inquirer/news/2435721/shedun-trojan-adware-is-hitting-the-android-accessibility-service |archive-url=https://web.archive.org/web/20151120210103/http://www.theinquirer.net/inquirer/news/2435721/shedun-trojan-adware-is-hitting-the-android-accessibility-service |url-status=unfit |archive-date=20 November 2015 |title=Shedun trojan adware is hitting the Android Accessibility Service |newspaper=The Inquirer |date=2015-11-20 |accessdate=2016-04-10}}{{cite web |url=https://blog.lookout.com/blog/2015/11/04/trojanized-adware/ |title=Lookout discovers new trojanized adware; 20K popular apps caught in the crossfire | Lookout Blog |website=Blog.lookout.com |date=2015-11-04 |accessdate=2016-04-10 |archive-date=19 February 2017 |archive-url=https://web.archive.org/web/20170219042903/https://blog.lookout.com/blog/2015/11/04/trojanized-adware/ |url-status=dead }}{{cite web|url=http://betanews.com/2015/11/05/shuanet-shiftybug-and-shedun-malware-could-auto-root-your-android/ |title=Shuanet, ShiftyBug and Shedun malware could auto-root your Android |website=Betanews.com |date= 5 November 2015|accessdate=2016-04-10}}{{cite web|url=http://www.techtimes.com/articles/104373/20151109/new-family-of-android-malware-virtually-impossible-to-remove-say-hello-to-shedun-shuanet-and-shiftybug.htm |title=New Family Of Android Malware Virtually Impossible To Remove: Say Hello To Shedun, Shuanet And ShiftyBug : PERSONAL TECH |publisher=Tech Times |date= 9 November 2015|accessdate=2016-04-10}}{{cite web|last=Goodin |first=Dan |url=https://arstechnica.com/security/2015/11/android-adware-can-install-itself-even-when-users-explicitly-reject-it/ |title=Android adware can install itself even when users explicitly reject it |publisher=Ars Technica |date=2015-11-19 |accessdate=2016-04-10}}
Avira Security researcher Pavel Ponomariov, who specializes in Android malware detection tools, mobile threat detection, and mobile malware detection automation research,{{cite web|url=http://blog.avira.com/author/pavel-ponomariov/|title=Pavel Ponomariov - Avira Blog|work=Avira Blog|access-date=18 April 2016|archive-date=20 April 2016|archive-url=https://web.archive.org/web/20160420035150/http://blog.avira.com/author/pavel-ponomariov/|url-status=dead}} has published an in-depth analysis of this malware.
The countries most infected by this virus were in Asia including China, India, Philippines, Indonesia and Turkey.{{cite web |last1=Schwartz |first1=Mathew J. |title=Android Trojanized Adware 'Shedun' Infections Surge |url=https://www.bankinfosecurity.com/android-trojanized-adware-shedun-infections-surge-a-9249 |website=bankinfosecurity.com |language=en}}
See also
References
{{Reflist|30em}}
{{Use dmy dates|date=August 2016}}
Category:Software distribution
Category:Social engineering (security)
Category:Privilege escalation exploits