
Spyware apps found on Google's official Play Market
Consumers are constantly being reminded to only download apps to their devices that have been thoroughly vetted and published on reputable marketplaces. However, a recent discovery by mobile security firm Lookout shows that even these sources aren’t infallible.
In a blog post published last week, researchers working for the firm found that a single threat actor has attempted to publish over 4,000 spyware apps since February 2017, with at least three of them making their way to the Google Play Store.
One of the apps, called Soniac, was marketed as a customizable communications program and was downloaded up to 5,000 times before Google removed it from the marketplace. The researchers found that the app was chock full of spyware capabilities, including the ability to record audio, make calls, send text messages, and retrieve contacts and other sensitive information.
Ars Technica reports that the other two apps – Hulk Messenger and Troy Chat – had been available on Google’s marketplace but had been removed earlier by either the company or the developer. The researchers say that the remaining 4,000+ malicious apps are still being distributed in alternative markets, and are being categorized as part of a malware family that Lookout calls “SonicSpy.”
“What’s commonly seen in all SonicSpy samples is that once they compromise a device they beacon to command and control servers and await instructions from the operator who can issue one of seventy three supported commands,” said Lookout researcher Michael Flossman. “The way this has been implemented is distinct across the entire SonicSpy family.”
What to do
The researchers say that once the SonicSpy apps have been downloaded, they will often remove their launcher icons to hide their presence on the device and establish a connection to the operator’s control server.
To avoid downloading one of these malicious apps, consumers are reminded to only install apps from trusted sources on trusted marketplaces. However, since at least some of these apps have made it onto Google’s marketplace, consumers are urged to exercise even more caution and to scrutinize any non-Google app sources, with the exception of Amazon’s official Android offerings.
"Anyone accessing sensitive information on their mobile device should be concerned about SonicSpy. The actors behind this family have shown that they're capable of getting their spyware into the official app store and as it's actively being developed, and its build process is automated, it's likely that SonicSpy will surface again in the future," the security researchers said.


HP laptops and tablets come with pre-installed keylogger, researchers say
Privacy is a precious commodity in today’s consumer culture, with computer users having to contend with spyware, malware, phishing attempts, and a host of other insidious tech-related probes. While the following doesn’t seem to fall under that same malicious category, owners of certain HP laptops may be surprised to learn that their every keystroke may have been recorded, including those used to enter sensitive passwords and log-in information.
A team of Swiss security researchers at ModZero have found that these devices come pre-installed with an audio driver that basically acts as a keylogger. For those who don’t know, a keylogger is a program or device that records and stores all the keystrokes you make on your device. Someone with access to a keylogger would be able to see any private or sensitive information.
In this case, the keylogger was found to be part of a debugging feature on audio drivers that were installed on several models of HP laptops and tablets. CNET reports that executable files within the drivers recorded keystrokes and sent the information to a log file in a public directory in the device’s hard drive.
“This type of debugging turns the audio driver effectively into keylogging spyware. On the basis of meta-information of the files, this keylogger has already existed on HP computers since at least Christmas 2015,” the researchers said.
Never meant for finished products
The researchers found that 28 HP laptop and tablet models that have this keylogging feature. They include:
- HP EliteBook 820 G3 Notebook PC
- HP EliteBook 828 G3 Notebook PC
- HP EliteBook 840 G3 Notebook PC
- HP EliteBook 848 G3 Notebook PC
- HP EliteBook 850 G3 Notebook PC
- HP ProBook 640 G2 Notebook PC
- HP ProBook 650 G2 Notebook PC
- HP ProBook 645 G2 Notebook PC
- HP ProBook 655 G2 Notebook PC
- HP ProBook 450 G3 Notebook PC
- HP ProBook 430 G3 Notebook PC
- HP ProBook 440 G3 Notebook PC
- HP ProBook 446 G3 Notebook PC
- HP ProBook 470 G3 Notebook PC
- HP ProBook 455 G3 Notebook PC
- HP EliteBook 725 G3 Notebook PC
- HP EliteBook 745 G3 Notebook PC
- HP EliteBook 755 G3 Notebook PC
- HP EliteBook 1030 G1 Notebook PC
- HP ZBook 15u G3 Mobile Workstation
- HP Elite x2 1012 G1 Tablet
- HP Elite x2 1012 G1 with Travel Keyboard
- HP Elite x2 1012 G1 Advanced Keyboard
- HP EliteBook Folio 1040 G3 Notebook PC
- HP ZBook 17 G3 Mobile Workstation
- HP ZBook 15 G3 Mobile Workstation
- HP ZBook Studio G3 Mobile Workstation
- HP EliteBook Folio G1 Notebook PC
In a statement, HP explained that the feature should never have been included in the final versions of the devices. "Our supplier partner developed software to test audio functionality prior to product launch and it should not have been included in the final shipped version," the company said.
HP vice-president Michael Nash said that a patch for the issue has been added to Windows update and can also be accessed at HP’s website.

