View all newsletters
Receive our newsletter - data, insights and analysis delivered to you

First malicious use of ‘Master Key’ Android vulnerability detected

Six applications are known to have been infected with malicious code.

By Duncan Macrae

The first known malicious use of Android’s "master key" vulnerability has been detected.

Norton Mobile Insight – security firm Symantec’s system for harvesting and automatically analysing Android applications from hundreds of marketplaces – discovered the first examples of the exploit being used in the wild. Symantec detects these applications as Android.Skullkey.

The bug allows attackers to install code on to phones running Google’s mobile operating system and then take control of them.
Symantec said it found six applications infected by a malicious actor. The first two identified were legitimate applications distributed on Android marketplaces in China to help find and make doctor appointments.

The attacker had taken the applications and added code to allow them to remotely control devices, steal sensitive data, send premium SMS messages, and disable a few Chinese mobile security software applications by using root commands, if available.

A further four additional Android applications were then discovered to have been infected by the same attacker, with them being distributed on third-party app sites. The apps are a popular news app, an arcade game, a card game, and a betting and lottery app. All of these apps are designed for Chinese language users.

A statement on Symantec’s website read: "We expect attackers to continue to leverage this vulnerability to infect unsuspecting user devices. Symantec recommends users only download applications from reputable Android application marketplaces. Norton Mobile Security will also protect you from these and other threats and Norton Halt can also advise if your phone is susceptible to this vulnerability."

Symantec has also determined Android.Skullkey will send a text message to all your contacts with a link to a mobile game at hldc.com. This site is currently down.

Content from our partners
Unlocking growth through hybrid cloud: 5 key takeaways
How businesses can safeguard themselves on the cyber frontline
How hackers’ tactics are evolving in an increasingly complex landscape

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU