Malware Masquerading as Android 2FA App Infected 10,000 Phones Before Removal

There are almost three and a half million apps in the Play Store, and despite Google’s alleged best efforts, malware still slips through every now and then. One recently removed app was particularly malicious, masquerading as a two-factor code manager. Known simply as 2FA Authenticator, the app picked up more than 10,000 installs until security researchers identified it as a vehicle for trojan-dropper malware.
We (and others) are always recommending two-factor authentication (2FA) as one of the best ways to secure your online accounts. Some services rely on one-time SMS codes, but 2FA apps like Google Authenticator and Authy make it easier to manage multiple 2FA tokens. 2FA Authenticator was actually a functional 2FA app — it used the open source Aegis authentication application as a base, but under that it contained the Vultur malware.
The genius of this malware is that it looked legit. You wanted a 2FA app, well this one did the job. 10,000+ people decided to give 2FA Authenticator a shot over more established names. However, the app would abuse Android permissions to copy your app list, location, and other personal information. Vultur is banking malware, which aims to steal credentials and financial information. It would also attempt to disable the lock screen and download third-party apps by pretending they are app updates. This behavior is suspicious for anyone who’s familiar with how Android works, but that’s not most people.

Perhaps the most troubling innovation in this piece of malware is an implementation of the VNC screen-sharing application. You can probably see where this is going. When people put their 2FA keys into this app, the attacker could watch in real-time to swipe banking details and two-factor codes.
The app was live for about two weeks, reports Ars Technica, longer than most malware that slips into the Play Store. It’s likely that the app’s functional 2FA capabilities helped it fly under the radar for a period of time. Google has tools to remotely nuke apps downloaded from the Play Store, but it’s unclear if it has done so in this case. Anyone who worries they downloaded the app should factory reset the phone and start changing passwords. The package name is “com.privacy.account.safetyapp.” If you see that in your app settings, it’s time to panic.
Continue reading

Samsung, Stanford Built a 10,000 PPI Display That Could Revolutionize VR, AR
Ask anyone who has spent more than a few minutes inside a VR headset, and they'll mention the screen door effect. This could eliminate it for good.

Hubble Examines 16 Psyche, the Asteroid Worth $10,000 Quadrillion
Researchers just finished an ultraviolet survey of 16 Psyche, the ultra-valuable asteroid NASA plans to visit in 2026.

Museum Uses $10,000 of Video Equipment to Make GoldenEye 007 Multiplayer Even Better
The Centre for Computing History in Cambridge is celebrating the game's 25th anniversary by making the iconic multiplayer mode even better. Instead of sharing one screen, players each get their own. All it took was $10,000 of professional video equipment.

IBM Plans to Reassign 31,000 Workers, Will Cut 10,000 Positions in 2018
IBM is firing over 10,000 workers and reassigning 30,000 more as part of yet another round of downsizing and reassignment.