What are repackaged applications and how can my enterprise defend against them?
Repackaged applications are fraudulent versions of legitimate applications.
To create a repackaged app, a malicious developer could download a legitimate application from a legitimate app store, extract its legitimate files, make malicious changes and then repackage it. The malicious developer could also change the Active Directory library or insert ads into the app so he can get revenue from it.
Repackaged apps also often include the malicious files rather than redirecting users to it. In addition, the repackaging may include signing the file with a fraudulent code signing certificate so when the app is installed it would not generate a warning that the app wasn't signed. One the changes are made, the malicious developer publishes the repackaged app in an app store, and then simply waits for users to download it.
Mobile Security Engineer Peter Yan wrote in a Trend Micro Inc. blog post that the fraudulent applications they identified were not available from the Google Play store; Google has vetting mechanisms to check if files being published or their user interfaces are similar to existing apps. While the Play store has the controls in place to detect and reject repackaged apps, other app stores with less rigorous vetting -- or with the specific intent to distributed modified versions of legitimate apps -- might not reject them.
To combat the risks of repackaged apps, enterprises should update their security awareness campaigns and advise employees to only use approved app stores or use a mobile security tool to block repackaged apps. Requiring app download approval or outright blocking unapproved app stores will also help prevent these types of attacks.
Ask the Expert:
Want to ask Nick Lewis a question about enterprise threats? Submit your question now via email. (All questions are anonymous.)
Dig Deeper on BYOD and mobile device security best practices
Related Q&A from Nick Lewis
Cloud penetration testing presents new challenges for information security teams. Here's how a playbook from the Cloud Security Alliance can help ... Continue Reading
Island hopping attacks create enterprise risk by threatening their business affiliates. Here's how to create an incident response plan to mitigate ... Continue Reading
Many cloud providers are tight-lipped about internal security control details. Learn how to evaluate cloud security providers with certifications and... Continue Reading