{"id":117014,"date":"2022-06-30T07:00:00","date_gmt":"2022-06-30T14:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=117014"},"modified":"2023-09-11T14:57:45","modified_gmt":"2023-09-11T21:57:45","slug":"toll-fraud-malware-how-an-android-application-can-drain-your-wallet","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/30\/toll-fraud-malware-how-an-android-application-can-drain-your-wallet\/","title":{"rendered":"Toll fraud malware: How an Android application can drain your wallet"},"content":{"rendered":"\n
Toll fraud malware, a subcategory of billing fraud in which malicious applications subscribe users to premium services without their knowledge or consent, is one of the most prevalent types of Android malware \u2013 and it continues to evolve.<\/p>\n\n\n\n
Compared to other subcategories of billing fraud, which include SMS fraud and call fraud, toll fraud has unique behaviors. Whereas SMS fraud or call fraud use a simple attack flow to send messages or calls to a premium number, toll fraud has a complex multi-step attack flow that malware developers continue to improve.<\/p>\n\n\n\n
For example, we saw new capabilities related to how this threat targets users of specific network operators. It performs its routines only if the device is subscribed to any of its target network operators. It also, by default, uses cellular connection for its activities and forces devices to connect to the mobile network even if a Wi-Fi connection is available. Once the connection to a target network is confirmed, it stealthily initiates a fraudulent subscription and confirms it without the user\u2019s consent, in some cases even intercepting the one-time password (OTP) to do so. It then suppresses SMS notifications related to the subscription to prevent the user from becoming aware of the fraudulent transaction and unsubscribing from the service.<\/p>\n\n\n\n
Another unique behavior of toll fraud malware is its use of dynamic code loading, which makes it difficult for mobile security solutions to detect threats through static analysis, since parts of the code are downloaded onto the device in certain parts of the attack flow. Despite this evasion technique, we\u2019ve identified characteristics that can be used to filter and detect this threat. We also see adjustments in Android API restrictions and Google Play Store publishing policy that can help mitigate this threat.<\/p>\n\n\n\n
Toll fraud has drawn media attention since Joker, its first major malware family, found its way to the Google Play Store back in 2017. Despite this attention, there\u2019s not a lot of published material about how this type of malware carries out its fraudulent activities. Our goal for this blog post is to share an in-depth analysis on how this malware operates, how analysts can better identify such threats, and how Android security can be improved to mitigate toll fraud. This blog covers the following topics:<\/p>\n\n\n\n
To understand toll fraud malware, we need to know more about the billing mechanism that attackers use. The commonly used type of billing in toll fraud is Wireless Application Protocol (WAP). WAP billing is a payment mechanism that enables consumers to subscribe to paid content from sites that support this protocol and get charged directly through their mobile phone bill. The subscription process starts with the customer initiating a session with the service provider over a cellular network and navigating to the website that provides the paid service. As a second step, the user must click a subscription button, and, in some cases, receive a one-time password (OTP) that has to be sent back to the service provider to verify the subscription. The overall process is depicted below:<\/p>\n\n\n\n It should be noted that the process depends on the service provider, thus not all steps are always present. For example, some providers do not require an OTP, which means that the mobile user can subscribe to a service by simply clicking the subscription button while the device is connected to a cellular network. <\/p>\n\n\n\n We classify a subscription as fraudulent when it takes place without a user’s consent. In the case of toll fraud, the malware performs the subscription on behalf of the user in a way that the overall process isn\u2019t perceivable through the following steps:<\/p>\n\n\n\n One significant and permissionless inspection that the malware does before performing these steps is to identify the subscriber’s country and mobile network through the mobile country codes (MCC) and mobile network codes (MNC). This inspection is done to target users within a specific country or region. Both codes can be fetched by using either the TelephonyManager<\/em>or the SystemProperties<\/em>class. The TelephonyManager.getSimOperator()<\/em> API call returns the MCC and MNCcodes as a concatenated string, while other functions of the same class can be used to retrieve various information about the mobile network that the device is currently subscribed to. As the network and SIM operator may differ (e.g., in roaming), the getSimOperator<\/em>function is usually preferred by malware developers.<\/p>\n\n\n\n The same type of information can be fetched by using the SystemProperties.get(String key)<\/em> function where the key parameter may be one or several (using multiple calls) of the following strings: gsm.operator.numeric, gsm.sim.operator.numeric, gsm.operator.iso-country, gsm.sim.operator.iso-country, gsm.operator.alpha, gsm.sim.operator.alpha<\/em><\/p>\n\n\n\n The difference with the first call is that the android.os.SystemProperties<\/em> class is marked as @SystemApi<\/em>, therefore an application has to use Java reflection to invoke the function. The MNC and MCC codes are also used to evade detection, as the malicious activity won\u2019t be performed unless the SIM operator belongs to the ones targeted:<\/p>\n\n\n\n The following sections present an analysis of the fraudulent subscription steps in the context of the Android operating system. This analysis can help identify the API calls and the permissions needed for the implementation of a toll fraud scheme.<\/p>\n\n\n\n Variants of toll fraud malware targeting Android API level 28 (Android 9.0) or lower disable the Wi-Fi by invoking the setWifiEnabled <\/em>method of the WifiManager <\/em>class. The permissions needed for this call are ACCESS_WIFI_STATE<\/em> and CHANGE_WIFI_STATE<\/em>. <\/strong>Since the protection level for both permissions is set to normal, they are automatically approved by the system.<\/p>\n\n\n\n Meanwhile, malware targeting a higher API level uses the requestNetwork<\/em> function of the ConnectivityManager<\/em>class. The Android developers page<\/a> describes the requestNetwork method <\/em>as:<\/p>\n\n\n\n This method will attempt to find the best network that matches the given NetworkRequest, and to bring up one that does if none currently satisfies the criteria. The platform will evaluate which network is the best at its own discretion. Throughput, latency, cost per byte, policy, user preference and other considerations may be factored in the decision of what is considered the best network.<\/em><\/p>\n\n\n\n The required permission for this call is either CHANGE_NETWORK_STATE<\/em> (protection level: normal) or WRITE_SETTINGS<\/em>(protection level: signature|preinstalled|appop|pre23), but since the latter is protected, the former is usually preferred by malware developers. In the code snippet depicted below from a malware sample that can perform toll fraud, the function vgy7<\/em>is requesting a TRANSPORT_CELLULAR<\/em> transport type (Constant Value: 0x00000000) with NET_CAPABILITY_INTERNET<\/em> (Constant Value: 0x0000000c):<\/em><\/p>\n\n\n\n Figure 3. Code from a Joker malware sample requesting a TRANSPORT_CELLULAR transport type<\/em><\/p>\n\n\n\n The NetworkCallback<\/em>is used to monitor the network status and retrieve a network<\/em>type variable that can be used to bind the process to a particular network via the ConnectivityManager.bindProcessToNetwork<\/em>function. This allows the malware to use the mobile network even when there is an existing Wi-Fi connection. The proof-of-concept code depicted below uses the techniques described above to request a TRANSPORT_CELLULAR<\/em> transport type. If the transport type is available, it binds the process to the mobile network to load the host at example.com in the application\u2019s WebView:<\/p>\n\n\n\n While it is expected that the Wi-Fi connection is preferred even when mobile connection is also available, the process exclusively uses the cellular network to communicate with the server:<\/p>\n\n\n\n In fact, the user must manually disable mobile data to prevent the malware from using the cellular network. <\/strong>Even though the setWifiEnabled<\/em>has been deprecated, it can still be used by malware targeting API level 28 or lower.<\/p>\n\n\n\n Assuming that the SIM operator is on the target list and the device is using a TRANSPORT_CELLULAR<\/em>type network, the next step is to fetch a list of websites offering premium services and attempt to automatically subscribe to them.<\/p>\n\n\n\n The malware will communicate with a C2 server to retrieve a list of offered services. An offer contains, between else, a URL which will lead to a redirection chain that will end up to a web page, known as landing page.<\/p>\n\n\n\n What happens next depends on the way that the subscription process is initiated, thus the malware usually includes code that can handle various subscription flows. In a typical case scenario, the user has to click an HTML element similar to the one depicted below (JOIN NOW), and as a second step, send a verification code back to the server:<\/p>\n\n\n\n For the malware to do this automatically, it observes the page loading progress and injects JavaScript code designed to click HTML elements that initiate the subscription. As the user can only subscribe once to one service, the code also marks the HTML page using a cookie to avoid duplicate subscriptions. The following is an example of such a code:<\/p>\n\n\n\n On line 76, getElementsByTagName<\/em>returns a collection of all the Document Object Model (DOM) elements tagged as input<\/em>. The loop on line 78 goes through every element and checks its type<\/em>as well as its name<\/em>, value,<\/em> and alt<\/em>properties. When an element is found to contain keywords, such as \u201cconfirm\u201d, \u201cclick\u201d, and \u201ccontinue\u201d, it is sent to the c<\/em>function, as depicted below:<\/p>\n\n\n\n The if<\/em> statement on line 36 checks if the element has already been clicked by calling the jdh <\/em>function, displayed below in Figure 12. Finally, the c <\/em>function invokes the click()<\/em> or submit()<\/em> function by the time the branch on line 37 (see figure 11) is followed:<\/p>\n\n\n\n The HTML page loading process is tracked using an onPageFinished<\/em>callback of the WebViewClient<\/em>attached to the WebView. Subsequently, a handler that listens for relative message types acts depending on the next steps that are required for the subscription to take place. In the code snippet below, the URL loaded in the WebView and a signal<\/em>with id<\/em> \u201c128\u201dis sent to handler2<\/em>to evaluate the service and initiate the subscription process:<\/p>\n\n\n\n Multi-step or target subscription processes may require additional verification steps. The handler depicted below checks the page URL loaded in the WebView. If the URL matches doi[.]mtndep.co.za\/service\/,<\/em> then the handler runs the JavaScript code assigned to the Properties.call_jbridge_dump<\/em> variable:<\/p>\n\n\n\n A signal<\/em> with id<\/em> \u201c107\u201d triggers some additional steps that require communication with the command and control (C2) server. This case is demonstrated in the following figures:<\/p>\n\n\n\n Upon receiving the signal, the handler invokes the v1.bhu8<\/em> function:<\/p>\n\n\n\n After checking for the web-zdm[.]secure-d[.]io\/api\/v1\/activate<\/em>in the server\u2019s reply, the malware invokes the tpack[.]l2.bhu8[.]vgy7 <\/em>function. This function sends the current URL loaded in the application\u2019s WebView as well as some extra information like country code, and HTML code:<\/p>\n\n\n\n In most cases, the service provider sends an OTP that must be sent back to the server to complete the subscription process. As the OTP can be sent by using either the HTTP or USSD protocol or SMS, the malware must be capable of intercepting these types of communication. For the HTTP protocol, the server\u2019s reply must be parsed to extract the token. For the USSD protocol, on the other hand, the only way to intercept is by using the accessibility service.<\/p>\n\n\n\n One method of intercepting an SMS message, requiring android.permission.RECEIVE_<\/em>SMS<\/em> permission, is to instantiate a BroadcastReceiver<\/em> that listens for the SMS_<\/em>RECEIVED action.<\/p>\n\n\n\n The following code snippet creates a BroadcastReceiver<\/em>and overrides the onReceive<\/em>callback of the superclass to filter out messages that start with \u201crch\u201d:<\/p>\n\n\n\n Subsequently, it creates an IntentFilter<\/em>, which renders the receiver capable of listening for an SMS_RECEIVED<\/em> action, and finally the receiver is registered dynamically:<\/p>\n\n\n\n To handle OTP messages that are sent using the HTTP protocol, the malware parses the HTML code to search for keywords indicating the verification token. The following code contains a flow where the extracted token is sent to the server using the sendTextMessage<\/em> API call:<\/p>\n\n\n\n The additional permission that is required to enable this flow is SEND_SMS<\/em>.<\/p>\n\n\n\n Another way of intercepting SMS messages is to extend the NotificationListenerService<\/em><\/a>. This service receives calls from the system when new notifications are posted or removed, including the ones sent from the system\u2019s default SMS application. The code snippet below demonstrates this functionality:<\/p>\n\n\n\nFraudulent subscriptions via toll fraud<\/h2>\n\n\n\n
Forcing cellular communication<\/h3>\n\n\n\n
Fetching premium service offers and initiating subscriptions<\/h3>\n\n\n\n
Intercepting OTPs<\/h3>\n\n\n\n