The app was found on Google Play and was not the first, researchers from Kaspersky Lab said Credit: REUTERS/Mariana Bazo Security researchers have found a malicious application on Google Play that had over 500,000 downloads and was designed to gain complete control over Android devices.The application masqueraded as a guide for the popular Pokémon Go game and used multiple layers of obfuscation to bypass Google Play’s malware detection mechanisms, researchers from Kaspersky Lab said in a blog post.The app contains a malicious module that doesn’t execute immediately. Instead, the app waits for another application to be installed or uninstalled in order to determine if it’s running on a real device or in an emulated environment, like the ones used to detect malware.Once the app determines that it runs on a real device, it waits a further two hours before executing the malicious module, which then connects to a remote server and sends data about the device. The server can instruct the module to download exploits for local privilege escalation vulnerabilities that were discovered in Android between 2012 and 2015. These are known as root exploits because they grant access to the highest privileged account on Android — the root account. In other words, successful exploitation will lead to a full compromise of the device.[ ALSO ON CSO: Pokemon Go: What security awareness programs should be doing now ] Google has released patches for all of these vulnerabilities, but because of the fragmentation of the Android ecosystem, there are likely many devices out there that haven’t received all the updates.This doesn’t mean that the 500,000 downloads represent the number of compromised devices. Android has local protection features like Verify Apps and SafetyNet that are specifically designed to detect and block known root exploits.Kaspersky identified over 6,000 successful infections, primarily in Russia, India and Indonesia. “However, since the app is oriented towards English-speaking users, people in such geographies, and more, are also likely to have been hit,” the Kaspersky researchers said.The malicious “Guide for Pokémon Go” app was not the only app in the Google Play store that contained this Trojan module. Kaspersky found other such apps that were in the store at different times since December 2015. Most of the older apps had around 10,000 downloads, but one called “Digital Clock” had more than 100,000 downloads.Google has done a pretty good job at keeping malware out of its official app store over the past few years, but as this incident shows, malicious applications can still slip through from time to time. Related content brandpost How an integrated platform approach improves OT security By Richard Springer Sep 26, 2023 5 mins Security news Teachers urged to enter schoolgirls into UK’s flagship cybersecurity contest CyberFirst Girls aims to introduce girls to cybersecurity, increase diversity, and address the much-maligned skills shortage in the sector. By Michael Hill Sep 26, 2023 4 mins Back to School Education Industry IT Training news CREST, IASME to deliver UK NCSC’s Cyber Incident Exercising scheme CIE scheme aims to help organisations find quality service providers that can advise and support them in practising cyber incident response plans. By Michael Hill Sep 26, 2023 3 mins IT Governance Frameworks Incident Response Data and Information Security news Baffle releases encryption solution to secure data for generative AI Solution uses the advanced encryption standard algorithm to encrypt sensitive data throughout the generative AI pipeline. By Michael Hill Sep 26, 2023 3 mins Encryption Generative AI Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe