search giant Google recently threw out as many as android apps from its play store. Many of these apps had over 5 million downloads.
a team of researchers from several top tech firms has written a post to share information about the cyber attacks from a botnet that affected a number of apps on google play store this month.
the team also wished to know what is being done to curb further ambushes by cyber criminals
according to the post published by cloud delivery firm Akamai late on Monday, multiple content delivery networks (cdns) and content providers were subjected to significant attacks from a botnet dubbed ‘wirex’ on August 17.
a botnet is a network of private computers infected with malicious software and controlled as a group without the owners’ knowledge.
the ‘wirex’ botnet comprises primarily Android devices running malicious applications and is designed to create a denial-of-service (DDoS) attack — that occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.
the botnet is often associated with ransom notes to targets.
google was alerted about the presence of this malware on play store, researchers from Akamai, CloudFlare, flashpoint, Oracle dyn, risk, and other organizations who cooperated to combat this botnet, researchers wrote in the post.
shortly following the notification, Google removed hundreds of affected applications and started the process to remove the applications from all devices.
“we identified approximately 700000 apps associated with the issue, blocked them from the play store, and we’re in the process of removing them from all affected devices,” Google said in a statement.
“The researchers’ findings, combined with our own analysis, have enabled us to better protect Android users, everywhere,” the statement added.
The first available indicators of the wirex botnet appeared on August 2 as minor attacks that went unnoticed at that time.
These initial attacks were minimal and suggested that the malware was in development or in the early stages of deployment.
Prolonged attacks were identified starting from August 15, with some events sourced from a minimum of 70,000 concurrent ip addresses.
Analysis of the incoming attack data for the August 17 attack revealed that devices from more than 100 countries participated, an uncharacteristic trait for current botnets.
The investigation later revealed a connection between the attacking IPs and something malicious, running on top of the Android operating system.
According to Jared mauch, senior network architect and security researcher, akamai, the only way to be safe is by truly understanding what is happening on the internet.
“trusted information sharing groups are one of the best ways to foster that understanding. In the case of the wirex botnet, a direct result of our information sharing and other research collaboration was our ability to fully uncover what made this malicious software tick in a much more timely manner,” Mauch said.
“Working together to fight these threats benefits not only our collective customers but also internet users as a whole,” mauch added.
last week, Akamai published a report in which India ranked eighth among countries most frequently targeted for web application attacks and stood fifth on the list of source countries, with close to 12 million attacks sourced from the country.
the report said that there has been a 28 per cent year-over-year (YoY) increase in total DDoS attacks globally in the second quarter of 2017.
though the frequency of DDoS attacks increased, the number of ip addresses involved in volumetric DDoS attacks dropped 98 per cent from 595,000 to 11,000 indicating the use of fewer devices to launch such attacks.