{"id":90004,"date":"2018-06-27T18:31:57","date_gmt":"2018-06-28T01:31:57","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=90004"},"modified":"2025-05-27T22:34:19","modified_gmt":"2025-05-28T05:34:19","slug":"asiahitgroup-gang-again-sneaks-billing-fraud-apps-onto-google-play","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/asiahitgroup-gang-again-sneaks-billing-fraud-apps-onto-google-play\/","title":{"rendered":"AsiaHitGroup Gang Again Sneaks Billing-Fraud Apps Onto Google Play"},"content":{"rendered":"<p>The McAfee Mobile Research team has found a new billing-fraud campaign of at least 15 apps published in 2018 on Google Play. Toll fraud (which includes <a href=\"https:\/\/en.wikipedia.org\/wiki\/WAP_billing\" target=\"_blank\" rel=\"noopener\">WAP billing<\/a> fraud) is a leading category of potentially harmful apps on Google Play, according to the report <a href=\"https:\/\/source.android.com\/security\/reports\/Google_Android_Security_2017_Report_Final.pdf\" target=\"_blank\" rel=\"noopener\"><em>Android Security 2017 Year in Review.<\/em><\/a> This new campaign demonstrates that cybercriminals keep finding new ways to steal money from victims using apps on official stores such as Google Play.<\/p>\n<p>The AsiaHitGroup Gang has been active since at least late 2016 with the distribution of the fake-installer applications Sonvpay.A, which attempted to charge at least 20,000 victims from primarily Thailand and Malaysia for the download of copies of popular applications. One year later, in November 2017, a new campaign was <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/11\/new-trojan-malware-discovered-google-play\/\" target=\"_blank\" rel=\"noopener\">discovered on Google Play<\/a>, Sonvpay.B, used IP address geolocation to confirm the country of the victim and added Russian victims to the WAP billing fraud to increase its potential to steal money from unsuspected users.<\/p>\n<p>In January 2018, the AsiaHitGroup Gang returned to Google Play with the repackaged app, Sonvpay.C, which uses silent background push notifications to trigger a fake update dialog. When victims start the \u201cupdate\u201d they instead subscribe to a premium-rate service. The subscription operates primarily via WAP billing, which does not require sending SMS messages to premium-rate numbers. Instead it requires only that users employ the mobile network to access a specific website and automatically click on a button to initiate the subscription process.\u00a0Based on the approximate number of installations from Google Play, the cost of the premium-service subscription, and the days that these apps were available, we estimate that the AsiaHitGroup Gang could have potentially earned between $60,500\u2013$145,000 since January.<\/p>\n<h2>Sonvpay on Google Play<\/h2>\n<p>The McAfee Mobile Research team initially found the following applications repackaged with Sonvpay on Google Play, all of them published this year:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90006\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-1.png\" alt=\"\" width=\"1428\" height=\"348\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-1.png 1428w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-1-300x73.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-1-768x187.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-1-1024x250.png 1024w\" sizes=\"auto, (max-width: 1428px) 100vw, 1428px\" \/><\/a><\/p>\n<p><em>Figure 1. Sonvpay apps found on Google Play.<\/em><\/p>\n<p>We notified Google about these apps on April 10 and they were promptly removed. A couple of days later the app \u201cDespacito for Ringtone\u201d was found again on the store and was quickly removed. In total we found 15 apps that were installed at least 50,000 times since the first one, Cut Ringtones 2018, was released on Google Play in January 2018. The following table lists the 15 malicious apps:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-2-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90027\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-2-1.png\" alt=\"\" width=\"930\" height=\"545\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-2-1.png 930w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-2-1-300x176.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-2-1-768x450.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-2-1-853x500.png 853w\" sizes=\"auto, (max-width: 930px) 100vw, 930px\" \/><\/a><\/p>\n<p>At the time of download, the only red flag that a user could notice is that the app needs access to SMS messages. Once installed and executed, the app behaves as expected (QR code reader, ring tones, etc.). However, in the background and without the user\u2019s knowledge, Sonvpay listens for incoming push notifications that contain the data to perform mobile billing fraud.<\/p>\n<h2>Background Push Notification and Fake Update Screen<\/h2>\n<p>Sonvpay employs the onesignal push notification service to get the information to subscribe users to premium-rate services. To receive the data in the background without displaying a notification, Sonvpay implements the method \u201conNotificationProcessing\u201d and returns \u201ctrue\u201d to make the notification silent:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90008\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-3.png\" alt=\"\" width=\"740\" height=\"525\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-3.png 740w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-3-300x213.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-3-705x500.png 705w\" sizes=\"auto, (max-width: 740px) 100vw, 740px\" \/><\/a><em>Figure 2. Silent background notification.<\/em><\/p>\n<p>The received data can perform WAP and SMS fraud along with information necessary to display a fake update notification to the user after some time of using the repackaged application. This fake notification has only one bogus button. If the user scrolls until the end, the misleading phrase \u201cClick Skip is to agree\u201d appears:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90009\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-4.png\" alt=\"\" width=\"432\" height=\"476\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-4.png 432w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-4-272x300.png 272w\" sizes=\"auto, (max-width: 432px) 100vw, 432px\" \/><\/a><\/p>\n<p><em>Figure 3. Fake update notification.<\/em><\/p>\n<p>If the user clicks the only button, Sonvpay will do its job. However, even if there is no interaction with this window and the data in the push notification has the value \u201cprice\u201d as empty, Sonvpay will proceed to subscribe to a premium-rate service:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-5.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90010\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-5.png\" alt=\"\" width=\"682\" height=\"138\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-5.png 682w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-5-300x61.png 300w\" sizes=\"auto, (max-width: 682px) 100vw, 682px\" \/><\/a><\/p>\n<p><em>Figure 4. Starting mobile billing fraud if \u201cprice\u201d value is empty.<\/em><\/p>\n<h2>Downloading the Dynamic Payload from a Remote Server<\/h2>\n<p>One of the parameters obtained from the silent push notification is a URL to request the location of functionality to perform mobile billing fraud. Once the fake update notification is displayed, Sonvpay requests the download of the library from another remote server:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-6.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90011\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-6.png\" alt=\"\" width=\"668\" height=\"105\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-6.png 668w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-6-300x47.png 300w\" sizes=\"auto, (max-width: 668px) 100vw, 668px\" \/><\/a><\/p>\n<p><em>Figure 5. Sonvpay requesting library with additional functionality.<\/em><\/p>\n<p>The new APK file is downloaded and stored in the path \/sdcard\/Android\/&lt;package_name&gt;\/cache\/ so that it can be dynamically loaded and executed at runtime. The library we obtained for performing mobile billing fraud targeted only Kazakhstan and Malaysia but, because the library is present in a remote server and can be dynamically loaded, it can likely be updated at any time to target more countries or mobile operators.<\/p>\n<h2>WAP Billing and SMS Fraud<\/h2>\n<p>In the case of Kazakhstan, Sonvpay loads a specific URL delivered through the silent push notification and uses JavaScript to click on a button and on the element \u201cactivate\u201d to fraudulently subscribe the user to a premium-rate service:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-7.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90012\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-7.png\" alt=\"\" width=\"833\" height=\"209\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-7.png 833w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-7-300x75.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-7-768x193.png 768w\" sizes=\"auto, (max-width: 833px) 100vw, 833px\" \/><\/a><\/p>\n<p><em>Figure 6. WAP billing fraud in Kazakhstan.<\/em><\/p>\n<p>For Malaysia, the malware creates a new WebView to send the \u201cShortcode\u201d and \u201cKeyword\u201d parameters to a specific URL to subscribe the user to a WAP billing service:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-8.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90013\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-8.png\" alt=\"\" width=\"781\" height=\"224\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-8.png 781w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-8-300x86.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-8-768x220.png 768w\" sizes=\"auto, (max-width: 781px) 100vw, 781px\" \/><\/a><\/p>\n<p><em>Figure 7. WAP billing fraud in Malaysia.<\/em><\/p>\n<p>However, for Malaysia the app needs to intercept a confirmation code (PIN) sent by the mobile operator via SMS. Sonvpay has this SMS interception functionality implemented in the original repackaged application:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-9.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90014\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-9.png\" alt=\"\" width=\"789\" height=\"122\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-9.png 789w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-9-300x46.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-9-768x119.png 768w\" sizes=\"auto, (max-width: 789px) 100vw, 789px\" \/><\/a><\/p>\n<p><em>Figure 8. Processing an intercepted SMS message to get the confirmation PIN.<\/em><\/p>\n<p>Once the PIN is obtained, it is sent to the mobile operator via a web request to automatically confirm the subscription. If the parameters for Kazakhstan or Malaysia do not match, Sonvpay still tries to perform mobile billing fraud by attempting to send an SMS message to a premium-rate number provided via the silent push notification:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-10.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90015\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-10.png\" alt=\"\" width=\"700\" height=\"126\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-10.png 700w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-10-300x54.png 300w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/a><\/p>\n<p><em>Figure 9. Functionality to send an SMS message to a premium-rate number.<\/em><\/p>\n<h2>Closer\u00a0Look to Previous Campaigns<\/h2>\n<p>While looking for patterns in the 2018 campaign, we found the app DJ Mixer\u2013Music Mixer. As soon as this application executes, it checks if the device has an Internet connection. If the device is offline, the app shows the error message \u201cYou connect to internet to continue\u201d and ends its execution. If the device is online, the app executes a web request to a specific URL:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-11.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90016\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-11.png\" alt=\"\" width=\"757\" height=\"69\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-11.png 757w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-11-300x27.png 300w\" sizes=\"auto, (max-width: 757px) 100vw, 757px\" \/><\/a><\/p>\n<p><em>Figure 10. Web request to the AsiaHitGroup Gang URL.<\/em><\/p>\n<p>We learned the apps created by the developer SHINY Team 2017 were available on Google Play in September 2017; earlier Sonvpay variants <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/11\/new-trojan-malware-discovered-google-play\/\">were discovered<\/a> in November 2017. The primary behavior of the two variants is almost the same\u2014including the changing of the main icon and the app\u2019s name to Download Manager to hide its presence from the user. However, with DJ Mixer, the geolocation of the IP address identifies the country of the infected device and aids the execution of the mobile billing fraud:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-12.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90017\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-12.png\" alt=\"\" width=\"648\" height=\"223\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-12.png 648w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-12-300x103.png 300w\" sizes=\"auto, (max-width: 648px) 100vw, 648px\" \/><\/a><\/p>\n<p><em>Figure 11. Using IP geolocation to target specific countries.<\/em><\/p>\n<p>In this case only three countries are targeted via the geolocation service: Russia (RU), Thailand (TH), and Malaysia (MY). If the IP address of the infected devices is not from any of these countries, a dialog will claim the app is not active and that the user needs to uninstall and update to the latest version.<\/p>\n<p>If the country is Thailand or Malaysia, the malicious app randomly selects a keyword to select an image to offer users premium-rate services. With Malaysia the image includes English text with terms of service and the button \u201cSubscribe\u201d to accept the randomly selected premium-rate service:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-13.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90018\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-13.jpg\" alt=\"\" width=\"677\" height=\"576\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-13.jpg 677w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-13-300x255.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-13-588x500.jpg 588w\" sizes=\"auto, (max-width: 677px) 100vw, 677px\" \/><\/a><\/p>\n<p><em>Figure 12. Screens displayed when the country of the IP address is Malaysia.<\/em><\/p>\n<p>In the case of Thailand, the text is in Thai and includes a small version of terms of service along with instructions to unsubscribe and stop the charges:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-14.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90019\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-14.jpg\" alt=\"\" width=\"657\" height=\"521\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-14.jpg 657w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-14-300x238.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-14-631x500.jpg 631w\" sizes=\"auto, (max-width: 657px) 100vw, 657px\" \/><\/a><\/p>\n<p><em>Figure 13. Screens shown when the country of the IP address is Thailand.<\/em><\/p>\n<p>Finally, with Russia no image is shown to the user. The app fraudulently charges the user via WAP billing while enabling 3G and disabling Wi-Fi:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-15.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90020\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-15.png\" alt=\"\" width=\"809\" height=\"272\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-15.png 809w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-15-300x101.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-15-768x258.png 768w\" sizes=\"auto, (max-width: 809px) 100vw, 809px\" \/><\/a><\/p>\n<p><em>Figure 14. Forcing the use of 3G to start WAP billing fraud.<\/em><\/p>\n<p>We also found similar apps from late 2016 that performed SMS fraud by pretending to be legitimate popular applications and asking the user to pay for them. These are similar to text seen in the 2018 campaign as an update but labeled as Term of user:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-16.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90021\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-16.png\" alt=\"\" width=\"889\" height=\"815\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-16.png 889w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-16-300x275.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-16-768x704.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-16-545x500.png 545w\" sizes=\"auto, (max-width: 889px) 100vw, 889px\" \/><\/a><\/p>\n<p><em>Figure 15. Fake-installer behavior asking the user to pay for a popular legitimate app.<\/em><\/p>\n<p>If the user clicks \u201cNo,\u201d the app executes as expected. However, if the user clicks \u201cYes,\u201d the app subscribes the user to a premium-rate service by sending an SMS message with a specific keyword to a short number. Next the mobile operator sends the device a PIN via SMS; the malware intercepts the PIN and returns it via web request to confirm the subscription.<\/p>\n<p>Once the user is fraudulently subscribed to a premium-rate service to download a copy of a free app on official app stores, the malware shows the dialog \u201cDownloading game&#8230;\u201d and proceeds with the download of another APK stored on a third-party server. Although the APK file that we downloaded from the remote server is a copy of the legitimate popular app, the file can be changed at any point to deliver additional malware.<\/p>\n<p>Unlike in previous campaigns, we did not find evidence that these fake-installer apps were distributed via Google Play. We believe that they were distributed via fake third-party markets from which users looking for popular apps are tricked into downloading APK files from unknown sources.\u00a0\u00a0In June 2018 ESET and Sophos found a new version of this variant pretending to be the popular game Fortnite. The fake game was distributed via a YouTube video by asking the user to download the fake app from a specific URL. This recent campaign shows that the cybercriminals behind this threat are still active tricking users into installing these fake applications.<\/p>\n<h2>Connections Among Campaigns<\/h2>\n<p>All of these campaigns rely on billing-fraud apps targeting users in Southeast and Central Asia and offer some similarities in behavior such as the use of almost the same text and images to trick users into subscribing to premium-rate services. Other potential connections among the three campaigns suggest that all the apps are likely from the same actor group. For example, apps from all campaigns use the same string as debug log tag:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-17.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90022\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-17.png\" alt=\"\" width=\"939\" height=\"140\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-17.png 939w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-17-300x45.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-17-768x115.png 768w\" sizes=\"auto, (max-width: 939px) 100vw, 939px\" \/><\/a><\/p>\n<p><em>Figure 16. The \u201cSonLv\u201d string used as a log tag occurs in all campaigns.<\/em><\/p>\n<p>There is also a notable similarity in package and classes names and in the use of a common framework (telpoo.frame) to perform typical tasks such as database, networking, and interface support:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-18.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90023\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-18.png\" alt=\"\" width=\"639\" height=\"390\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-18.png 639w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-18-300x183.png 300w\" sizes=\"auto, (max-width: 639px) 100vw, 639px\" \/><\/a><\/p>\n<p><em>Figure 17. Common package and classes names in all campaigns.<\/em><\/p>\n<p>Finally, apps from the Google Play campaigns use the domain vilandsoft[.]com to check for updates. The same domain is also used by apps from the fake-installer campaign to deliver remote-execution commands, for example, action_sendsms:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-19.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90024\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-19.png\" alt=\"\" width=\"894\" height=\"359\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-19.png 894w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-19-300x120.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-19-768x308.png 768w\" sizes=\"auto, (max-width: 894px) 100vw, 894px\" \/><\/a><\/p>\n<p><em>Figure 18. A fake-installer app checking for the command action_sendsms.<\/em><\/p>\n<p>The following timeline identifies the campaigns we have found from this group, strategies to trick users into installing the apps, distribution methods, main payload, and targeted countries:<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-21.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-90109\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-21.png\" alt=\"\" width=\"627\" height=\"280\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-21.png 627w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-21-300x134.png 300w\" sizes=\"auto, (max-width: 627px) 100vw, 627px\" \/><\/a><\/p>\n<p><em>Figure 19. A timeline of Sonvpay campaigns.<\/em><\/p>\n<h2>Conclusion<\/h2>\n<p>Sonvpay campaigns are one example of how cybercriminals like the AsiaHitGroup Gang constantly adapt their tactics to trick users into subscribing to premium-rate services and boosting their profits. The campaigns started in late 2016 with very simple fake installers that charged users for copies of popular apps. In late 2017, Google Play apps abused WAP-billing services and used IP address geolocation to target specific countries. In 2018, Google Play apps used silent background push notifications to trigger the display of a fake update message and to gather data for mobile billing fraud. We expect that cybercriminals will continue to develop and distribute new billing fraud campaigns to target more countries and affect more users around the world.<\/p>\n<p>Cybercriminals always follow the money, and one of the most effective ways to steal money from users is via billing fraud. A victim will likely not notice a fraudulent charge, for example, until it appears on the mobile bill at the end of the month. Even when the payment is detected early, most of the time the charge is for a subscription rather than a one-time payment. Thus victims will need to find a way to unsubscribe from the premium-rate service, which may not be easy if the subscription occurred silently or if the app does not provide that information. Also, the fact that WAP-billing fraud does not require sending an SMS message to a premium-rate number makes it easier to commit. Cybercriminals need to only silently subscribe users by forcing them to load the WAP-billing service page and click on buttons. For these reasons we expect that mobile billing fraud will continue to target Android users.<\/p>\n<p>McAfee Mobile Security detects this threat as Android\/Sonvpay. To protect yourselves from this and similar threats, employ security software on your mobile devices, check user reviews for apps on Google Play, and do not accept or trust apps that ask for payment functionality via SMS messages as soon as the app is opened or without any interaction.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The McAfee Mobile Research team has found a new billing-fraud campaign of at least 15 apps published in 2018 on&#8230;<\/p>\n","protected":false},"author":462,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[5526,37,76,214],"coauthors":[1104],"class_list":["post-90004","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-advanced-threat-research","tag-android","tag-cybercrime","tag-mobile-security1"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>AsiaHitGroup Gang Again Sneaks Billing-Fraud Apps Onto Google Play | McAfee Blog<\/title>\n<meta name=\"description\" content=\"The McAfee Mobile Research team has found a new billing-fraud campaign of at least 15 apps published in 2018 on Google Play. Toll fraud (which includes\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AsiaHitGroup Gang Again Sneaks Billing-Fraud Apps Onto Google Play | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"The McAfee Mobile Research team has found a new billing-fraud campaign of at least 15 apps published in 2018 on Google Play. Toll fraud (which includes\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/asiahitgroup-gang-again-sneaks-billing-fraud-apps-onto-google-play\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-28T01:31:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-28T05:34:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1428\" \/>\n\t<meta property=\"og:image:height\" content=\"348\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Carlos Castillo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@carlosacastillo\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Carlos Castillo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/asiahitgroup-gang-again-sneaks-billing-fraud-apps-onto-google-play\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/asiahitgroup-gang-again-sneaks-billing-fraud-apps-onto-google-play\/\"},\"author\":{\"name\":\"Carlos Castillo\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/894ee4a790607d505a13c24955d2edbe\"},\"headline\":\"AsiaHitGroup Gang Again Sneaks Billing-Fraud Apps Onto Google Play\",\"datePublished\":\"2018-06-28T01:31:57+00:00\",\"dateModified\":\"2025-05-28T05:34:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/asiahitgroup-gang-again-sneaks-billing-fraud-apps-onto-google-play\/\"},\"wordCount\":2127,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/asiahitgroup-gang-again-sneaks-billing-fraud-apps-onto-google-play\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-1.png\",\"keywords\":[\"Advanced Threat Research\",\"android\",\"cybercrime\",\"mobile security\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/asiahitgroup-gang-again-sneaks-billing-fraud-apps-onto-google-play\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/asiahitgroup-gang-again-sneaks-billing-fraud-apps-onto-google-play\/\",\"name\":\"AsiaHitGroup Gang Again Sneaks Billing-Fraud Apps Onto Google Play | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/asiahitgroup-gang-again-sneaks-billing-fraud-apps-onto-google-play\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/asiahitgroup-gang-again-sneaks-billing-fraud-apps-onto-google-play\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-1.png\",\"datePublished\":\"2018-06-28T01:31:57+00:00\",\"dateModified\":\"2025-05-28T05:34:19+00:00\",\"description\":\"The McAfee Mobile Research team has found a new billing-fraud campaign of at least 15 apps published in 2018 on Google Play. Toll fraud (which includes\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/asiahitgroup-gang-again-sneaks-billing-fraud-apps-onto-google-play\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/asiahitgroup-gang-again-sneaks-billing-fraud-apps-onto-google-play\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/asiahitgroup-gang-again-sneaks-billing-fraud-apps-onto-google-play\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-1.png\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/asiahitgroup-gang-again-sneaks-billing-fraud-apps-onto-google-play\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"AsiaHitGroup Gang Again Sneaks Billing-Fraud Apps Onto Google Play\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/894ee4a790607d505a13c24955d2edbe\",\"name\":\"Carlos Castillo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/729f5b9d2761341175762c5f10652607\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Carlos-Castillo-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Carlos-Castillo-96x96.jpg\",\"caption\":\"Carlos Castillo\"},\"description\":\"Carlos Castillo specializes in the analysis of mobile threats and Android malware. Castillo performs static and dynamic analysis of suspicious applications to support McAfee\u2019s Mobile Security for Android product. He is the author of the McAfee-published white paper, \\\"Android Malware Past, Present, and Future,\u201d and wrote the \u201cHacking Android\\\" section of the book, \\\"Hacking Exposed 7: Network Security Secrets &amp; Solutions.\u201d As a recognized mobile malware researcher, Castillo has presented at several security industry events, including 8.8 Computer Security Conference and Segurinfo, a leading information security conference in South America. Prior to his position at McAfee, Castillo performed security compliance audits for the Superintendencia Financiera of Colombia, and worked at security startup Easy Solutions Inc., where he conducted penetration tests on web applications, helped shut down phishing and malicious websites, supported security and network appliances, performed functional software testing, and assisted in research and development related to anti-electronic fraud. Castillo joined the world of malware research when he won ESET Latin America\u2019s Best Antivirus Research contest with a paper titled, \u201cSexy View: The Beginning of Mobile Botnets.\u201d Castillo holds a degree in systems engineering from the Universidad Javeriana in Bogot\u00e1, Colombia.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/carlosacastillo\/\",\"https:\/\/x.com\/carlosacastillo\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/carlos-castillo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AsiaHitGroup Gang Again Sneaks Billing-Fraud Apps Onto Google Play | McAfee Blog","description":"The McAfee Mobile Research team has found a new billing-fraud campaign of at least 15 apps published in 2018 on Google Play. Toll fraud (which includes","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"AsiaHitGroup Gang Again Sneaks Billing-Fraud Apps Onto Google Play | McAfee Blog","og_description":"The McAfee Mobile Research team has found a new billing-fraud campaign of at least 15 apps published in 2018 on Google Play. Toll fraud (which includes","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/asiahitgroup-gang-again-sneaks-billing-fraud-apps-onto-google-play\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2018-06-28T01:31:57+00:00","article_modified_time":"2025-05-28T05:34:19+00:00","og_image":[{"width":1428,"height":348,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-1.png","type":"image\/png"}],"author":"Carlos Castillo","twitter_card":"summary_large_image","twitter_creator":"@carlosacastillo","twitter_site":"@McAfee","twitter_misc":{"Written by":"Carlos Castillo","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/asiahitgroup-gang-again-sneaks-billing-fraud-apps-onto-google-play\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/asiahitgroup-gang-again-sneaks-billing-fraud-apps-onto-google-play\/"},"author":{"name":"Carlos Castillo","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/894ee4a790607d505a13c24955d2edbe"},"headline":"AsiaHitGroup Gang Again Sneaks Billing-Fraud Apps Onto Google Play","datePublished":"2018-06-28T01:31:57+00:00","dateModified":"2025-05-28T05:34:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/asiahitgroup-gang-again-sneaks-billing-fraud-apps-onto-google-play\/"},"wordCount":2127,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/asiahitgroup-gang-again-sneaks-billing-fraud-apps-onto-google-play\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-1.png","keywords":["Advanced Threat Research","android","cybercrime","mobile security"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/asiahitgroup-gang-again-sneaks-billing-fraud-apps-onto-google-play\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/asiahitgroup-gang-again-sneaks-billing-fraud-apps-onto-google-play\/","name":"AsiaHitGroup Gang Again Sneaks Billing-Fraud Apps Onto Google Play | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/asiahitgroup-gang-again-sneaks-billing-fraud-apps-onto-google-play\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/asiahitgroup-gang-again-sneaks-billing-fraud-apps-onto-google-play\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-1.png","datePublished":"2018-06-28T01:31:57+00:00","dateModified":"2025-05-28T05:34:19+00:00","description":"The McAfee Mobile Research team has found a new billing-fraud campaign of at least 15 apps published in 2018 on Google Play. Toll fraud (which includes","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/asiahitgroup-gang-again-sneaks-billing-fraud-apps-onto-google-play\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/asiahitgroup-gang-again-sneaks-billing-fraud-apps-onto-google-play\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/asiahitgroup-gang-again-sneaks-billing-fraud-apps-onto-google-play\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-1.png","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/06\/20180619-Sonvpay-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/asiahitgroup-gang-again-sneaks-billing-fraud-apps-onto-google-play\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"AsiaHitGroup Gang Again Sneaks Billing-Fraud Apps Onto Google Play"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/894ee4a790607d505a13c24955d2edbe","name":"Carlos Castillo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/729f5b9d2761341175762c5f10652607","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Carlos-Castillo-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Carlos-Castillo-96x96.jpg","caption":"Carlos Castillo"},"description":"Carlos Castillo specializes in the analysis of mobile threats and Android malware. Castillo performs static and dynamic analysis of suspicious applications to support McAfee\u2019s Mobile Security for Android product. He is the author of the McAfee-published white paper, \"Android Malware Past, Present, and Future,\u201d and wrote the \u201cHacking Android\" section of the book, \"Hacking Exposed 7: Network Security Secrets &amp; Solutions.\u201d As a recognized mobile malware researcher, Castillo has presented at several security industry events, including 8.8 Computer Security Conference and Segurinfo, a leading information security conference in South America. Prior to his position at McAfee, Castillo performed security compliance audits for the Superintendencia Financiera of Colombia, and worked at security startup Easy Solutions Inc., where he conducted penetration tests on web applications, helped shut down phishing and malicious websites, supported security and network appliances, performed functional software testing, and assisted in research and development related to anti-electronic fraud. Castillo joined the world of malware research when he won ESET Latin America\u2019s Best Antivirus Research contest with a paper titled, \u201cSexy View: The Beginning of Mobile Botnets.\u201d Castillo holds a degree in systems engineering from the Universidad Javeriana in Bogot\u00e1, Colombia.","sameAs":["https:\/\/www.linkedin.com\/in\/carlosacastillo\/","https:\/\/x.com\/carlosacastillo"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/carlos-castillo\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/90004","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/462"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=90004"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/90004\/revisions"}],"predecessor-version":[{"id":214558,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/90004\/revisions\/214558"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=90004"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=90004"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=90004"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=90004"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}