
The way Pokemon has gained popularity in the recent past is remarkable and unrivaled. If you spot people around a public place like a park carrying their mobile in a very peculiar way, most likely they are there hunting pokemons. The official Pokemon game is topping the sales charts for both Android and iOS, undoubtedly this has become a prime medium with which attackers are trying to infect mobile devices.
As of first week of July, the official Pokemon Go app was released in limited countries (highlighted in green) as shown in the map below (Courtesy - Reddit ):
As clearly visible, this game got a limited release and is slowly rolling out to countries that could not get a day-one release. But this has left many wannabe players with no way to install the app from the official Play store, as a result they are resorting to non-store versions of the app. Their sentiment is perfectly summarized by the following comment on a forum:
There are a number of guides available online that highlight how to acquire non-store apps and "sideload" them on an Android device. Malicious entities saw this as a good opportunity to use Pokemon as a malicious vector, soon enough there were a number of third party app stores littered with apps that claim to be official but in reality they stash malicious components.
In this blog we highlight a few types of malicious apps that are trying to pass themselves off as the official Pokemon app but they hide malicious contents.
There are few fake Pokemon apps that harbor a Remote Access Tool (RAT) named DroidJack that can give the attacker complete control over the victim's device. Two of them are listed below:
The following are few capabilities among a plethora of options available in DroidJack:
Below is a comparison of the code present in the legitimate Pokemon Go app alongside fake Pokemon Go apps with DroidJack component:
As we can see one of the fake app (d350cc8222792097317608ea95b283a8) has almost the same code structure as the original one apart from the addition of DroidJack components. The second fake app (51b1872a8e2257c660e4f5b46412cb38) just contains the DroidJack component and shares only the app name with the legitimate app.
Most of the Pokemon adware apps have the same icon as the original, even the name is almost the same, as a result they may pass off as legitimate. In many cases the size of these apps give away their guise, the two instances listed below are around 2.6 MB each whereas the original one is around 58 MB.
Once installed these adware apps ask for device administrator privileges, the original app does not ask for the same:
Upon opening the app they showed survey questions following which we started seeing pop-ups on the device via the browser:
Some pop-ups would lead to installation of more adware on the device. Furthermore, we saw some overlays with advertisements that covered a big part of the screen:
Some Pokemon apps would install other secondary apps on the device, during our analysis the secondary apps downloaded were mostly adware. A few such installer apps are listed below:
Below is an instance where secondary apps are getting downloaded:
These downloaded apps are stored locally on the device as shown below:
These apps send sensitive information about the device to the attackers:
Some of the data that was sent includes:
Below are a few details about the Official Pokemon Go app that should be noted in order to determine authenticity of the app:
In-case you decide to download and install the app from a 3rd party app store then it is advisable to make sure all of the above mentioned points match for the downloaded app. Even if a single point mis-matches then there is a possibility that the app downloaded is fake.
Apart from the points mentioned above we urge you to double check the app on VirusTotal as the original app is shown as clean:
As always, we highly recommend downloading the app only from the official Google Play store when the app is available for your country.
The Pokemon fever is expected to stay, infact it's likely to increase as more countries engage in this phenomenon. Partake in this with utmost caution if you decide to catch 'em all.
Dell SonicWALL provides protection against multiple versions of this threat via the following signatures:
APK Package Details:
Share This Article

An Article By
An Article By
Security News
Security News