Towards Attribution in Mobile Markets: Identifying Developer Account Polymorphism

Abstract

Malicious developers may succeed at publishing their apps in mobile markets, including the official ones. If reported, the apps will be taken down and the developer accounts possibly be banned. Unfortunately, such take-downs do not prevent the attackers to use other developer accounts to publish variations of their malicious apps. This work presents a novel approach for identifying developer accounts, and other indicators of compromise (IOCs) in mobile markets, that belong to the same operation, i.e., to the same owners. Given a set of seed IOCs, our approach explores app and version metadata to identify new IOCs that belong to the same operation. It outputs an attribution graph, which details the attribution inferences, so that they can be reviewed. We have implemented our approach into Retriever, a tool that supports multiple mobile markets including the official GooglePlay and AppleStore. We have evaluated Retriever on 17 rogueware and adware operations. In 94% of the operations, Retriever discovers at least one previously unknown developer account. Furthermore, Retriever reveals that operations that look dead still have active developer accounts.

Publication
2020 ACM SIGSAC Conference on Computer and Communications Security
Silvia Sebastián
Silvia Sebastián
Cybersecurity Researcher

I am a Cybersecurity Researcher in IMDEA Software Institute with seven years of experience in Attribution, Web Security, and Cyber Intelligence.