Android security: First Kotlin-based malware found in Google Play Store

Android security: First Kotlin-based malware found in Google Play Store


The first Android malware designed to steal information, carry out click ad fraud, and sign users up to premium SMS services without their permission, written using the Kotlin programming language has been found in the Google Play store.
An open-source programming language, Kotlin is a fully-supported official programming language for Android which Google boasts contains safety features in order to make apps ‘healthy by default’. Kotlin became an official language for Android in May 2017 and it has proved popular — Twitter and Netflix are among the 17 percent of Android Studio projects using it. However, researchers at Trend Micro have uncovered what they believe to the first example of malware developed using Kotlin. The malicious app posed as a utility tool for cleaning and optimising Android devices, and has been downloaded from the official Google Play store by between 1,000 and 5,000 users.
When the app is launched, information about the victim’s device is sent to a remote server, and the malware sends an SMS to a number provided by the command and control server. Once this message has been received, the remote server will begin URL forwarding for click ad fraud.
As part of this routine, the malware receives a command which executes a WAP (wireless application protocol) task, enabling it to access information on the wireless network, alongside injecting malicious Javascript code which allows it to silently access the device’s data.
Once this has been completed, the malware can upload information about the user’s service provider and login information to the command and control server. This automatically signs them up to a premium SMS subscription service, which will cost the victim money.
The nature of the malware means these operations will initially go unnoticed, providing the victim with an unpleasant surprise when they receive their next phone bill.

Submitted by: Arnfried Walbrecht


  1. It would be good to know if this behaviour coming from Kotlin library or developer has manually added that. Malware can be developed in any language but it is even a bigger concern if it part of libraries.