The malware packed app offers the same functionality as the original version. (Express Photo) RedAlert, an open-source app used by Israeli citizens to provide real-time rocket alerts of incoming rockets is reportedly being used by threat actors to install malware on Android devices.
According to a report by Cloudflare’s Cloudforce One Threat Operations Team, the malicious version of the app offers the same functionality as the legitimate app but accesses sensitive information like contacts, SMS, account information, call logs and list of apps installed on the device.
It goes on to say that the website for the malware-laden version of the app was created on October 12, almost a week after Hamas fired more than 5,000 rockets into Israeli airspace.
Here’s how the fake RedAlert website looked like. (Image Source: Cloudflare)
While the fake website includes links to both the iOS and Android versions of the app, clicking on the iOS button takes you to the Apple App Store. But if you tap the Android button, it downloads an APK that looks and works similarly to the original version.
The infected version of RedAlert also features anti-debugging, anti-emulation and anti-test mechanisms, which makes it hard for researchers to inspect the code. However, the malware-packed Redalert app asks for more permissions compared to the original version on the Play Store.
In the last few days, apps that alert users of incoming missile strikes have become targets for threat actors. Another rocket alert app, called ‘Red Alert: Israel’, became the target for hackers, who exploited a vulnerability that allowed them to intercept requests and send fake alerts to some users, one of which includes a message that says ‘a nuclear bomb is coming.’