New iOS malware use Cydia Substrate to steal advertisement promotion fee

Claud Xiao – 03/24/2014

Today, a Chinese security researcher find a strange iOS dynamic library file in his iOS device and post it to PEDIY[1] — the biggest security forum in China. This dynamic library, as a plugin of the Cydia Substrate framework, will replace developer ID (or promotion ID) of popular iOS advertisement SDKs in all other applications running on the infected devices, and bring promotion fee to its author. We think this sample should be classified as malware or adware. As far as we know, this is the first iOS malware based on Cydia Substrate and spread in the wild.

Cydia Substrate is a very popular runtime instrumentation framework for jailbreaked iOS devices which is commonly used by jailbreak community developers to develop powerful tools or special applications for modifing system functions or the OS interface.

This dynamic library, named “spad.dylib”, was found under the directory /Library/MobileSubstrate/DynamicLibraries/. It’s configured to be injected to all applications which use the com.apple.UIKit framework. It uses Cydia Substrate’s API to hook lots of popular advertisement SDKs’ code in all applications which use these SDK to popup advertisement or get statistics of its installation. The sample will modify the developer ID (or “promotion ID”, “refer ID”, “Publisher ID”, “Ad id”) to some specific hard-coded values. We believe these IDs are belongs to the author of this sample. By replace these IDs in other applications, all further advertisements displayed in these applications will be counted as promoted by this author. Thus he will get related promotion fee which should been originally paid to the applications’ real developers.

For example, the sample will inject the MobClick SDK’s “MobClick” class and hook the “startWithAppkey:” and “startWithAppkey:reportPolicy:channelId:” method in it, and change the related app key to “51cd7b8d56240ba38c05d087”. (See figure 1 and figure 2)

Figure 1. The spad.dylib hooks methods in MobClick SDK

Figure 1. The spad.dylib hooks methods in MobClick SDK


Figure 2. The spad.dylib changes app key in MobClick SDK

Figure 2. The spad.dylib changes app key in MobClick SDK

All advertisement SDKs targeted by the sample include:

– Youmi

– Sina Weibo

– Vpon

– Umeng MobClick

– Umeng App Union

– AdSaga

– MdotM

– InMobi

– MIX SDK

– Domob

– AdWhirl

– AdsMogo

– Google Mobile Ads SDK

– AderMob

– PolySDK

– GuoHe

– Komli Mobile

The second target in this list, Sina Weibo, is a very popular twitter-liked social network application in China but not an advertisement SDK.

This sample, spad.dylib, begin to spread in the wild at least from Dec 10, 2013, according to an iOS crash report hosted at synapticstuff.com [2]. We still don’t know how it infect the jailbreaded iOS devices. However, as the analysis above, we think it should be classified as malware or adware. Our suggest name of this familiy is iPhoneOS.Spad or iPhoneOS.AdThief.

In the past years, these’re many interesting iOS malware demo/PoC (like the Mactans and the Jekyll) written by the security researchers [3]. However, only a few iOS malware were found in the real world: Ikee, Ikee.b [4], FindAndCall [5], and Finfish. This malware becomes a new member of this short list, and is the first one based on Cydia Substrate.

UPDATE 03/25/2014

1. I’ve submitted the samples to the contagiominidump, while they havn’t published them yet. You can also download them from:

http://blog.claudxiao.net/files/ios_spad.zip

2. Here’re some statistics of the malware’s infection come from one of my private channels:

i. Infected devices: ~75k

ii. Total activate times: ~22m

iii. Daily activate times (around 3/20/2014): ~22k

UPDATE 03/26/2014
1. Mila has uploaded the samples to the contagiominidump:

http://contagiominidump.blogspot.com/2014/03/ios-adware-using-cydia.html

Also, I added two additional related sample files which is called/invoked by the SpAd.

2. We found a more earlier website refered to this adware, which means it’s spread from Jun 24, 2013:

http://zhidao.baidu.com/question/561894469.html

Thanks Baron tell me this.

3. A person said in the PEDIY’s post[1] that he is the author of this adware, he wrote it a year ago, and didn’t participate in its spreading.

UPDATE 03/31/2014
Axelle(@cryptax) find two more adlib in the SpAd: GuoHe and Komli Mobile. Thanks!

Reference

[1] http://bbs.pediy.com/showthread.php?p=1270415

[2] http://webservices.synapticstuff.com/guitartab/crashReport/show/24991

[3] https://sites.google.com/site/tieleiwang/

[4] http://mtc.sri.com/iPhone/

[5] https://www.securelist.com/en/blog/208193641/Find_and_Call_Leak_and_Spam

5 thoughts on “New iOS malware use Cydia Substrate to steal advertisement promotion fee

  1. Pingback: Evolución de las amenazas informáticas en el primer trimestre de 2014 - Securelist

  2. Pingback: AdThief: iOS-Malware befällt 75.000 Geräte mit Jailbreak - Securelist

  3. Pingback: 75 000 appareils iOS débridés infectés par le programme malveillant AdThief - Securelist

  4. Pingback: Evolution des menaces informatiques au 1er trimestre 2014 - Securelist

  5. Pingback: Evoluzione delle minacce informatiche nel primo trimestre del 2014 - Securelist

Leave a Reply

Your email address will not be published. Required fields are marked *