Last week we covered how Pokemon GO is taking New Zealand and Australia by storm - but there's a downside - malware attackers can quickly create a storm too.
While fans are sideloading the game onto their phones and bypassing official app stores, along come the nasties.
An Android version of the game has been found by Proofpoint researchers to be infected. Its APK was compromised by DroidJack remote access tool (RAT), which can potentially give an attacker full control of a device.
Proofpoint says that the malicious APK was launched less than 72 hours after the game was released in NZ and Australia, and suspects that the attack was targeting users who just couldn't wait to download the app from their own region.
This was fuelled by some media publications that provided instructions on how to sideload the app from third party websites. What's more, unaware users would not even be aware that the infected app is malicious, as it seemingly looks identical.
The DroidJack RAT has been documended by Symantec and Kaspersky in the past, so it's not a new attack method. It is new to the Pokemon GO app, and Proofpoint recommends that users refrain from sideloading apps that could open their devices up to malicious infections.
Users who want to check if they are infected should check the APK's SHA256 hash, which Proofpoint has identified as 15db22fd7d961f4d4bd96052024d353b3ff4bd135835d2644d94d74c925af3c4.
Another way is to check the app's permissions. Infected devices may show extra permissions including directly calling phone numbers, editing text messages, recording audio, modifying contacts, reading web bookmarks, changing network connectivity, viewing Wi-Fi connections, and retrieve running apps.
Proofpoint makes sure to mention that permissions can vary depending on device configuration, and that these could change in future. Proofpoint says this APK is a proof of concept, and that users should always download from legitimate app stores.