Lie to Me: Abusing the Mobile Content Sharing Service for Fun and Profit

Guosheng Xu,Siyi Li,Hao Zhou,Shucen Liu,Yutian Tang,Li,Xiapu Luo,Xusheng Xiao,Guoai Xu,Haoyu Wang
DOI: https://doi.org/10.1145/3485447.3512151
2022-01-01
Abstract:Online content sharing is a widely used feature in Android apps. In this paper, we observe a new Fake-Share attack that adversaries can abuse existing content sharing services to manipulate the displayed source of shared content to bypass the content review of targeted Online Social Apps (OSAs) and induce users to click on the shared fraudulent content. We show that seven popular content-sharing services (including WeChat, AliPay, and KakaoTalk) are vulnerable to such an attack. To detect this kind of attack and explore whether adversaries have leveraged it in the wild, we propose DeFash, a multi-granularity detection tool including static analysis and dynamic verification. The extensive in-the-lab and in-the-wild experiments demonstrate that DeFash is effective in detecting such attacks. We have identified 51 real-world apps involved in Fake-Share attacks. We have further harvested over 24K Sharing Identification Information (SIIs) that can be abused by attackers. It is hence urgent for our community to take actions to detect and mitigate this kind of attack.
What problem does this paper attempt to address?