MilkyDoor

NJCCIC Threat Profile

Original Release Date: 2017-04-21

MilkyDoor is an Android malware embedded in 200 Android apps available in the Google Play Store, one of which has installs between 500,000-1,000,000. The malicious apps, ranging from style guides to drawing apps, are believed to be legitimate apps that were repackaged by the attackers. MilkyDoor appears to be the successor to DressCode, both use Socket Secure (SOCKS) proxies to gain access into networks the infected mobile devices connect to, unbeknownst to the user. Some of MilkyDoor's unique capabilities include the ability to bypass security restrictions and hide its malicious activity into normal network traffic using port forwarding via Secure Shell (SSH), enabling the malware to encrypt its traffic and payloads. Businesses are especially at risk as it is designed to infect internal networks and private servers to gain access to corporate data. Once the malware infiltrates a network, the attackers can access enterprise services, and discover company IP addresses and subsequently scan them for vulnerabilities to exploit. Companies that employ a bring your own device (BYOD) policy are at a greater risk from this malware.

Technical Details:

  • Trend Micro researchers provide technical details on the MilkyDoor Android malware, available here.

New Jersey Cybersecurity & Communications Integration Cell

2 Schwarzkopf Dr, Ewing Township, NJ 08628

njccic@cyber.nj.gov

OUR COMMITMENT

The NJCCIC is a component organization within the New Jersey Office of Homeland Security and Preparedness. We are the State's one-stop-shop for cyber threat analysis, incident reporting, and information sharing and are committed to making New Jersey more resilient to cyber threats by spreading awareness and promoting the adoption of best practices.

Agency Seals of State of NJ, NJOHSP and NJCCIC

STAY CONNECTED:

View our Privacy Policy here.

View our Site Index here.