The scenario consists out of four entities: the attacker,
social network sites, application hosting sites and the user
community. First, the attacker deploys the malicious
application at a hosting site (1). Since the Android
applications do not undergo a code review, the attacker
can place them on the Android Market. The attacker then
places a link pointing to his application on popular social
networks, like Tweeter or Facebook (2). In case that the
attacker decided to host the malicious application at a
location other than the Market, the true address can be
masked by using shortened URLs. When the user clicks
on the link (3) he gets redirected to the site from which the
application can be downloaded (4). Finally, the user
downloads the application and accepts the requested
permissions (5).