Tuesday, February 27, 2024

More Than 100 Google Play Store Apps Infected with Malicious IFrames

iFrames used to to embed another document within the current HTML document.Malicious iFrames has been discovered in more than 100 google play store android applications .

Researcher’s from paloaltonetworks  said, “132 Android apps on Google Play infected with tiny hidden IFrames that link to malicious domains in their local HTML pages

The most popular one having more than 10,000 installs alone .most likely that the app developers’ development platforms were infected with malware that searches for HTML pages and injects malicious content at the end of the HTML pages it finds ,Researcher’s said.

Most important things we should Focus here is ,

One of the infected pages also attempts to download and install a malicious Microsoft Windows executable file at the time of page loading, but as the device is not running Windows, it will not execute.

According to the classification, Non-Android Threat refers to apps that are unable to cause harm to the user or Android device, but contains components that are potentially harmful to other platforms.

Infection Working Function

Palo Alto Networks’ Unit 42 researchers Xiao Zhang, Wenjun Hu, and Shawn Jin elaborate on this point in a blog post ,

All infected apps currently only require the INTERNET permission and are equipped with two activities, one is to load interstitial advertisements and the other one is to load the main app.

The latter one instantiates an Android WebView component and displays a local HTML  page. The WebView component has JavaScriptInterface enabled. This functionality isn’t used by the samples we’ve examined, but this enables loaded JavaScript code to access the app’s native functionality.

Origin of the Infection

Many of the infected app’s belongs to Indonesia and geographical connections among 7 different developers which all contains straightforward clue comes from the app name .

Currently , infected apps will not cause damage to Android users .This does represent a novel way for platforms to be a “carrier” for malware  paloaltonetworks said .

Also Read :

Website

Latest articles

Hackers Abuse Telegram API To Exfiltrate User Information

Attackers have been using keywords like "remittance" and "receipts" to spread phishing scripts using...

ThreatHunter.ai Stops Hundreds of Attacks in 48 Hours: Fighting Ransomware and Nation-State Cyber Threats

The current large surge in cyber threats has left many organizations grappling for security...

WordPress Plugin Flaw Exposes 200,000+ Websites for Hacking

A critical security flaw has been identified in the Ultimate Member plugin for WordPress,...

Hackers Actively Hijacking ConnectWise ScreenConnect server

ConnectWise, a prominent software company, issued an urgent security bulletin on February 19, 2024,...

Heavily Obfuscated PIKABOT Evades EDR Protection

PIKABOT is a polymorphic malware that constantly modifies its code, making it hard to...

Anonymous Sudan Promoting New DDoS Botnet: Beware

It has come to light that a group known as Anonymous Sudan is actively...

Scattered Spider: Advanced Techniques for Launching High-Profile Attacks

Scattered Spider is a threat group responsible for attacking several organizations since May 2022...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles