Tuesday, November 26, 2024
HomeAndroid25 Million Android Users Infected with Powerful "Agent Smith" Malware Through Exploiting...

25 Million Android Users Infected with Powerful “Agent Smith” Malware Through Exploiting Several Mobile Vulnerabilities

Published on

Researchers discovered a new Android malware called “Agent Smith” that infects nearly 25 million mobile users around the globe without letting users know about the malicious activities.

Agent Smith malware activities have a similar appearance of previously reported malware campaigns such as Gooligan, HummingBad, and CopyCat.

Malware posed as a legitimate Google app and takes advantage of the known vulnerabilities to exploit the device and replacing the already installed apps with its malicious version without any form of users interaction.

- Advertisement - SIEM as a Service

The ultimate motivation of the threat actors behind Agent Smith Malware is to push the malicious advertisements and harm the device to steal the bank credentials and other forms of financial gain.

Threat actors behind this Agent smith primary targets are India though other Asian countries such as Pakistan and Bangladesh.

Since Android keeps on securing its environment by applying frequent security patches, threats actors continue to develop the sophisticated infection chains to finding the new loopholes.

“Agent Smith” seems to be the first malware that using new loopholes, such as Janus, Bundle and Man-in-the-Disk, to achieve a 3-stage infection chain and build a botnet of compromised devices.

Infection Landscape

Agent Smith is not just infecting the single app in the targeted device, but it keeps on checking all the apps which are in the targeted list and it does the same until it finds the pre-listed apps.

Researchers estimated that the malware-infected over 2.8 billion times with 25 Million unique devices and its abuses 9Apps market using 360 different dropper variants.

There are 5 most infectious droppers that listed below were found in the list and these droppers alone have been downloaded more than 7.8 million.

Since the Android users are much higher in India than other countries, “Agent Smith”, overall compromised device brand distribution is heavily influenced and infected many of the Indian Users.

Researchers learned that most infections occurred on devices running Android 5 and 6, also, there is a number of successful attacks against newer Android versions which all not update their Android device properly.

Agent Smith Infection Process

Earlier 2019, Agent Smith started its infection process from India using similar characteristics of Janus vulnerability and the variant has an ability to hide their app icons and claim to be Google-based apps.

Agent Smith infection app that downloaded by the victim has a weaponized Feng Shui Bundle as encrypted asset files and the app has several other functionalities including photo utility, games, or adult related.

Once the dropper gets executed, it automatically decrypts and installs its core malware APK which is responsible for app update and malicious patching.

According to Checkpoint research ” The core malware is usually disguised as Google Updater, Google Update for U or “com.google.vending”. The core malware’s icon is hidden.”

Finally, it releases the apps list and checks whether the victims have installed any of the pre-listed apps which are hard-coded or sent from the C&C server.

“If its find any apps that listed in the pre-list, it will extract the base APK of the target innocent app on the device, patch the APK with malicious ads modules, install the APK back and replace the original one as if it is an update.” Checkpoint reported.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

Russian TAG-110 Hacked 60+ Users With HTML Loaded & Python Backdoor

The Russian threat group TAG-110, linked to BlueDelta (APT28), is actively targeting organizations in...