Thursday, April 24, 2025
HomeAndroid25 Million Android Users Infected with Powerful "Agent Smith" Malware Through Exploiting...

25 Million Android Users Infected with Powerful “Agent Smith” Malware Through Exploiting Several Mobile Vulnerabilities

Published on

SIEM as a Service

Follow Us on Google News

Researchers discovered a new Android malware called “Agent Smith” that infects nearly 25 million mobile users around the globe without letting users know about the malicious activities.

Agent Smith malware activities have a similar appearance of previously reported malware campaigns such as Gooligan, HummingBad, and CopyCat.

Malware posed as a legitimate Google app and takes advantage of the known vulnerabilities to exploit the device and replacing the already installed apps with its malicious version without any form of users interaction.

- Advertisement - Google News

The ultimate motivation of the threat actors behind Agent Smith Malware is to push the malicious advertisements and harm the device to steal the bank credentials and other forms of financial gain.

Threat actors behind this Agent smith primary targets are India though other Asian countries such as Pakistan and Bangladesh.

Since Android keeps on securing its environment by applying frequent security patches, threats actors continue to develop the sophisticated infection chains to finding the new loopholes.

“Agent Smith” seems to be the first malware that using new loopholes, such as Janus, Bundle and Man-in-the-Disk, to achieve a 3-stage infection chain and build a botnet of compromised devices.

Infection Landscape

Agent Smith is not just infecting the single app in the targeted device, but it keeps on checking all the apps which are in the targeted list and it does the same until it finds the pre-listed apps.

Researchers estimated that the malware-infected over 2.8 billion times with 25 Million unique devices and its abuses 9Apps market using 360 different dropper variants.

There are 5 most infectious droppers that listed below were found in the list and these droppers alone have been downloaded more than 7.8 million.

Since the Android users are much higher in India than other countries, “Agent Smith”, overall compromised device brand distribution is heavily influenced and infected many of the Indian Users.

Researchers learned that most infections occurred on devices running Android 5 and 6, also, there is a number of successful attacks against newer Android versions which all not update their Android device properly.

Agent Smith Infection Process

Earlier 2019, Agent Smith started its infection process from India using similar characteristics of Janus vulnerability and the variant has an ability to hide their app icons and claim to be Google-based apps.

Agent Smith infection app that downloaded by the victim has a weaponized Feng Shui Bundle as encrypted asset files and the app has several other functionalities including photo utility, games, or adult related.

Once the dropper gets executed, it automatically decrypts and installs its core malware APK which is responsible for app update and malicious patching.

According to Checkpoint research ” The core malware is usually disguised as Google Updater, Google Update for U or “com.google.vending”. The core malware’s icon is hidden.”

Finally, it releases the apps list and checks whether the victims have installed any of the pre-listed apps which are hard-coded or sent from the C&C server.

“If its find any apps that listed in the pre-list, it will extract the base APK of the target innocent app on the device, patch the APK with malicious ads modules, install the APK back and replace the original one as if it is an update.” Checkpoint reported.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Verizon DBIR Report: Small Businesses Identified as Key Targets in Ransomware Attacks

Verizon Business's 2025 Data Breach Investigations Report (DBIR), released on April 24, 2025, paints...

Lazarus APT Targets Organizations by Exploiting One-Day Vulnerabilities

A recent cyber espionage campaign by the notorious Lazarus Advanced Persistent Threat (APT) group,...

ToyMaker Hackers Compromise Numerous Hosts via SSH and File Transfer Tools

In a alarming cybersecurity breach uncovered by Cisco Talos in 2023, a critical infrastructure...

Threat Actors Exploiting Unsecured Kubernetes Clusters for Crypto Mining

In a startling revelation from Microsoft Threat Intelligence, threat actors are increasingly targeting unsecured...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

New Malware Hijacks Docker Images Using Unique Obfuscation Technique

A recently uncovered malware campaign targeting Docker, one of the most frequently attacked services...

Hackers Deploy New Malware Disguised as Networking Software Updates

A sophisticated backdoor has been uncovered targeting major organizations across Russia, including government bodies,...

Latest Lumma InfoStealer Variant Found Using Code Flow Obfuscation

Researchers have uncovered a sophisticated new variant of the notorious Lumma InfoStealer malware, employing...