Thursday, April 17, 2025
HomeMalwareBeware : Super Mario Run Android game is Actually Malware. Don't Download...

Beware : Super Mario Run Android game is Actually Malware. Don’t Download it

Published on

SIEM as a Service

Follow Us on Google News

Super Mario Run is anticipated to dispatch in the Google Play Store in the coming weeks, after beforehand going live on iOS on December 15, and cybercriminals are attempting to profit by the energy produced by Nintendo’s new title utilizing another influx of malware.

introducing a honest to goodness amusement, the supposed Super Mario Run application for Android was intended to introduce Marcher, a sophisticated banking malware strain capable of stealing victims banking and credit card information. For that, the Trojan uses fake overlay pages on top of true blue applications.

Security company zscaler warns that malware disguised as Super Mario Run for Android is now spreading across the Internet, with users encouraged to download APKs that eventually infect devices and attempt to steal financial information.

- Advertisement - Google News

Like previous Marcher variants, the current version also presents fake credit card pages once an infected victim opens the Google Play store. The malware locks out Google Play until the user supplies the credit card information as shown below:

As per zscaler Report, the malware asks for multiple permissions including administrative rights as shown below.

“Once it infects an Android device, it opens an overlay that requires users to enter their financial details whenever mobile banking apps are launched, and collected data is then saved and submitted to a command and control center owned by the attacker”

In most of the cases, the Google Play Store can no longer launch as users are provided with the same overlay asking for financial details.

“In previous variants of Marcher, we observed this malware family targeting well-known Australian, UK, and French banks. The current version is targeting account management apps as well as well-known banks,” zscaler says.

Here’s the percentage of users who have downloaded fake Super Mario game apps on their Android devices:

Android Marcher has been around since 2013 and proceeds to effectively target versatile clients’ budgetary data. To abstain from turning into a casualty of such malware, it is a decent practice to download applications just from trusted application stores, for example, Google Play.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Google Removes 5.5 Billion Malicious Ads, Suspends 700,000+ Offending Advertisers

Google has announced the removal of 5.5 billion malicious advertisements and the suspension of...

CISA Issues Alert on SonicWall Flaw Being Actively Exploited

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical security alert after...

Cisco Webex Vulnerability Lets Hackers Execute Code Through Malicious Meeting Links

Cisco has disclosed a high-severity vulnerability in its widely used Webex App, warning users...

NetFlow and PCAP Logs Reveal Multi-Stage Attacks In Corporate Networks

In the modern enterprise, network security teams face the daunting challenge of detecting and...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Beware! Online PDF Converters Tricking Users into Installing Password-Stealing Malware

CloudSEK's Security Research team, a sophisticated cyberattack leveraging malicious online PDF converters has been...

Chinese Hackers Unleash New BRICKSTORM Malware to Target Windows and Linux Systems

A sophisticated cyber espionage campaign leveraging the newly identified BRICKSTORM malware variants has targeted...

Chinese UNC5174 Group Expands Arsenal with New Open Source Tool and C2 Infrastructure

The Sysdig Threat Research Team (TRT) has revealed a significant evolution in the offensive...