Wednesday, April 23, 2025
HomeMalwareAlternative Android App Store "CepKutusu.com" Spreading Malware From Every Downloaded Apps

Alternative Android App Store “CepKutusu.com” Spreading Malware From Every Downloaded Apps

Published on

SIEM as a Service

Follow Us on Google News

Turkish based an Android App Store named as  CepKutusu.com” spreading malware which contains many Android applications Similar as Google Play store.

Once We Try to Download an Application from  “CepKutusu.com” through Browser, suddenly   “Download now” Button appears which leads to download Banking Malware.

Each and every Single App that has appeared in this App store will redirect the user to Downloading the Malware by replacing the Original application.

- Advertisement - Google News

According to ESET researchers, They introduced a seven-day window of not serving malware after a malicious download, which means after the user downloads the infected app, a cookie is set to prevent the malicious system from prevailing, leading to the user being served clean links for the next seven days.

Also Read    Google Blocked a new Spyware Family Lipizzan

Investigations revealed that distributed Malicious Applications controlled Remotely which is capable of intercepting and sending SMS messages, displaying fake activity, as well as downloading and installing other apps.

Initial Downloads from this Appstore Doesn’t perform any Malicious Process for 7 days Passed and later it redirects to install malware when the user again try to Download any apps from this Appstore.

Malware

Source: ESET

According to ESET, Above image indicates that the malicious app served to a user who thinks they are downloading the Clash of Clans game and the legitimate game served to the same user within the seven day period.

Adobe Flash Player imitates instead of installing malware and the malware doesn’t mimic the app the user intended to install.so the user never Agree to Download Adobe Flash Player on their Android phones to prevent from this kind of Malicious Activities.

According to ESET Researcher, Lukáš Štefanko First, let me say that this is the first time I’ve seen an entire Android market infected like that. Within the Windows ecosystem and in browsers, this technique is known to have been used for some time. In the Android ecosystem, however, it’s really a new attack vector. As for the impact, what we saw in this particular case was most probably a test. The crooks misused their control of the app store in the simplest manner. Replacing the links to all apps with a link to a single malicious app requires virtually no effort – but it also gives the store’s customers a fair chance to detect the scam.

It is really Difficult to Discovered such Activities in Android Market and much more unidentified app store still spreading Malware and perform other Malicious Activities. so Android user should beware about this activities and avoid Download applications from 3rd Party Appstore.

Also Read  Trojan found Pre-installed On Cheap Android Smartphones

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hackers Exploit NFC Technology to Steal Money from ATMs and POS Terminals

In a disturbing trend, cybercriminals, predominantly from Chinese underground networks, are exploiting Near Field...

Threat Actors Leverage TAG-124 Infrastructure to Deliver Malicious Payloads

In a concerning trend for cybersecurity, multiple threat actors, including ransomware groups and state-sponsored...

Ransomware Actors Ramp Up Attacks Organizations with Emerging Extortion Trends

Unit 42’s 2025 Global Incident Response Report, ransomware actors are intensifying their cyberattacks, with...

New SMS Phishing Attack Weaponizes Google AMP Links to Evade Detection

Group-IB’s High-Tech Crime Trends Report 2025 reveals a sharp 22% surge in phishing websites,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

New Malware Hijacks Docker Images Using Unique Obfuscation Technique

A recently uncovered malware campaign targeting Docker, one of the most frequently attacked services...

Hackers Deploy New Malware Disguised as Networking Software Updates

A sophisticated backdoor has been uncovered targeting major organizations across Russia, including government bodies,...

Latest Lumma InfoStealer Variant Found Using Code Flow Obfuscation

Researchers have uncovered a sophisticated new variant of the notorious Lumma InfoStealer malware, employing...