Thursday, April 18, 2024

Alternative Android App Store “CepKutusu.com” Spreading Malware From Every Downloaded Apps

Turkish based an Android App Store named as  CepKutusu.com” spreading malware which contains many Android applications Similar as Google Play store.

Once We Try to Download an Application from  “CepKutusu.com” through Browser, suddenly   “Download now” Button appears which leads to download Banking Malware.

Each and every Single App that has appeared in this App store will redirect the user to Downloading the Malware by replacing the Original application.

According to ESET researchers, They introduced a seven-day window of not serving malware after a malicious download, which means after the user downloads the infected app, a cookie is set to prevent the malicious system from prevailing, leading to the user being served clean links for the next seven days.

Also Read    Google Blocked a new Spyware Family Lipizzan

Investigations revealed that distributed Malicious Applications controlled Remotely which is capable of intercepting and sending SMS messages, displaying fake activity, as well as downloading and installing other apps.

Initial Downloads from this Appstore Doesn’t perform any Malicious Process for 7 days Passed and later it redirects to install malware when the user again try to Download any apps from this Appstore.

Malware

Source: ESET

According to ESET, Above image indicates that the malicious app served to a user who thinks they are downloading the Clash of Clans game and the legitimate game served to the same user within the seven day period.

Adobe Flash Player imitates instead of installing malware and the malware doesn’t mimic the app the user intended to install.so the user never Agree to Download Adobe Flash Player on their Android phones to prevent from this kind of Malicious Activities.

According to ESET Researcher, Lukáš Štefanko First, let me say that this is the first time I’ve seen an entire Android market infected like that. Within the Windows ecosystem and in browsers, this technique is known to have been used for some time. In the Android ecosystem, however, it’s really a new attack vector. As for the impact, what we saw in this particular case was most probably a test. The crooks misused their control of the app store in the simplest manner. Replacing the links to all apps with a link to a single malicious app requires virtually no effort – but it also gives the store’s customers a fair chance to detect the scam.

It is really Difficult to Discovered such Activities in Android Market and much more unidentified app store still spreading Malware and perform other Malicious Activities. so Android user should beware about this activities and avoid Download applications from 3rd Party Appstore.

Also Read  Trojan found Pre-installed On Cheap Android Smartphones

Website

Latest articles

Xiid SealedTunnel: Unfazed by Yet Another Critical Firewall Vulnerability (CVE-2024-3400)

In the wake of the recent disclosure of a critical vulnerability (CVE-2024-3400) affecting a...

Cerber Linux Ransomware Exploits Atlassian Servers to Take Full Control

Security researchers at Cado Security Labs have uncovered a new variant of the Cerber...

FGVulDet – New Vulnerability Detector to Analyze Source Code

Detecting source code vulnerabilities aims to protect software systems from attacks by identifying inherent...

North Korean Hackers Abuse DMARC To Legitimize Their Emails

DMARC is targeted by hackers as this serves to act as a preventative measure...

L00KUPRU Ransomware Attackers discovered in the wild

A new variant of the Xorist ransomware, dubbed L00KUPRU, has been discovered in the...

Oracle Releases Biggest Security Update in 2024 – 372 Vulnerabilities Are Fixed – Update Now!

Oracle has released its April 2024 Critical Patch Update (CPU), addressing 372 security vulnerabilities...

Outlook Login Panel Themed Phishing Attack Evaded All Antivirus Detections

Cybersecurity researchers have uncovered a new phishing attack that has bypassed all antivirus detections.The...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

WAAP/WAF ROI Analysis

Mastering WAAP/WAF ROI Analysis

As the importance of compliance and safeguarding critical websites and APIs grows, Web Application and API Protection (WAAP) solutions play an integral role.
Key takeaways include:

  • Pricing models
  • Cost Estimation
  • ROI Calculation

Related Articles