Friday, March 29, 2024

Alternative Android App Store “CepKutusu.com” Spreading Malware From Every Downloaded Apps

Turkish based an Android App Store named as  CepKutusu.com” spreading malware which contains many Android applications Similar as Google Play store.

Once We Try to Download an Application from  “CepKutusu.com” through Browser, suddenly   “Download now” Button appears which leads to download Banking Malware.

Each and every Single App that has appeared in this App store will redirect the user to Downloading the Malware by replacing the Original application.

According to ESET researchers, They introduced a seven-day window of not serving malware after a malicious download, which means after the user downloads the infected app, a cookie is set to prevent the malicious system from prevailing, leading to the user being served clean links for the next seven days.

Also Read    Google Blocked a new Spyware Family Lipizzan

Investigations revealed that distributed Malicious Applications controlled Remotely which is capable of intercepting and sending SMS messages, displaying fake activity, as well as downloading and installing other apps.

Initial Downloads from this Appstore Doesn’t perform any Malicious Process for 7 days Passed and later it redirects to install malware when the user again try to Download any apps from this Appstore.

Malware

Source: ESET

According to ESET, Above image indicates that the malicious app served to a user who thinks they are downloading the Clash of Clans game and the legitimate game served to the same user within the seven day period.

Adobe Flash Player imitates instead of installing malware and the malware doesn’t mimic the app the user intended to install.so the user never Agree to Download Adobe Flash Player on their Android phones to prevent from this kind of Malicious Activities.

According to ESET Researcher, Lukáš Štefanko First, let me say that this is the first time I’ve seen an entire Android market infected like that. Within the Windows ecosystem and in browsers, this technique is known to have been used for some time. In the Android ecosystem, however, it’s really a new attack vector. As for the impact, what we saw in this particular case was most probably a test. The crooks misused their control of the app store in the simplest manner. Replacing the links to all apps with a link to a single malicious app requires virtually no effort – but it also gives the store’s customers a fair chance to detect the scam.

It is really Difficult to Discovered such Activities in Android Market and much more unidentified app store still spreading Malware and perform other Malicious Activities. so Android user should beware about this activities and avoid Download applications from 3rd Party Appstore.

Also Read  Trojan found Pre-installed On Cheap Android Smartphones

Website

Latest articles

Beware Of Weaponized Air Force invitation PDF Targeting Indian Defense And Energy Sectors

EclecticIQ cybersecurity researchers have uncovered a cyberespionage operation dubbed "Operation FlightNight" targeting Indian government...

WarzoneRAT Returns Post FBI Seizure: Utilizing LNK & HTA File

The notorious WarzoneRAT malware has made a comeback, despite the FBI's recent efforts to...

Google Revealed Kernel Address Sanitizer To Harden Android Firmware And Beyond

Android devices are popular among hackers due to the platform’s extensive acceptance and open-source...

Compromised SaaS Supply Chain Apps: 97% of Organizations at Risk of Cyber Attacks

Businesses increasingly rely on Software as a Service (SaaS) applications to drive efficiency, innovation,...

IT and security Leaders Feel Ill-Equipped to Handle Emerging Threats: New Survey

A comprehensive survey conducted by Keeper Security, in partnership with TrendCandy Research, has shed...

How to Analyse .NET Malware? – Reverse Engineering Snake Keylogger

Utilizing sandbox analysis for behavioral, network, and process examination provides a foundation for reverse...

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles