Turkish based an Android App Store named as “CepKutusu.com” spreading malware which contains many Android applications Similar as Google Play store.
Once We Try to Download an Application from “CepKutusu.com” through Browser, suddenly “Download now” Button appears which leads to download Banking Malware.
Each and every Single App that has appeared in this App store will redirect the user to Downloading the Malware by replacing the Original application.
According to ESET researchers, They introduced a seven-day window of not serving malware after a malicious download, which means after the user downloads the infected app, a cookie is set to prevent the malicious system from prevailing, leading to the user being served clean links for the next seven days.
Also Read Google Blocked a new Spyware Family Lipizzan
Investigations revealed that distributed Malicious Applications controlled Remotely which is capable of intercepting and sending SMS messages, displaying fake activity, as well as downloading and installing other apps.
Initial Downloads from this Appstore Doesn’t perform any Malicious Process for 7 days Passed and later it redirects to install malware when the user again try to Download any apps from this Appstore.
Source: ESET
According to ESET, Above image indicates that the malicious app served to a user who thinks they are downloading the Clash of Clans game and the legitimate game served to the same user within the seven day period.
Adobe Flash Player imitates instead of installing malware and the malware doesn’t mimic the app the user intended to install.so the user never Agree to Download Adobe Flash Player on their Android phones to prevent from this kind of Malicious Activities.
According to ESET Researcher, Lukáš Štefanko First, let me say that this is the first time I’ve seen an entire Android market infected like that. Within the Windows ecosystem and in browsers, this technique is known to have been used for some time. In the Android ecosystem, however, it’s really a new attack vector. As for the impact, what we saw in this particular case was most probably a test. The crooks misused their control of the app store in the simplest manner. Replacing the links to all apps with a link to a single malicious app requires virtually no effort – but it also gives the store’s customers a fair chance to detect the scam.It is really Difficult to Discovered such Activities in Android Market and much more unidentified app store still spreading Malware and perform other Malicious Activities. so Android user should beware about this activities and avoid Download applications from 3rd Party Appstore.
Also Read Trojan found Pre-installed On Cheap Android Smartphones
Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…
The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…
A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…
Meta has announced the removal of over 2 million accounts connected to malicious activities, including…
Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…
A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing…