Tuesday, March 4, 2025
HomeMalwareAndroid Malware Called "CopyCat" Infected Around 14 Million Android Devices and Gained...

Android Malware Called “CopyCat” Infected Around 14 Million Android Devices and Gained over $1.5 Million

Published on

SIEM as a Service

Follow Us on Google News

A New Android Malware called “CopyCat” infect over 14 Million Android Devices and Main Motivation this Malware is to generate and steal ad revenues. CopyCat fastly spreading its infection across the globe.

Most of the infected users from  Southeast Asia and it claimed  280,000 victims from the US. Malware Author Earned over $1.5 Million through ads fraudulent Activites .

CopyCat similar type of ad fraud component as Gooligan Malware which infected one million Google accounts.

This malware was successfully rooted  8 Million Android users around the globe and CopyCat malware was able to fraudulently install 4.9 million apps on infected user devices which caused really big impact according to the estimation done by Check point Researchers.

Also Read  Android Remote Access Trojan (RAT) Controlled Via Telegram Protocol

How Does CopyCat  Malware Work

A legitimate app normally started its installation process Module as normal applications Installation mode.

Copycat consist of some Kind of  Modular Structure which Contains several Module and each and every Module Plays different Role.

According to  Module Nature . not each and every Module existing in the infected apps.Malware authors implement different Module depending on their purpose and functional requirements.

Once ligitimate app installed on the victim’s machines , its Download Malicious Binary called Rser which is responsible for escalate privileges to root.

According to Check point,The Rser module is responsible for establishing persistency and copying other modules to /system/bin directory.

Rser Performs Behalf of the exploitation process and Gained the root permission and remount the system directory.

Normally System Partition is restricted by Reading only Mode, and to bypass the restriction, malware needs to remount it and write specific Module.

“After the necessary permissions are acquired,Rser executes a script, which copies the specified files to the “/system/bin” and “/system/app” directories, which triggers an automatic installation of the copied apps.”

Also Read  Dangerous apps with Rooting Trojan “Ztorg” found in Google Play Store

Adware Activities

CopyCat Inject its own procedure into victims Android Mobile’s activity manager and user-mode apps.

“The injected module operates together with the layout_hook and ads modules,and executes different strategies of ad fraud to generate revenue for the perpetrators.”

Once This malware injects the code into the Malicious Method, Android’s activity manager service uses this method every time it starts any activity on the system.

The code injected by the malware monitors launched activities to detect if a Google Play activity is launched.

Once first activities completed ,second activity implemented in the shared library is displaying ads from large advertising networks, such as Facebook ads, UC ads, and Google Admob, inside of other apps.

Silent Installation and AV Evasion

This Malware separate Different Module Performing  fraudulent installations using the root permissions without injecting additional code.

Copycat Taking advantage of Android’s package manager by operate low level of the Operating system.

The malware makes use of this process, and copies the APK files of the fraudulent apps and finally doing the verification process whether the app was installed and report its result to the Command and Control server (C&C Server) .

According to Check point ,This malware family isn’t very obfuscated and almost does nothing to hinder reverse engineering. However, it does make a large effort to stay undetected on the device and it uses small modules written in c, making it invisible for most of mobile AV Vendors.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent warning on March...

Threat Actors Exploiting AES Encryption for Stealthy Payload Protection

Cybersecurity researchers have uncovered a surge in the use of Advanced Encryption Standard (AES)...

33.3 Million Cyber Attacks Targeted Mobile Devices in 2024 as Threats Surge

Kaspersky's latest report on mobile malware evolution in 2024 reveals a significant increase in...

Routers Under Attack as Scanning Attacks on IoT and Networks Surge to Record Highs

In a concerning trend, the frequency of scanning attacks targeting Internet of Things (IoT)...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Winos4.0 Malware Targets Windows Users Through Malicious PDF Files

A new wave of cyberattacks leveraging the Winos4.0 malware framework has targeted organizations in...

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has...

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government,...