Monday, November 25, 2024
HomeMalwareMalicious Android ads leads to Automatically Download and Install Apps that Contain...

Malicious Android ads leads to Automatically Download and Install Apps that Contain Malware in Android Devices

Published on

Malicious Android Apps are growing rapidly and it used to target victims in Many ways. Spreading Malware through malvertising campaign in Popular Forum Leads to automatically downloading Android apps by advertisements posted on forums.

This malvertising campaign Found in on of the Forum called “GodLikeProductions,” where used Reported about automatically apps are downloading when users visit the Forum.

Forums Hosts have randomly removed the visitors Complaints messages about this Malicious Advertisement which leads to Download the Malware Apps.

- Advertisement - SIEM as a Service
Also Read A Malvertiser called “RoughTed” Bypass Ad-blocker and Get Half a Billion visits in 3 Months
Malicious Android ads leads to Malware auto Installation

Malicious Downloaded APK from Forum

Researchers From zscaler Discovered, the APK file called “ kskas.Apk,”  and the App name Mentioned as “Ks Clean,” which used to Automatically downloaded form the  “GodLikeProductions,”   forum.

Once this APK Automatically installed into victims Android Device, its asked to update the used by Displaying te fake system update pop-up.

This system updates popup only option presented to the user is to select the “OK” button, forcing the user to accept the message.

Also Read Beware: Malicious Payload “Hworm” Dropped Through Embedded Youtube Video’s
Malicious Android ads leads to Malware auto Installation
Malicious Android ads leads to Malware auto Installation

Once Victims Pressed the “OK” Button, its promote into installing another Malicious APK file called “UPDATE”  This APK is stored locally inside the assets directory of the app. Once installed, the Update app immediately asks for Admin rights.

Malicious Android ads leads to Malware auto Installation

According to the Zscaler,”Once the app gains admin rights, it becomes impossible to remove it from the device. The traditional “Uninstall” option, by default, becomes disabled, because a user cannot remove apps with admin rights. Usually, one can uninstall such apps by first removing admin privileges via settings, but this app uses an unconventional method — registering as an Android receiver — to preserve its admin privileges.”

This malicious App Stats that, Once Victims tried to uninstall this app, suddenly phone gets locked for few seconds.

Some other suspicious activities, including:

  • Mount/Unmount filesystems
  • Read/Write bookmarks history
  • Overlay system window
  • Write Settings
  • Download Without Notification
AlsoRead 200 Million Downloaded video players including VLC Player are vulnerable to Malicious subtitles Attack -A Complete Takeover Attack
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

Russian TAG-110 Hacked 60+ Users With HTML Loaded & Python Backdoor

The Russian threat group TAG-110, linked to BlueDelta (APT28), is actively targeting organizations in...