Monday, May 12, 2025
HomeMalwareMillions of times Downloaded 800 Android Apps Infected By "Xavier" Malware...

Millions of times Downloaded 800 Android Apps Infected By “Xavier” Malware Silently leak User Information

Published on

SIEM as a Service

Follow Us on Google News

New Android Trojan Ad Library Called “Zavier”  Infected more Than 800 Android Apps which is Estimated around more than million downloads in Google Play and distributed over a large number of people around the Globe.

Zavier Malwre Detected as “ANDROIDOS_XAVIER.AXM” that silently infect and steal the users information and leak the personal information.

This Malicious Ad Library Uses Remote server to Download codes that contain embedded Malicious Behavior loads into the infected Malware apps in Android phone.

- Advertisement - Google News

Also Read Malicious Android ads leads to Automatically Download and Install Apps that Contain Malware in Android Devices

Embedded Xavier ad library in Google Playstore{Image Credit :Trend Micro}

Its seems More evasive to being Detected by the Traditional Detection method which including String encryption, Internet data encryption, and emulator detection.

Maximum number of Downloads has been discover in Asian  Countries such as Vietnam, Philippines, and Indonesia, with fewer downloads from the United States and Europe.

Stealing and leaking capabilities

According to the Trend Micro Research , This Malware Manipulate the users data including photo manipulators to wallpaper and ring tone changers..

Zavier’s Sophisticated  self protecting Mechanism helps to avoid Detection by both static and Dynamic analysis.

“Xavier also has the capability to download and execute other malicious codes, which might be an even more dangerous aspect of the malware. Xavier’s behavior depends on the downloaded codes and the URL of codes, which are configured by the remote server.”

Xavier malware Variant Initially identified in earlier of 2015 and it was infected millions of devices that has 2,000 apps with similar behavior on Google Play.

Evalution of Xavier {Image Credit :Trend Micro}

First Version of Xavier Malware Ad library called joymobile had Remote code execution functionality that was Discovered on 2015 .

This ad library is capable of installing other APKs, and it can do this silently if the device is rooted.

Malware Authors using Command & Communication Server (C&C Server) for further communication for steal the information and specifically used without any encryption but   constant strings were encrypted in the code.

Also Read  A Banking Trojan Called “QakBot ” Attack Thousands of Windows Active Directory and users to get locksout of their Company’s Domain

Xavier Used 4 ways to Avoid Detection

According to Trend Micro Report ,

1) It encrypts all constant strings, making static detection and manual analysis more difficult.

2) It performs net transmission via HTTPS to prevent its traffic from being caught. The data is also encrypted

3) It uses a wide array of reflection invoking methods, with the the class name and method name being encrypted

4) It will hide its behavior based on the running environment.

To Read Full Technical analysis Visit Trend Macro

Also Read Beware: New Google Play Store Android Malware called “Judy” Infected Around 8.5 to 36.5 Million Users

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner

The open-source penetration testing toolkit Metasploit has unveiled a major update, introducing four new...

Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities

Google Project Zero researchers have uncovered new sandbox escape vulnerabilities in macOS using an...

Cybercriminals Hide Undetectable Ransomware Inside JPG Images

A chilling new ransomware attack method has emerged, with hackers exploiting innocuous JPEG image...

Hackers Exploit Legacy Protocols in Microsoft Entra ID to Bypass MFA and Conditional Access

A sophisticated and highly coordinated cyberattack campaign came to light, as tracked by Guardz...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

New Stealthy .NET Malware Hiding Malicious Payloads Within Bitmap Resources

Cybersecurity researchers at Palo Alto Networks' Unit 42 have uncovered a novel obfuscation method...

Hackers Weaponizing Facebook Ads to Deploy Multi-Stage Malware Attacks

A persistent and highly sophisticated malvertising campaign on Facebook has been uncovered by Bitdefender...

Scattered Spider Malware Targets Klaviyo, HubSpot, and Pure Storage Platforms

Silent Push researchers have identified that the notorious hacker collective Scattered Spider, also known...