Sunday, March 23, 2025
HomeMalwareNewly Discovered “System Update” Android Malware Steals Photos, Videos & GPS Location

Newly Discovered “System Update” Android Malware Steals Photos, Videos & GPS Location

Published on

SIEM as a Service

Follow Us on Google News

We should always stay alert and cautious with the applications that we download and install from outside the Play Store since we can download an app with malware that could infect our Android devices.

As recently, the cybersecurity researchers at Zimperium have discovered a malicious app that can be downloaded outside of Google Play (third-party Android app stores). 

Once the user downloads this malicious app on their smartphone, the app contacts the Firebase server and starts controlling the device remotely. Moreover, the security experts have affirmed that this malicious app screen itself as “System Update.”

New Malware: “System Update”

This new “System Update” malware is surprisingly sophisticated malware, and this malware tricks and infects the users by launching a notification that pretends to be a system update.

In this situation, when the user clicks on the notification, the malware asks the user to install this new application, which will later request full access to the device. 

And here once the user grants the access, it will simply take over the control of the device and will get access to all the following things that we have mentioned below:-

  • Messages in messenger apps.
  • If you have root rights, then it will also have access to the messenger database files.
  • Bookmarks.
  • Browsing history.
  • Search history in Chrome, Mozilla Firefox and Samsung browser.
  • Several types of files like .pdf, .doc, .docx, and .xls, .xlsx.
  • Clipboard data.
  • Content of the notifications.
  • List of installed apps.
  • Images and Videos.
  • GPS location data.
  • SMS messages.
  • Contacts.
  • Call logs.
  • Recording audio.
  • Recording phone calls.
  • Installed apps. 
  • Device name.
  • Storage statistics.
  • Camera.

How Does It Work?

According to the report, the malware sends various data to its Firebase C&C server just after getting installed on the device. And the data that it sends includes storage stats, ISP details, and installed apps. 

However, here the Firebase is used only for conveying commands, while a separate C&C server is used to collect other stolen data using POST requests. This malware collects data directly if it has root access or uses the “Accessibility Services” function on the compromised device.

Moreover, to hide its malicious activities, it publicised fake notifications about the search for updates when it receives new commands from its speculators.

But, here, the most relaxing thing is that this malicious app has never been available on Google Play, and not only that, even the developers at Google are trying their best to prevent it from circumventing its security walls.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Attackers Leverage Weaponized CAPTCHAs to Execute PowerShell and Deploy Malware

In a recent surge of sophisticated cyberattacks, threat actors have been utilizing fake CAPTCHA...

Researchers Uncover FIN7’s Stealthy Python-Based Anubis Backdoor

Researchers have recently discovered a sophisticated Python-based backdoor, known as the Anubis Backdoor, deployed...

Researchers Reveal macOS Vulnerability Exposing System Passwords

A recent article by Noah Gregory has highlighted a significant vulnerability in macOS, identified...

JumpServer Flaws Allow Attackers to Bypass Authentication and Gain Full Control

JumpServer, a widely used open-source Privileged Access Management (PAM) tool developed by Fit2Cloud, has...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Attackers Leverage Weaponized CAPTCHAs to Execute PowerShell and Deploy Malware

In a recent surge of sophisticated cyberattacks, threat actors have been utilizing fake CAPTCHA...

New Steganographic Malware Hides in JPEG Files to Spread Infostealers

A recent cybersecurity threat has been identified, where steganographic malware is being distributed through...

Massive “DollyWay” Malware Attack Compromises 20,000+ WordPress Sites Worldwide

A significant malware operation, dubbed "DollyWay," has been uncovered by GoDaddy Security researchers, revealing...