Saturday, May 11, 2024

7 Android Apps on the Google Play Drop Malware and Opens a Backdoor to Hackers

Researchers discovered seven malicious apps from the Google Play store that drops malware and adware on Android users and opens backdoor access to the attackers.

These apps are installed by over 11,000 Android users from Google Play.

These apps perform various malicious activities including draining device batteries and consuming excessive amounts of mobile data.

Mobile malware is continuously increasing and the threat actors always finding new ways to bypass security features in Google Play by deploying various tactics and techniques to target the millions of Android users around the world.

3 Different developers have uploaded the following malicious apps to the Google play store.

  • PumpApp (Developer) – Magnifying Glass, Super Bright LED Flashlight
  • LizotMitis (Developer) – Magnifier, Magnifying Glass with Flashlight, Super-bright Flashlight
  • iSoft LLC (Developer) – Alarm Clock, Calculator, Free Magnifying Glass

“The dropper apps are designed to download and install APKs from a GitHub repository, essentially opening a backdoor on the device for any new application functionality to be installed.”

Malware droppers are carefully handling the communication with GitHub and waiting for the initial setup for evading detection by security researchers and malware detection agents.

GitHub URL is embedded within the Dropper App code and it is completely obfuscated to avoid flagging by human analysis and escape from Google Play protect scan.

Download the Adware APK

Researchers uncovered the configuration data for the dropper app and additional URLs from the obfuscated JSON message and it pointed to the Adware APK.

After the installation of the malicious dropper apps, the adware APK will be triggered and wait for 10 min before starting its malicious activities.

The App aggressively shows fullscreen video ads, outside of the app, without any user interaction and the app is capable of performing overlaying other applications to display the Ads anytime once the user’s Android device gets unlocked.

According to Wandera’s research,  If the screen is turned off and no passcode is set up, the adware activates the ad in set intervals, turns on the screen, and plays the video ads until the user realizes and closes them. 

But if the user’s device is protected with a password, it won’t bypass the passcode but it simply turns on the screen and run the video ads in the background which causes CPU spikes and battery consumption.

Only manual dismissal is an option to stop the ad because the adware can self-execute without user interaction and it’s continuously running the video ads without user attention when the mobile is kept in the bag or packet.

These apps also violate the following Google policy,

“An app distributed via Google Play may not modify, replace, or update itself using any method other than Google Play’s update mechanism. Likewise, an app may not download executable code (e.g. dex, JAR, .so files) from a source other than Google Play.”

Recommend that users with these apps installed find both the dropper apps and payload apps and uninstall them manually from the device.

Recently Google tied up with mobile security companies to find bad apps before it reaches the user’s device. The primary goal of the alliance is to make Google Play more secure.

You can follow us on LinkedinTwitter, and Facebook for daily Cybersecurity and hacking news updates.

Website

Latest articles

PoC Released for Critical PuTTY Private Key Recovery Vulnerability

Security researchers have published a Proof-of-Concept (PoC) exploit for a critical vulnerability in the...

HackCar – Attack AND Defense Playground For Automotive System

Modern cars have microcontrollers that use the Controller Area Network (CAN) to perform safety...

DDoS Attack Size Increased by 233.33%, UDP-Based are Popular

The latest Nexusguard DDoS Trend Report for 2024 has unveiled a significant escalation in...

New LLMjacking Used Stolen Cloud Credentials to Attack Cloud LLM Servers

Researchers have identified a new form of cyberattack termed "LLMjacking," which exploits stolen cloud...

HijackLoader Malware Attack Windows Via Weaponized PNG Image

In a recent cybersecurity breakthrough, researchers have unveiled significant updates to the HijackLoader malware,...

North Korean Hackers Abusing Facebook & MS Management Console

The North Korean hacking group known as Kimsuky has been reported to employ sophisticated...

Dell Hacked – Attackers Stolen 49 Million Customers Personal Information

Dell Technologies recently disclosed a data breach involving a company portal that contained limited...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

Live API Attack Simulation

94% of organizations experience security problems in production APIs, and one in five suffers a data breach. As a result, cyber-attacks on APIs increased from 35% in 2022 to 46% in 2023, and this trend continues to rise.
Key takeaways include:

  • An exploit of OWASP API Top 10 vulnerability
  • A brute force ATO (Account Takeover) attack on API
  • A DDoS attack on an API
  • Positive security model automation to prevent API attacks

Related Articles