Thursday, February 27, 2025
HomeAndroidHackers Exploit Android Vulnerability to Install Malware Without User Interaction Via Google...

Hackers Exploit Android Vulnerability to Install Malware Without User Interaction Via Google Play

Published on

SIEM as a Service

Follow Us on Google News

Security researchers from Trend Micro observed three malicious apps on Google Play that aims to compromise victims’ devices and steal information from the SideWinder APT group.

The three apps include “Camero, FileCryptManager & CallCam,” among the three Camero is the one that exploits the use-after-free vulnerability CVE-2019-2215.

SideWinder APT group
Three Malicious Apps

This is the first attack spotted in the wild using exploits CVE-2019-2215 that resides in Binder. By exploiting this vulnerability attackers can download files without user interaction.

Malware Deployment

The apps were found to be associated with the SideWinder APT group, the group is active since 2012 and is known for attacking military entities’ Windows machines.

These apps are posted in Google disguised as a Camera and Filemanager app.

Camero – Dropper
FileCryptManager – Dropper
CallCam – Final Payload that steals information

SideWinder deploys the payload in two stages

Stage 1 – Download the DEX file from the attacker’s C&C server.
Stage 2 – Downloaded DEX file downloads an APK that is to be installed after exploiting the device or employing accessibility.

SideWinder APT group
Infection Chain

“All of this is done without user awareness or intervention. To evade detection, it uses many techniques such as obfuscation, data encryption, and invoking dynamic code,” reads a Trend Micro blog post.

Before dropping the final payload the dropper tries to root the phone or to gain Accessibility Permission on the targeted device.

Final Payload – CallCam

Once launched on the infected device it hides the icon and starts collecting information by running in the background.

It encrypts the stolen data using RSA and AES encryption algorithms and sends’s to the attacker’s C&C server. The following is the information it collects.

  1. Location
  2. Battery status
  3. Files on device
  4. Installed app list
  5. Device information
  6. Sensor information
  7. Camera information
  8. Screenshot
  9. Account
  10. Wifi information
  11. Data from WeChat, Outlook, Twitter, Yahoo Mail, Facebook, Gmail, and Chrome

All three apps found to be active since March 2019 and they have been removed from Google Play now.

Also, Read

Microsoft Released Final Version of Security Configuration Baseline for Windows 10 and Windows Server

Microsoft Warns about the New Campaign that Delivers FlawedAmmyy RAT via Weaponized MS Excel Documents

Top 3 Categories That Mostly Impact by Cyber Threats & Protection Against Cyber Attack

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has...

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government,...

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency...

Threat Actors Attack Job Seekers of Fortune 500 Companies to Steal Personal Details

In Q3 2024, Cofense Intelligence uncovered a targeted spear-phishing campaign aimed at employees working...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency...

Google’s SafetyCore App Secretly Scans All Photos on Android Devices

Recent revelations about Google’s SafetyCore app have ignited a firestorm of privacy debates, echoing...

Cisco Nexus Vulnerability Allows Attackers to Inject Malicious Commands

Cisco Systems has issued a critical security advisory for a newly disclosed command injection...