Friday, March 1, 2024

Hackers Exploit Android Vulnerability to Install Malware Without User Interaction Via Google Play

Security researchers from Trend Micro observed three malicious apps on Google Play that aims to compromise victims’ devices and steal information from the SideWinder APT group.

The three apps include “Camero, FileCryptManager & CallCam,” among the three Camero is the one that exploits the use-after-free vulnerability CVE-2019-2215.

SideWinder APT group
Three Malicious Apps

This is the first attack spotted in the wild using exploits CVE-2019-2215 that resides in Binder. By exploiting this vulnerability attackers can download files without user interaction.

Malware Deployment

The apps were found to be associated with the SideWinder APT group, the group is active since 2012 and is known for attacking military entities’ Windows machines.

These apps are posted in Google disguised as a Camera and Filemanager app.

Camero – Dropper
FileCryptManager – Dropper
CallCam – Final Payload that steals information

SideWinder deploys the payload in two stages

Stage 1 – Download the DEX file from the attacker’s C&C server.
Stage 2 – Downloaded DEX file downloads an APK that is to be installed after exploiting the device or employing accessibility.

SideWinder APT group
Infection Chain

“All of this is done without user awareness or intervention. To evade detection, it uses many techniques such as obfuscation, data encryption, and invoking dynamic code,” reads a Trend Micro blog post.

Before dropping the final payload the dropper tries to root the phone or to gain Accessibility Permission on the targeted device.

Final Payload – CallCam

Once launched on the infected device it hides the icon and starts collecting information by running in the background.

It encrypts the stolen data using RSA and AES encryption algorithms and sends’s to the attacker’s C&C server. The following is the information it collects.

  1. Location
  2. Battery status
  3. Files on device
  4. Installed app list
  5. Device information
  6. Sensor information
  7. Camera information
  8. Screenshot
  9. Account
  10. Wifi information
  11. Data from WeChat, Outlook, Twitter, Yahoo Mail, Facebook, Gmail, and Chrome

All three apps found to be active since March 2019 and they have been removed from Google Play now.

Also, Read

Microsoft Released Final Version of Security Configuration Baseline for Windows 10 and Windows Server

Microsoft Warns about the New Campaign that Delivers FlawedAmmyy RAT via Weaponized MS Excel Documents

Top 3 Categories That Mostly Impact by Cyber Threats & Protection Against Cyber Attack


Latest articles

20 Million+ Cutout.Pro User Records Leaked On Hacking Forums

CutOut.Pro, an AI-powered photo and video editing platform, has reportedly suffered a data breach,...

CWE Version 4.14 Released: What’s New!

The Common Weakness Enumeration (CWE) project, a cornerstone in the cybersecurity landscape, has unveiled...

RisePro Stealer Attacks Windows Users Steals Sensitive Data

A new wave of cyber threats has emerged as the RisePro information stealer targets...

Golden Corral Restaurant Chain Hacked: 180,000+ Users’ Data Stolen

The Golden Corral Corporation, a popular American restaurant chain, has suffered a significant data...

CISA Warns Of Hackers Exploiting Multiple Flaws In Ivanti VPN

Threat actors target and abuse VPN flaws because VPNs are often used to secure...

BEAST AI Jailbreak Language Models Within 1 Minute With High Accuracy

Malicious hackers sometimes jailbreak language models (LMs) to exploit bugs in the systems so...

Hackers Hijack Anycubic 3D Printers to Display Warning Messages

Anycubic 3D printer owners have been caught off guard by a series of unauthorized...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles