Tuesday, February 11, 2025
HomeMalwareBeware : Super Mario Run Android game is Actually Malware. Don't Download...

Beware : Super Mario Run Android game is Actually Malware. Don’t Download it

Published on

SIEM as a Service

Follow Us on Google News

Super Mario Run is anticipated to dispatch in the Google Play Store in the coming weeks, after beforehand going live on iOS on December 15, and cybercriminals are attempting to profit by the energy produced by Nintendo’s new title utilizing another influx of malware.

introducing a honest to goodness amusement, the supposed Super Mario Run application for Android was intended to introduce Marcher, a sophisticated banking malware strain capable of stealing victims banking and credit card information. For that, the Trojan uses fake overlay pages on top of true blue applications.

Security company zscaler warns that malware disguised as Super Mario Run for Android is now spreading across the Internet, with users encouraged to download APKs that eventually infect devices and attempt to steal financial information.

Like previous Marcher variants, the current version also presents fake credit card pages once an infected victim opens the Google Play store. The malware locks out Google Play until the user supplies the credit card information as shown below:

As per zscaler Report, the malware asks for multiple permissions including administrative rights as shown below.

“Once it infects an Android device, it opens an overlay that requires users to enter their financial details whenever mobile banking apps are launched, and collected data is then saved and submitted to a command and control center owned by the attacker”

In most of the cases, the Google Play Store can no longer launch as users are provided with the same overlay asking for financial details.

“In previous variants of Marcher, we observed this malware family targeting well-known Australian, UK, and French banks. The current version is targeting account management apps as well as well-known banks,” zscaler says.

Here’s the percentage of users who have downloaded fake Super Mario game apps on their Android devices:

Android Marcher has been around since 2013 and proceeds to effectively target versatile clients’ budgetary data. To abstain from turning into a casualty of such malware, it is a decent practice to download applications just from trusted application stores, for example, Google Play.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

SHA256 Hash Calculation from Data Chunks

The SHA256 algorithm, a cryptographic hash function, is widely used for securing data integrity...

New Report of of 1M+ Malware Samples Show Application Layer Abused for Stealthy C2

A recent analysis of over one million malware samples by Picus Security has revealed...

Seven-Year-Old Linux Kernel Bug Opens Door to Remote Code Execution

Researchers have uncovered a critical vulnerability in the Linux kernel, dating back seven years,...

Ransomware Payments Plunge 35% as More Victims Refuse to Pay

In a significant shift within the ransomware landscape, global ransom payments plummeted by 35%...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New Report of of 1M+ Malware Samples Show Application Layer Abused for Stealthy C2

A recent analysis of over one million malware samples by Picus Security has revealed...

NetSupport RAT Grant Attackers Full Access to Victims Systems

The eSentire Threat Response Unit (TRU) has reported a significant rise in incidents involving...

NanoCore RAT Attack Windows Using Task Scheduler to Captures keystrokes, screenshots

NanoCore, a notorious Remote Access Trojan (RAT), continues to pose a significant threat to...