Malicious Android apps with 300K installs found on Google Play – BleepingComputer

Cybersecurity researchers have found three Android malware households infiltrating the Google Play Retailer, hiding their malicious payloads inside many seemingly innocuous softwares.

The malicious actions suffered by clients who put in the malware apps included stolen knowledge, s…….

Cybersecurity researchers have found three Android malware households infiltrating the Google Play Retailer, hiding their malicious payloads inside many seemingly innocuous softwares.

The malicious actions suffered by clients who put in the malware apps included stolen knowledge, social media account takeovers, SMS interception, and unauthorized costs to their mobile numbers.

The malware households found by Zscaler’s ThreatLabz on the Google Play Retailer Are often acknowledged as “Joker,” “Facestealer,” and “Coper.”

The analysts intypeationrmed Google of their findings, and all apps have since been take awayd from the Play Retailer. However, these nonetheless using these malicious apps Might want to take away them and pertype A system lean-As a lot as uproot any remnants.

The Joker

The Joker malware household is used to steal intypeation from compromised models, collectively with SMS messages and the sufferer’s contact itemizing, whereas additionally subscribing mobile numbers to premium wi-fi software protocol (WAP) providers.

Zscaler’s report itemizings 50 softwares trojanized with Joker that collectively account for over 300,000 acquires on the Play Retailer.

Virtually half of them are communication apps as a Outcome of these naturally require clients to grant entry to dangerous permissions, so it’s simpler for the malware To accumulate the extreme-diploma privileges wanted for its malicious operation.

Base64 encrypted content material (Zscaler)

The Joker builders now disguise the payload in A regular asset file, in base64 obfuscated type, typically giving it JSON, TTF, PNG, or knowledgebase file extension.

“Many Joker apps disguise the payload Inside the belongings folder of the Android Package deal Package (APK) and creates an ARM ABI executable to maintain away from detection by most sandboxes That are based mostly on x86 structure,” explains …….

Source: https://www.bleepingcomputer.com/news/security/malicious-android-apps-with-300k-installs-found-on-google-play/