Thursday, April 25, 2024

Massively downloaded apps have stolen thousands of bank credentials

Must read

Jillian Castillo
Jillian Castillo
"Proud thinker. Tv fanatic. Communicator. Evil student. Food junkie. Passionate coffee geek. Award-winning alcohol advocate."

Computer viruses and hackers keep renewing themselves in an attempt to catch their victim. Stronger restrictions and protections force hackers to find new ways. ThreatFabric researchers have revealed a list of malicious apps uploaded to Google Play Store More than 300,000 times before viruses become active.

The apps came in the form of QR code scanners, PDF scanners, or even wallets Cryptomoney. Cybercriminals have used several methods to bypass Google restrictions in order to infect users undetected.

Gain user trust

Initially, the apps did not have a viral payload. It allows users to get used to using it. ThreatFabric researchers explain that “What makes Play Store malware campaigns so difficult to detect is that all apps have a very low malicious footprint.”

Once they get used to the software, users will receive a message asking them to download updates from an external source to the Google Play Store. “This incredible focus on avoiding unwanted attention makes automated malware detection less reliable,” says ThreatFabric.

The researchers discovered four families of malware in these apps: Alien, Hydra, Ermac, and Anatsa. The most common family was the Anatsa malware. One banking trojan An advanced Android system with many capabilities, such as remote access to systems and the ability to automatically transfer funds from victims’ accounts to victims’ accounts.
pirates.

Chosen victims

In order to make their software as undetectable as possible, the people responsible for distributing this malware took time to post a large number of positive reviews and install the software on a large number of phones. In addition, the applications contain the functionality that they claim to have. So the victim is not aware of anything.

See also  Dying Light receives a future PS5 patch

Finally, hackers did not send fake updates to all users. “The actors tried to target only the areas of interest to them,” the researchers explained. “If all conditions are met, the payload will be downloaded and installed.”

As the researchers explained, it is difficult to distinguish these malicious apps from legitimate apps. To avoid unpleasant surprises, it is better not to install an application with a small number of users. Finally, it is not particularly recommended to install apps or updates from external sources for the Play Store.

Latest article