• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
over a dozen android apps on google play store caught

Over a Dozen Android Apps on Google Play Store Caught Dropping Banking Malware

You are here: Home / General Cyber Security News / Over a Dozen Android Apps on Google Play Store Caught Dropping Banking Malware
July 29, 2022

A malicious campaign leveraged seemingly innocuous Android dropper apps on the Google Perform Shop to compromise users’ gadgets with banking malware.

These 17 dropper applications, collectively dubbed DawDropper by Craze Micro, masqueraded as efficiency and utility apps such as document scanners, QR code audience, VPN companies, and contact recorders, amongst others. All these applications in problem have been eradicated from the app marketplace.

CyberSecurity

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“DawDropper utilizes Firebase Realtime Database, a third-party cloud support, to evade detection and dynamically get hold of a payload down load tackle,” the researchers reported. “It also hosts destructive payloads on GitHub.”

Android Banking Malware

Droppers are applications built to sneak earlier Google’s Participate in Store security checks, adhering to which they are made use of to obtain much more potent and intrusive malware on a system, in this scenario, Octo (Coper), Hydra, Ermac, and TeaBot.

Attack chains involved the DawDropper malware establishing connections with a Firebase Realtime Databases to acquire the GitHub URL important to down load the destructive APK file.

Android Banking Malware

The listing of destructive apps earlier offered from the app retailer is below –

  • Contact Recorder APK (com.caduta.aisevsk)
  • Rooster VPN (com.vpntool.androidweb)
  • Super Cleaner- hyper & good (com.j2ca.callrecorder)
  • Doc Scanner – PDF Creator (com.codeword.docscann)
  • Common Saver Pro (com.virtualapps.universalsaver)
  • Eagle picture editor (com.techmediapro.photoediting)
  • Simply call recorder pro+ (com.chestudio.callrecorder)
  • Excess Cleaner (com.casualplay.leadbro)
  • Crypto Utils (com.utilsmycrypto.mainer)
  • FixCleaner (com.cleaner.fixgate)
  • Just In: Video clip Motion (com.olivia.openpuremind)
  • com.myunique.sequencestore
  • com.flowmysequto.yamer
  • com.qaz.universalsaver
  • Lucky Cleaner (com.luckyg.cleaner)
  • Simpli Cleaner (com.scando.qukscanner)
  • Unicc QR Scanner (com.qrdscannerratedx)

Incorporated between the droppers is an application named “Unicc QR Scanner” that was formerly flagged by Zscaler before this month as distributing the Coper banking trojan, a variant of the Exobot mobile malware.

CyberSecurity

Octo is also regarded to disable Google Perform Secure and use digital network computing (VNC) to document a victim device’s display, which include sensitive facts these kinds of as banking credentials, email addresses and passwords, and PINs, all of which are subsequently exfiltrated to a distant server.

Banking droppers, for their component, have developed since the begin of the calendar year, pivoting away from hard-coded payload down load addresses to employing an middleman to conceal the deal with hosting the malware.

“Cybercriminals are continually getting techniques to evade detection and infect as several products as feasible,” the scientists claimed.

“On top of that, mainly because there is a higher need for novel approaches to distribute cell malware, various malicious actors claim that their droppers could enable other cybercriminals disseminate their malware on Google Perform Store, resulting in a dropper-as-a-company (DaaS) model.”

Located this article exciting? Comply with THN on Facebook, Twitter  and LinkedIn to study far more distinctive material we article.


Some elements of this posting are sourced from:
thehackernews.com

Previous Post: «it pro news in review: rise in ransomware attacks, uk IT Pro News In Review: Rise in ransomware attacks, UK & South Korea 5G & 6G, IBM data breach report
Next Post: Malicious Npm Packages Tapped Again to Target Discord Users malicious npm packages tapped again to target discord users»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts

Copyright © TheCyberSecurity.News, All Rights Reserved.