• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
over a dozen android apps on google play store caught

Over a Dozen Android Apps on Google Play Store Caught Dropping Banking Malware

You are here: Home / General Cyber Security News / Over a Dozen Android Apps on Google Play Store Caught Dropping Banking Malware
July 29, 2022

A malicious campaign leveraged seemingly innocuous Android dropper apps on the Google Perform Shop to compromise users’ gadgets with banking malware.

These 17 dropper applications, collectively dubbed DawDropper by Craze Micro, masqueraded as efficiency and utility apps such as document scanners, QR code audience, VPN companies, and contact recorders, amongst others. All these applications in problem have been eradicated from the app marketplace.

CyberSecurity

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“DawDropper utilizes Firebase Realtime Database, a third-party cloud support, to evade detection and dynamically get hold of a payload down load tackle,” the researchers reported. “It also hosts destructive payloads on GitHub.”

Android Banking Malware

Droppers are applications built to sneak earlier Google’s Participate in Store security checks, adhering to which they are made use of to obtain much more potent and intrusive malware on a system, in this scenario, Octo (Coper), Hydra, Ermac, and TeaBot.

Attack chains involved the DawDropper malware establishing connections with a Firebase Realtime Databases to acquire the GitHub URL important to down load the destructive APK file.

Android Banking Malware

The listing of destructive apps earlier offered from the app retailer is below –

  • Contact Recorder APK (com.caduta.aisevsk)
  • Rooster VPN (com.vpntool.androidweb)
  • Super Cleaner- hyper & good (com.j2ca.callrecorder)
  • Doc Scanner – PDF Creator (com.codeword.docscann)
  • Common Saver Pro (com.virtualapps.universalsaver)
  • Eagle picture editor (com.techmediapro.photoediting)
  • Simply call recorder pro+ (com.chestudio.callrecorder)
  • Excess Cleaner (com.casualplay.leadbro)
  • Crypto Utils (com.utilsmycrypto.mainer)
  • FixCleaner (com.cleaner.fixgate)
  • Just In: Video clip Motion (com.olivia.openpuremind)
  • com.myunique.sequencestore
  • com.flowmysequto.yamer
  • com.qaz.universalsaver
  • Lucky Cleaner (com.luckyg.cleaner)
  • Simpli Cleaner (com.scando.qukscanner)
  • Unicc QR Scanner (com.qrdscannerratedx)

Incorporated between the droppers is an application named “Unicc QR Scanner” that was formerly flagged by Zscaler before this month as distributing the Coper banking trojan, a variant of the Exobot mobile malware.

CyberSecurity

Octo is also regarded to disable Google Perform Secure and use digital network computing (VNC) to document a victim device’s display, which include sensitive facts these kinds of as banking credentials, email addresses and passwords, and PINs, all of which are subsequently exfiltrated to a distant server.

Banking droppers, for their component, have developed since the begin of the calendar year, pivoting away from hard-coded payload down load addresses to employing an middleman to conceal the deal with hosting the malware.

“Cybercriminals are continually getting techniques to evade detection and infect as several products as feasible,” the scientists claimed.

“On top of that, mainly because there is a higher need for novel approaches to distribute cell malware, various malicious actors claim that their droppers could enable other cybercriminals disseminate their malware on Google Perform Store, resulting in a dropper-as-a-company (DaaS) model.”

Located this article exciting? Comply with THN on Facebook, Twitter  and LinkedIn to study far more distinctive material we article.


Some elements of this posting are sourced from:
thehackernews.com

Previous Post: «it pro news in review: rise in ransomware attacks, uk IT Pro News In Review: Rise in ransomware attacks, UK & South Korea 5G & 6G, IBM data breach report
Next Post: Malicious Npm Packages Tapped Again to Target Discord Users malicious npm packages tapped again to target discord users»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • WhatsApp Unveils Proxy Support to Tackle Internet Censorship
  • Hackers Using CAPTCHA Bypass Tactics in Freejacking Campaign on GitHub
  • Blind Eagle Hacking Group Targets South America With New Tools
  • US Family Planning Non-Profit MFHS Confirms Ransomware Attack
  • Microsoft Reveals Tactics Used by 4 Ransomware Families Targeting macOS
  • Dridex Malware Now Attacking macOS Systems with Novel Infection Method
  • Cyber attacks on UK organisations surged 77% in 2022, new research finds
  • WhatsApp to combat internet blackouts with proxy server support
  • The IT Pro Podcast: Going passwordless
  • Podcast transcript: Going passwordless

Copyright © TheCyberSecurity.News, All Rights Reserved.