Home » Technology » Warning for Android users – A new threat has appeared

Warning for Android users – A new threat has appeared

Android users have to face another challenge – experts warn of a clever scam prepared by cyber crooks. A fake store with popular applications appeared on the web. Be vigilant.

The APT-C-23 group has been active since at least 2017. In April this year, it began to use new versions of spyware to infect its victims’ smartphones. The virus in its new version has been equipped with a number of functions that allow you to track user activity, including by recording the screen content, reading the phone call history or accessing notifications. To reduce the risk of detection, the virus can remove notifications from built-in security applications in some phone models.

Researchers point to an interesting mechanism of the infection itself. One of the malware distribution channels is a fake app store with infected versions of popular apps. In the case of samples identified by ESET, the criminals impersonated, inter alia, for Telegram, Threema and Android update module. Malicious applications are mixed up with links pointing to safe versions of programs, most likely to lull the victim to sleep. Interestingly, in order to download the infected versions, you need to enter the six-digit coupon code. According to the researchers, this is to limit the spread of the Trojan to a specific group of targets that are chosen by cybercriminals.

After installation, the malicious app asks for permission to read notifications, suggesting that it is required for Correspondence encryption to work properly, disabling Play Protect (Android’s built-in security mechanism), and recording your screen, claiming that it needs permission to use secure video chat. Next, the real version of the application is installed, which the virus pretends to be, and it starts running in the background, collecting data about the user.

As experts point out, the path described above is probably one of several ways to distribute the virus. Regardless of the infection path, however, its operation is the same and allows criminals to gain almost unlimited access to the infected device.

How can the hazard be avoided? – Never install applications from outside the Play Store, do not click on links from unknown senders, use anti-virus software – these are the basics, but in the vast majority of cases they are enough to protect yourself even against targeted attacks, such as those used by the APT-C group- 23 – he explains Kamil Sadkowski from ESET.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.