Уважаемые пользователи форума, убедительно просим вас переходить в телеграмм продавца, исключительно по предоставленной ссылке. Проверяйте продавца, отправив сообщение на электронную почту, чтобы убедиться в том, что вы общаетесь действительно с ним.

First Android-Rooting Trojan With Code Injection Ability Found On Google Play Store

Тема в разделе "Новости мирового кардинга", создана пользователем GREENDUMP24, 9 июн 2017.

  1. GREENDUMP24

    GREENDUMP24 New Member

    Сообщения:
    4
    Симпатии:
    0
    [​IMG]
    A new Android-rooting malware with an ability to disable device’ security settings in an effort to perform malicious tasks in the background has been detected on the official Play Store.

    Whats interesting? The app was smart enough to fool Google security mechanism by first pretending itself to be a clean app and then temporarily replacing it with a malicious version.

    Security researchers at Kaspersky Lab discovered a new piece of Android rooting malware that was being distributed as gaming apps on the Google Play Store, hiding behind puzzle game colourblock, which was being downloaded at least 50,000 times prior to its removal.

    Dubbed Dvmap, the Android rooting malware disables devices security settings to install another malicious app from a third-party source and also injects malicious code into the device system runtime libraries to gain root access and stay persistent.
    To bypass Google Play Store security checks, the malware creators used a very interesting method: they uploaded a clean app to the store at the end of March, 2017, and would then update it with a malicious version for short period of time, the researchers said.
    Usually they would upload a clean version back on Google Play the very same day. They did this at least 5 times between 18 April and 15 May.​
    Heres How Dvmap Malware Works

    [​IMG]
    Dvmap Trojan works on both 32-bit and 64-bit versions of Android, which once installed, attempts to gain root access on the device and tries to install several modules on the system including a few written in Chinese, along with a malicious app called com.qualcmm.timeservices.

    To make sure the malicious module gets executed with system rights, the malware overwrites systems runtime libraries depending on which Android version the device is running.

    To complete the installation of the above-mentioned malicious app, the Trojan with system rights turns off Verify Apps, feature and modify system setting to allow app installation from 3rd party app stores.
    Furthermore, it can grant the com.qualcmm.timeservices app Device Administrator rights without any interaction with the user, just by running commands. It is a very unusual way to get Device Administrator rights, the researchers said.​
    This malicious 3rd party app is responsible for connecting the infected device to the attackers command-and-control server, giving out full control of the device into the hands of attackers.

    However, the researchers said, they havent noticed any commands received by the infected Android devices so far, so its unclear what kind of files will be executed, but they could be malicious or advertising files.

    How to Protect Yourself Against Dvmap Malware


    Researchers are still testing the Dvmap malware, but meanwhile, advise users who installed the puzzle game in question to back up their devices data and perform a full factory data reset in an effort to mitigate the malware.

    To prevent yourself from being targeted by such apps, always beware of fishy apps, even when downloading from Google Play Store, and try to stick to the trusted brands only. Moreover, always look at the comments left by other users.

    Always verify app permissions before installing any app and grant only those permissions which have relevant context for the apps purpose.

    Last but not the least, always keep a good antivirus app on your device that can detect and block such malware before it can infect your device and keep it up-to-date. ​



    News provided GREENDUMPS24.COM

Поделиться этой страницей