Thousands of Android Malware Apps Use Stealthy APKs to Bypass Security

 


In a recent study, Zimperium uncovered a concerning trend in Android malware that uses a tricky method to hide itself from antivirus programs. This APK can be installed on Android devices with an OS version above Android 9 Pie (API 28), reducing the possibility of being analyzed. 

How was this made possible

  • According to researchers, it was achieved by using an unsupported decompression method in the APK, which is essentially a zip file.
  • While the technique is not new and was first demonstrated in 2014, security researchers have begun noticing its impact only lately.
  • For instance, Zimperium found over 3,000 APKs in the wild, using this suspicious compression technique. 
  • A rather concerning part is that these APKs were not found on the official Google Play Store, indicating distribution via third-party app stores or sideloading using some social engineering or phishing attack.

Another sneaky tactic emerging lately

  • Just a few days back, Google revealed that hackers are still able to use a technique known as versioning to slip malware onto Android devices while evading the Play Store’s security processes. 
  • In this method, a developer releases an initial version of an app on the Play Store that passes Google's pre-publication checks but is later updated with a malware component.
  • This is achieved by pushing an update from an attacker-controlled server to serve malicious code on the end user device using a method called Dynamic Code Loading (DCL), thus, turning the app into a backdoor.

-L.K

Comments

Popular posts from this blog

CISA and ENISA enhance their Cooperation

Top Five Most Exploited Vulnerabilities in January 2024

SmartScreen Vulnerability: CVE-2024-21412 Facts and Fixes