Close Menu
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
Facebook X (Twitter) Instagram
Trending
  • Jennifer Lopez and Ben Affleck reveal summer plans after Europe trip
  • T20 World Cup: Quiet contributions from Akshar Patel, Kuldeep Yadav and Ravindra Jadeja justify Rohit Sharma’s spin vision | Cricket News
  • The impact of a sedentary lifestyle on health
  • Bartok: The World of Lilette
  • Economists say the sharp rise in the U.S. budget deficit will put a strain on Americans’ incomes
  • Our Times: Williams memorial unveiled on July 4th | Lifestyle
  • Heatwaves in Europe are becoming more dangerous: what it means for travelers
  • Christian Science speaker to visit Chatauqua Institute Sunday | News, Sports, Jobs
Facebook X (Twitter) Instagram
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
The Daily PostingThe Daily Posting
Android

Android malware masquerading as Google Chrome can steal photos, contacts, and more — how to spot a fake

thedailyposting.comBy thedailyposting.comFebruary 9, 2024No Comments

[ad_1]

An updated version of the XLoader malware for Android devices does not require any user interaction to launch after installation, according to McAfee researchers (via BleepingComputer). Of course, downloading and installing malware requires clicking on a malicious link within an SMS message, but with this his XLoader variant, users no longer need to launch the malware manually.

Currently, malware is distributed through SMS texts on Android devices. If you are targeted, the SMS text contains a shortened URL that, when clicked, will take you to a website to download the mobile app’s Android APK installation file. McAfee states that “malicious activity is automatically initiated while the app is installed.”

This malware runs silently in the background and accesses all kinds of personal data on your Android device, including photos, messages, contacts, banking information, and more. Fortunately, this malware is very easy to spot, so if you have Google’s Play Protect services enabled on your Android device, you may already be protected. Here’s what to look for and how to check if Play Protect is active.

How to identify new XLoader malware

XLoader, also known as the MoqHao malware, was likely created by the financially motivated attacker Roaming Mantis, and McAfee said the malware’s code contains English, Korean, French, Japanese, German, and Hindi. We have identified some of the malicious pop-up messages written in , indicates the malware’s current target.

If you’re in an area that primarily speaks one of these languages, you may be at risk, but the warning signs that something is wrong are very obvious. In the malicious app’s first-launch permission request, which impersonates Google Chrome, you’ll notice that some characters are bold and others are not.

Android malware disguised as Chrome

(Image courtesy of McAfee)

After these initial requests, the malicious app asks you to set “chrome” as your default SMS app, citing the reason “to prevent spam” to make you believe it’s the right decision. request. Again, random bold text will appear as a warning sign that something is wrong.

Android malware disguised as Google Chrome

(Image courtesy of McAfee)

You should be wary of suspicious phishing URLs from Pinterest profiles. This is because this is the main way that XLoader malware currently targets victims and evades detection. McAfee outlines about 20 different commands that malware can currently execute. These five pose the biggest threats to personal data.

  • Get photos: Sends all photos on the device to the hacker’s command and control (C2) server.
  • getSmsKW: Send all SMS messages on your device to a C2 server. This may include sensitive information sent to family and friends.
  • Send SMS: The XLoader malware allows you to send SMS messages from your device, potentially spreading phishing links to your friends and family.
  • gcont: Export your contact list to a C2 server and provide hackers with direct contact information for targeted phishing attacks.
  • Get phone status: Get device identification information such as IMEI, SIM number, Android ID, and serial number.

In a recent report, McAfee informed Google about the XLoader malware’s method of starting an app’s execution without manual activation by the user, and said that Google is “already working to implement mitigations to prevent this type of automatic execution. “There is,” he explains. Future Android versions. ”

McAfee further explained that “Android users are currently protected by Google Play Protect, which is turned on by default for Google Play services on Android devices.”

To check if Play Protect is active, Google Play AppTap profile icon Select in the top right corner settingTap about Click to open the drop-down menu. At the bottom, below Play Protect Certifiedthere should be a short message like this: Device is certified.

[ad_2]

Source link

thedailyposting.com
  • Website

Related Posts

Qualcomm wants to make it easier for phone makers to issue Android updates

June 28, 2024

Qualcomm wants to make Android updates easier for OEMs

June 28, 2024

What’s new in the June 2024 Google system update for Android

June 28, 2024
Leave A Reply Cancel Reply

ads
© 2025 thedailyposting. Designed by thedailyposting.
  • Home
  • About us
  • Contact us
  • DMCA
  • Privacy Policy
  • Terms of Service
  • Advertise with Us
  • 1711155001.38
  • xtw183871351
  • 1711198661.96
  • xtw18387e4df
  • 1711246166.83
  • xtw1838741a9
  • 1711297158.04
  • xtw183870dc6
  • 1711365188.39
  • xtw183879911
  • 1711458621.62
  • xtw183874e29
  • 1711522190.64
  • xtw18387be76
  • 1711635077.58
  • xtw183874e27
  • 1711714028.74
  • xtw1838754ad
  • 1711793634.63
  • xtw183873b1e
  • 1711873287.71
  • xtw18387a946
  • 1711952126.28
  • xtw183873d99
  • 1712132776.67
  • xtw183875fe9
  • 1712201530.51
  • xtw1838743c5
  • 1712261945.28
  • xtw1838783be
  • 1712334324.07
  • xtw183873bb0
  • 1712401644.34
  • xtw183875eec
  • 1712468158.74
  • xtw18387760f
  • 1712534919.1
  • xtw183876b5c
  • 1712590059.33
  • xtw18387aa85
  • 1712647858.45
  • xtw18387da62
  • 1712898798.94
  • xtw1838737c0
  • 1712953686.67
  • xtw1838795b7
  • 1713008581.31
  • xtw18387ae6a
  • 1713063246.27
  • xtw183879b3c
  • 1713116334.31
  • xtw183872b3a
  • 1713169981.74
  • xtw18387bf0d
  • 1713224008.61
  • xtw183873807
  • 1713277771.7
  • xtw183872845
  • 1713329335.4
  • xtw183874890
  • 1716105960.56
  • xtw183870dd9
  • 1716140543.34
  • xtw18387691b

Type above and press Enter to search. Press Esc to cancel.