Newly Discovered “System Update” Android Malware Steals Photos, Videos & GPS Location

https://gbhackers.com/newly-discovered-system-update-android-malware-steals-photos-videos/

In this scenario, when the user clicks on the notification, the malware asks the user to install this new application, which will later request complete access to the gadget..

This brand-new “System Update” malware is remarkably sophisticated malware, and this malware techniques and infects the users by releasing a notification that pretends to be a system update.

And here once the user grants the gain access to, it will merely take over the control of the device and will get access to all the following things that we have pointed out below:-.

As soon as the user downloads this malicious app on their smart device, the app contacts the Firebase server and begins managing the device from another location. Furthermore, the security specialists have verified that this harmful app screen itself as “System Update.”.

New Malware: “System Update”.

We ought to constantly remain alert and cautious with the applications that we set up and download from outside the Play Store since we can download an app with malware that might contaminate our Android devices.

Messages in messenger apps.
It will also have access to the messenger database files if you have root rights.
Bookmarks.
Browsing history.
Browse history in Chrome, Mozilla Firefox and Samsung web browser.
Numerous types of files like.pdf,. doc,. docx, and.xls,. xlsx.
Clipboard information.
Content of the notifications.
List of set up apps.
Videos and images.
GPS area data.
SMS messages.
Contacts.
Call logs.
Recording audio.
Recording call.
Installed apps..
Device name.
Storage statistics.
Camera.

As just recently, the cybersecurity researchers at Zimperium have discovered a malicious app that can be downloaded beyond Google Play (third-party Android app stores)..

How Does It Work?

But, here, the most peaceful thing is that this malicious app has actually never ever been readily available on Google Play, and not just that, even the developers at Google are trying their finest to prevent it from circumventing its security walls.

According to the report, the malware sends out numerous data to its Firebase C&C server simply after getting installed on the device. And the information that it sends includes storage stats, ISP details, and set up apps..

Nevertheless, here the Firebase is utilized just for conveying commands, while a separate C&C server is used to gather other taken information using POST demands. This malware collects data directly if it has root gain access to or uses the “Accessibility Services” function on the jeopardized gadget.

You can follow us on Linkedin, Twitter, Facebook for day-to-day Cybersecurity, and hacking news updates.

Moreover, to conceal its malicious activities, it publicised fake alerts about the look for updates when it receives new commands from its speculators.