Newly Discovered “System Update” Android Malware Steals Photos, Videos & GPS Location

This new “System Update” malware is surprisingly sophisticated malware, and this malware tricks and contaminates the users by launching a notice that pretends to be a system update.

Once the user downloads this malicious app on their smart device, the app contacts the Firebase server and begins managing the device from another location. Moreover, the security experts have actually affirmed that this destructive app screen itself as “System Update.”.

New Malware: “System Update”.

In this situation, when the user clicks the alert, the malware asks the user to install this new application, which will later on ask for full access to the gadget..

And here once the user grants the gain access to, it will simply take control of the control of the device and will get access to all the following things that we have actually mentioned listed below:-.

We need to always remain alert and cautious with the applications that we download and install from outside the Play Store since we can download an app with malware that could contaminate our Android gadgets.

Messages in messenger apps.
It will likewise have access to the messenger database files if you have root rights.
Searching history.
Browse history in Chrome, Mozilla Firefox and Samsung internet browser.
Numerous kinds of files like.pdf,. doc,. docx, and.xls,. xlsx.
Clipboard information.
Content of the alerts.
List of set up apps.
Videos and images.
GPS location data.
SMS messages.
Call logs.
Recording audio.
Recording telephone call.
Set up apps..
Device name.
Storage statistics.

As just recently, the cybersecurity scientists at Zimperium have actually found a destructive app that can be downloaded outside of Google Play (third-party Android app shops)..

How Does It Work?

According to the report, the malware sends out various data to its Firebase C&C server just after getting installed on the device. And the information that it sends includes storage stats, ISP details, and set up apps..

Here, the most peaceful thing is that this malicious app has never been readily available on Google Play, and not only that, even the designers at Google are trying their finest to avoid it from preventing its security walls.

You can follow us on Linkedin, Twitter, Facebook for everyday Cybersecurity, and hacking news updates.

Here the Firebase is used just for conveying commands, while a different C&C server is utilized to collect other taken information using POST demands. This malware gathers information directly if it has root gain access to or utilizes the “Accessibility Services” function on the jeopardized gadget.

To conceal its malicious activities, it publicised phony alerts about the search for updates when it gets new commands from its speculators.