Newly Discovered “System Update” Android Malware Steals Photos, Videos & GPS Location

https://gbhackers.com/newly-discovered-system-update-android-malware-steals-photos-videos/

Once the user downloads this destructive app on their mobile phone, the app contacts the Firebase server and begins controlling the device remotely. Furthermore, the security professionals have actually affirmed that this destructive app screen itself as “System Update.”.

This new “System Update” malware is surprisingly sophisticated malware, and this malware tricks and infects the users by launching an alert that pretends to be a system upgrade.

In this situation, when the user clicks the notice, the malware asks the user to install this new application, which will later on request full access to the device..

And here once the user grants the gain access to, it will merely take over the control of the gadget and will get access to all the following things that we have pointed out listed below:-.

New Malware: “System Update”.

As just recently, the cybersecurity scientists at Zimperium have found a harmful app that can be downloaded outside of Google Play (third-party Android app stores)..

We must always stay careful and alert with the applications that we download and set up from outside the Play Store since we can download an app with malware that could contaminate our Android gadgets.

Messages in messenger apps.
If you have root rights, then it will likewise have access to the messenger database files.
Bookmarks.
Searching history.
Browse history in Chrome, Mozilla Firefox and Samsung web browser.
Numerous types of files like.pdf,.
Clipboard data.
Content of the notifications.
List of set up apps.
Videos and images.
GPS location data.
SMS messages.
Contacts.
Call logs.
Recording audio.
Recording phone calls.
Installed apps..
Device name.
Storage data.
Video camera.

How Does It Work?

According to the report, the malware sends numerous information to its Firebase C&C server simply after getting installed on the gadget. And the data that it sends consists of storage statistics, ISP details, and installed apps..

Here, the most peaceful thing is that this harmful app has actually never ever been available on Google Play, and not only that, even the designers at Google are trying their best to avoid it from circumventing its security walls.

To conceal its malicious activities, it publicised phony alerts about the search for updates when it gets new commands from its speculators.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity, and hacking news updates.

Nevertheless, here the Firebase is used just for conveying commands, while a separate C&C server is utilized to gather other taken data utilizing POST demands. This malware collects information straight if it has root access or uses the “Accessibility Services” function on the jeopardized gadget.