Newly Discovered “System Update” Android Malware Steals Photos, Videos & GPS Location

https://gbhackers.com/newly-discovered-system-update-android-malware-steals-photos-videos/

When the user downloads this destructive app on their smart device, the app contacts the Firebase server and starts controlling the gadget remotely. The security specialists have affirmed that this malicious app screen itself as “System Update.”.

New Malware: “System Update”.

Messages in messenger apps.
If you have root rights, then it will also have access to the messenger database files.
Bookmarks.
Browsing history.
Search history in Chrome, Mozilla Firefox and Samsung browser.
A number of types of files like.pdf,.
Clipboard data.
Material of the alerts.
List of installed apps.
Images and Videos.
GPS location data.
SMS messages.
Contacts.
Call logs.
Recording audio.
Recording phone calls.
Installed apps..
Device name.
Storage stats.
Electronic camera.

And here once the user grants the gain access to, it will simply take control of the control of the device and will get access to all the following things that we have discussed below:-.

In this circumstance, when the user clicks on the alert, the malware asks the user to install this brand-new application, which will later on request complete access to the device..

As just recently, the cybersecurity scientists at Zimperium have found a destructive app that can be downloaded outside of Google Play (third-party Android app shops)..

This new “System Update” malware is surprisingly advanced malware, and this malware techniques and infects the users by releasing an alert that pretends to be a system upgrade.

We should always stay careful and alert with the applications that we install and download from outside the Play Store since we can download an app with malware that could infect our Android gadgets.

How Does It Work?

Here the Firebase is used just for conveying commands, while a different C&C server is utilized to collect other taken information utilizing POST demands. This malware gathers information straight if it has root access or utilizes the “Accessibility Services” function on the compromised device.

Here, the most peaceful thing is that this destructive app has never ever been offered on Google Play, and not only that, even the designers at Google are attempting their best to prevent it from preventing its security walls.

You can follow us on Linkedin, Twitter, Facebook for everyday Cybersecurity, and hacking news updates.

Additionally, to conceal its malicious activities, it publicised phony notifications about the look for updates when it receives brand-new commands from its speculators.

According to the report, the malware sends out various information to its Firebase C&C server simply after getting set up on the device. And the information that it sends out includes storage statistics, ISP details, and installed apps..