Newly Discovered “System Update” Android Malware Steals Photos, Videos & GPS Location

In this circumstance, when the user clicks on the alert, the malware asks the user to install this brand-new application, which will later on request complete access to the gadget..

As just recently, the cybersecurity scientists at Zimperium have discovered a harmful app that can be downloaded outside of Google Play (third-party Android app shops)..

As soon as the user downloads this harmful app on their smartphone, the app contacts the Firebase server and begins managing the gadget from another location. Moreover, the security specialists have verified that this destructive app screen itself as “System Update.”.

Messages in messenger apps.
If you have root rights, then it will also have access to the messenger database files.
Browsing history.
Search history in Chrome, Mozilla Firefox and Samsung browser.
Several types of files like.pdf,.
Clipboard data.
Content of the notices.
List of set up apps.
Images and Videos.
GPS location information.
SMS messages.
Call logs.
Recording audio.
Recording call.
Installed apps..
Device name.
Storage data.

This new “System Update” malware is surprisingly advanced malware, and this malware techniques and infects the users by releasing a notification that pretends to be a system upgrade.

We need to constantly remain cautious and alert with the applications that we install and download from outside the Play Store since we can download an app with malware that could infect our Android devices.

And here once the user grants the gain access to, it will just take over the control of the gadget and will get access to all the following things that we have actually pointed out below:-.

New Malware: “System Update”.

How Does It Work?

According to the report, the malware sends various information to its Firebase C&C server simply after getting set up on the gadget. And the information that it sends out consists of storage stats, ISP information, and installed apps..

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity, and hacking news updates.

Here, the most relaxing thing is that this destructive app has actually never ever been offered on Google Play, and not just that, even the designers at Google are trying their finest to avoid it from preventing its security walls.

Additionally, to conceal its malicious activities, it publicised phony alerts about the search for updates when it gets brand-new commands from its speculators.

Nevertheless, here the Firebase is utilized just for conveying commands, while a separate C&C server is utilized to collect other taken information using POST demands. This malware gathers information straight if it has root gain access to or uses the “Accessibility Services” function on the jeopardized gadget.