Newly Discovered “System Update” Android Malware Steals Photos, Videos & GPS Location

https://gbhackers.com/newly-discovered-system-update-android-malware-steals-photos-videos/

And here once the user grants the access, it will merely take control of the control of the device and will get access to all the following things that we have discussed below:-.

In this scenario, when the user clicks the alert, the malware asks the user to install this brand-new application, which will later ask for full access to the gadget..

We need to constantly remain mindful and alert with the applications that we install and download from outside the Play Store because we can download an app with malware that could contaminate our Android devices.

This new “System Update” malware is remarkably advanced malware, and this malware tricks and contaminates the users by launching a notice that pretends to be a system upgrade.

New Malware: “System Update”.

As just recently, the cybersecurity researchers at Zimperium have actually discovered a malicious app that can be downloaded beyond Google Play (third-party Android app stores)..

Messages in messenger apps.
It will also have access to the messenger database files if you have root rights.
Bookmarks.
Browsing history.
Browse history in Chrome, Mozilla Firefox and Samsung browser.
Several kinds of files like.pdf,. doc,. docx, and.xls,. xlsx.
Clipboard data.
Content of the notices.
List of installed apps.
Images and Videos.
GPS place data.
SMS messages.
Contacts.
Call logs.
Recording audio.
Recording phone calls.
Installed apps..
Device name.
Storage stats.
Camera.

When the user downloads this destructive app on their mobile phone, the app contacts the Firebase server and begins controlling the device from another location. The security specialists have affirmed that this harmful app screen itself as “System Update.”.

How Does It Work?

To hide its destructive activities, it publicised phony alerts about the search for updates when it receives new commands from its speculators.

However, here the Firebase is utilized just for communicating commands, while a separate C&C server is used to collect other stolen data utilizing POST demands. This malware collects data straight if it has root access or utilizes the “Accessibility Services” function on the compromised device.

According to the report, the malware sends out various information to its Firebase C&C server simply after getting installed on the gadget. And the data that it sends includes storage stats, ISP information, and installed apps..

But, here, the most peaceful thing is that this harmful app has never been available on Google Play, and not just that, even the designers at Google are attempting their finest to avoid it from circumventing its security walls.

You can follow us on Linkedin, Twitter, Facebook for everyday Cybersecurity, and hacking news updates.