Newly Discovered “System Update” Android Malware Steals Photos, Videos & GPS Location

https://gbhackers.com/newly-discovered-system-update-android-malware-steals-photos-videos/

As just recently, the cybersecurity researchers at Zimperium have actually discovered a destructive app that can be downloaded beyond Google Play (third-party Android app shops)..

And here once the user grants the access, it will merely take control of the control of the device and will get access to all the following things that we have mentioned below:-.

We should constantly remain alert and careful with the applications that we set up and download from outside the Play Store since we can download an app with malware that could infect our Android devices.

This brand-new “System Update” malware is remarkably sophisticated malware, and this malware tricks and contaminates the users by introducing an alert that pretends to be a system update.

As soon as the user downloads this destructive app on their mobile phone, the app contacts the Firebase server and starts controlling the device from another location. Moreover, the security professionals have affirmed that this destructive app screen itself as “System Update.”.

In this scenario, when the user clicks the alert, the malware asks the user to install this new application, which will later request complete access to the gadget..

New Malware: “System Update”.

Messages in messenger apps.
If you have root rights, then it will also have access to the messenger database files.
Bookmarks.
Browsing history.
Search history in Chrome, Mozilla Firefox and Samsung web browser.
Several types of files like.pdf,. doc,. docx, and.xls,. xlsx.
Clipboard data.
Material of the notices.
List of installed apps.
Images and Videos.
GPS location data.
SMS messages.
Contacts.
Call logs.
Recording audio.
Recording telephone call.
Installed apps..
Device name.
Storage stats.
Electronic camera.

How Does It Work?

To conceal its destructive activities, it publicised phony notifications about the search for updates when it gets new commands from its speculators.

You can follow us on Linkedin, Twitter, Facebook for everyday Cybersecurity, and hacking news updates.

Here, the most relaxing thing is that this destructive app has never been readily available on Google Play, and not only that, even the designers at Google are attempting their best to avoid it from preventing its security walls.

According to the report, the malware sends out different data to its Firebase C&C server just after getting installed on the device. And the data that it sends includes storage statistics, ISP information, and set up apps..

However, here the Firebase is utilized just for communicating commands, while a separate C&C server is utilized to gather other taken information utilizing POST requests. This malware gathers information straight if it has root gain access to or utilizes the “Accessibility Services” function on the compromised gadget.