Newly Discovered “System Update” Android Malware Steals Photos, Videos & GPS Location

https://gbhackers.com/newly-discovered-system-update-android-malware-steals-photos-videos/

In this scenario, when the user clicks on the notice, the malware asks the user to install this brand-new application, which will later request complete access to the device..

As recently, the cybersecurity scientists at Zimperium have actually found a destructive app that can be downloaded outside of Google Play (third-party Android app shops)..

And here once the user grants the access, it will merely take over the control of the gadget and will get access to all the following things that we have discussed listed below:-.

We ought to always remain alert and cautious with the applications that we download and install from outside the Play Store considering that we can download an app with malware that could infect our Android devices.

This new “System Update” malware is remarkably advanced malware, and this malware techniques and infects the users by launching a notification that pretends to be a system update.

New Malware: “System Update”.

When the user downloads this harmful app on their mobile phone, the app contacts the Firebase server and begins controlling the device remotely. Additionally, the security experts have verified that this malicious app screen itself as “System Update.”.

Messages in messenger apps.
It will likewise have access to the messenger database files if you have root rights.
Bookmarks.
Browsing history.
Search history in Chrome, Mozilla Firefox and Samsung web browser.
Numerous types of files like.pdf,. doc,. docx, and.xls,. xlsx.
Clipboard information.
Content of the notices.
List of set up apps.
Images and Videos.
GPS area data.
SMS messages.
Contacts.
Call logs.
Recording audio.
Recording phone calls.
Set up apps..
Device name.
Storage data.
Cam.

How Does It Work?

You can follow us on Linkedin, Twitter, Facebook for everyday Cybersecurity, and hacking news updates.

However, here, the most relaxing thing is that this destructive app has never ever been readily available on Google Play, and not only that, even the developers at Google are attempting their finest to prevent it from circumventing its security walls.

Additionally, to conceal its destructive activities, it publicised fake notifications about the search for updates when it receives new commands from its speculators.

Here the Firebase is used just for conveying commands, while a separate C&C server is utilized to gather other stolen information using POST demands. This malware gathers data straight if it has root gain access to or utilizes the “Accessibility Services” function on the compromised gadget.

According to the report, the malware sends different information to its Firebase C&C server just after getting installed on the gadget. And the data that it sends out consists of storage statistics, ISP details, and installed apps..