Newly Discovered “System Update” Android Malware Steals Photos, Videos & GPS Location

As recently, the cybersecurity researchers at Zimperium have discovered a harmful app that can be downloaded beyond Google Play (third-party Android app stores)..

Messages in messenger apps.
If you have root rights, then it will also have access to the messenger database files.
Browsing history.
Search history in Chrome, Mozilla Firefox and Samsung web browser.
Numerous types of files like.pdf,.
Clipboard information.
Content of the notices.
List of set up apps.
Images and Videos.
GPS place data.
SMS messages.
Call logs.
Recording audio.
Recording call.
Installed apps..
Device name.
Storage data.

In this circumstance, when the user clicks the notice, the malware asks the user to install this new application, which will later ask for full access to the device..

And here once the user grants the gain access to, it will just take control of the control of the device and will get access to all the following things that we have mentioned below:-.

New Malware: “System Update”.

As soon as the user downloads this destructive app on their smart device, the app contacts the Firebase server and starts managing the gadget remotely. The security professionals have verified that this destructive app screen itself as “System Update.”.

We must constantly stay alert and mindful with the applications that we download and install from outside the Play Store considering that we can download an app with malware that could infect our Android gadgets.

This new “System Update” malware is remarkably sophisticated malware, and this malware tricks and contaminates the users by releasing a notice that pretends to be a system upgrade.

How Does It Work?

According to the report, the malware sends out different data to its Firebase C&C server just after getting set up on the gadget. And the information that it sends consists of storage statistics, ISP details, and set up apps..

You can follow us on Linkedin, Twitter, Facebook for everyday Cybersecurity, and hacking news updates.

To conceal its harmful activities, it publicised phony alerts about the search for updates when it receives new commands from its speculators.

Here, the most relaxing thing is that this destructive app has never been offered on Google Play, and not only that, even the developers at Google are trying their best to prevent it from preventing its security walls.

Here the Firebase is used just for communicating commands, while a separate C&C server is utilized to collect other taken data utilizing POST requests. This malware collects data straight if it has root access or utilizes the “Accessibility Services” function on the compromised device.