Newly Discovered “System Update” Android Malware Steals Photos, Videos & GPS Location

https://gbhackers.com/newly-discovered-system-update-android-malware-steals-photos-videos/

Once the user downloads this malicious app on their mobile phone, the app contacts the Firebase server and begins controlling the device from another location. The security specialists have verified that this destructive app screen itself as “System Update.”.

This new “System Update” malware is surprisingly sophisticated malware, and this malware tricks and contaminates the users by releasing an alert that pretends to be a system update.

As just recently, the cybersecurity scientists at Zimperium have found a malicious app that can be downloaded outside of Google Play (third-party Android app stores)..

In this situation, when the user clicks the notification, the malware asks the user to install this brand-new application, which will later on ask for complete access to the gadget..

We should always remain cautious and alert with the applications that we install and download from outside the Play Store considering that we can download an app with malware that might contaminate our Android devices.

New Malware: “System Update”.

Messages in messenger apps.
It will likewise have access to the messenger database files if you have root rights.
Bookmarks.
Searching history.
Browse history in Chrome, Mozilla Firefox and Samsung browser.
A number of types of files like.pdf,.
Clipboard information.
Material of the alerts.
List of installed apps.
Images and Videos.
GPS area information.
SMS messages.
Contacts.
Call logs.
Recording audio.
Recording phone calls.
Installed apps..
Device name.
Storage stats.
Cam.

And here once the user grants the gain access to, it will merely take control of the control of the device and will get access to all the following things that we have actually discussed below:-.

How Does It Work?

But, here, the most relaxing thing is that this malicious app has actually never been available on Google Play, and not only that, even the designers at Google are attempting their best to avoid it from preventing its security walls.

According to the report, the malware sends various information to its Firebase C&C server simply after getting installed on the device. And the data that it sends consists of storage stats, ISP information, and installed apps..

Here the Firebase is utilized just for conveying commands, while a separate C&C server is utilized to collect other stolen data utilizing POST requests. This malware gathers data straight if it has root gain access to or utilizes the “Accessibility Services” function on the compromised gadget.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity, and hacking news updates.

Moreover, to hide its destructive activities, it publicised fake alerts about the look for updates when it receives brand-new commands from its speculators.