Newly Discovered “System Update” Android Malware Steals Photos, Videos & GPS Location

New Malware: “System Update”.

In this scenario, when the user clicks the notification, the malware asks the user to install this new application, which will later request full access to the device..

And here once the user grants the access, it will merely take control of the control of the device and will get access to all the following things that we have pointed out below:-.

Messages in messenger apps.
It will also have access to the messenger database files if you have root rights.
Searching history.
Browse history in Chrome, Mozilla Firefox and Samsung browser.
Numerous kinds of files like.pdf,. doc,. docx, and.xls,. xlsx.
Clipboard data.
Material of the notices.
List of installed apps.
Images and Videos.
GPS location information.
SMS messages.
Call logs.
Recording audio.
Recording phone calls.
Installed apps..
Device name.
Storage data.
Video camera.

This new “System Update” malware is surprisingly sophisticated malware, and this malware tricks and contaminates the users by launching an alert that pretends to be a system upgrade.

As soon as the user downloads this malicious app on their smartphone, the app contacts the Firebase server and starts managing the gadget from another location. Furthermore, the security specialists have actually verified that this malicious app screen itself as “System Update.”.

As recently, the cybersecurity scientists at Zimperium have discovered a malicious app that can be downloaded outside of Google Play (third-party Android app stores)..

We should always remain alert and mindful with the applications that we download and install from outside the Play Store because we can download an app with malware that could infect our Android devices.

How Does It Work?

Here the Firebase is utilized just for conveying commands, while a separate C&C server is utilized to collect other stolen data using POST requests. This malware gathers information straight if it has root access or utilizes the “Accessibility Services” function on the jeopardized gadget.

According to the report, the malware sends numerous information to its Firebase C&C server simply after getting set up on the gadget. And the information that it sends out consists of storage stats, ISP information, and installed apps..

To conceal its malicious activities, it publicised phony alerts about the search for updates when it receives brand-new commands from its speculators.

But, here, the most relaxing thing is that this destructive app has actually never ever been readily available on Google Play, and not only that, even the developers at Google are attempting their best to prevent it from circumventing its security walls.

You can follow us on Linkedin, Twitter, Facebook for day-to-day Cybersecurity, and hacking news updates.