Friday, July 10, 23:10
Home security XHelper malware: reinstalled after resetting to factory settings

XHelper malware: reinstalled after resetting to factory settings


Malware XHelper, which affects devices that use the operating system Android, was first discovered in October 2019.

XHelper is very persistent, once installed on device, remains active even if the user deletes it and restores factory settings.

Android XHelper Malware

Malicious agents have introduced XHelper malware as an application for cleaning and accelerating the device. However, it does not have any such function.

Once the application XHelper on a victim's device simply disappears from the main screen or application menu.

Then one server controlled by the intruder, downloads the second malicious element, "Trojan-Dropper.AndroidOS.Agent.of" which decrypts the payload using the native library.

The next dropper is "Trojan-Dropper.AndroidOS.Helper.b", which launches "Trojan-Downloader.AndroidOS.Leech.p" for further infection.

Leech.p downloads "HEUR: Trojan.AndroidOS.Triada.dd", which is being exploited vulnerabilities to escalate privileges on the victim's device.

“Malicious files are stored sequentially in the application's data folder, to which other programs do not have access. This allows malware developers to hide their tracks and use malicious operating systems known for security solutions, ”she said. Kaspersky.

Malicious XHelper software adds a number of files to the folder / system / bin and adds requests to install that makes Triada.dd run at startup systemic.

Some users have stated that they have disabled the XHelper activity by disabling the rights and locking them using software application lock. Others said they "tried to deny the rights to XHelper without removing the installation, but re-enabled all rights reserved".


Please enter your comment!
Please enter your name here

Absent Mia
Absent Mia
Being your self, in a world that constantly tries to change you, is your greatest achievement


Sony: Invest $ 250 Million in Fortnite Epic Games!

Sony has made an investment of $ 250 million to acquire a 1,4% stake in Epic Games, ...

C-Data FTTH OLT devices contain backdoors

Serious vulnerabilities and backdoors were discovered by two security researchers in the firmware of 29 FTTH OLT devices, the popular equipment provider C-Data.

Spotify, Pinterest and Tinder are "crashing" because of D. Facebook

Popular applications and services, such as Spotify, Pinterest and Tinder, have cracked iOS devices ....

Technology and Teachers: What Do Experts Appreciate?

Too many educators around the world have struggled to adopt the technological tools in the midst of the pandemic to deliver lessons ...

COVID-19 apps: Virus detection applications violate privacy

COVID-19 apps: Beware, they violate private privacy Virus detection applications violate private privacy by recording more data than they need, setting ...

Debian 8 “Jessie”: Another version in End-of-life stage

After a long support of Debian 8 "Jessie", the development team of the operating system announced that it stops ...

Conti ransomware: Is it the successor to Ryuk ransomware?

Conti ransomware is a new threat targeting corporate networks. Its advanced capabilities allow it ...

Smartwatch tracker that helps vulnerable people can be hacked

Researchers have uncovered a number of serious security issues in a smartwatch tracker used in applications, including services designed for ...

WhatsApp: QR codes help you communicate with businesses

Facebook's messaging service, WhatsApp, has introduced two new features to help businesses ...

Zoom: Works to correct zero-day vulnerability

Zoom teleconferencing software works to fix a zero-day vulnerability revealed by the security company ...