Tuesday, October 27, 19:13
Home security Joker Malware apps are redistributed through the Google Play Store

Joker Malware apps are redistributed through the Google Play Store

Joker Malware

Researchers security they discovered another incident with me Android malware hidden in applications and registers unsuspecting users in premium services without knowing it. Her researchers Check Point they discovered that the famous Joker malware he found another trick to bypass his protections Google Play Store: hides the malicious DEX executable in the application as "Base64 encoded strings", which are then decoded and loaded into the compromised device.

Following the revelation of Check Point researchers, the 11 suspects applications removed from the Google Play Store on April 30, 2020.

“Joker malware is difficult to locate, despite the addition of additional levels protection in the Google Play Store, ”said Check Point Aviran Hazum, who identified the new Joker malware mode. "Although Google removed the malicious ones applications from the Play Store, we expect the Joker to adapt again ".

Joker malware was discovered in 2017 and is one of the most popular types of Android malware. It is known for committing fraud, the spyware its capabilities and theft of SMS messages, contact lists and information device.

The Joker infected a lot of Android applications in the previous year, which were discovered by CSIS Security Group, Trend Micro, Dr.Web and Kaspersky. The researchers found that malware was constantly finding ways to exploit vulnerabilities in Play Store security checks.

The creators of Joker malware have used various methods to hide the true nature of the applications and avoid detection.

"As the Play Store introduced new policies and Google Play Protect strengthened its defenses, the Joker applications began to look for new gaps. security", Said the Android security and privacy team. "They used almost every concealment technique in an attempt to hide them."

Google Play Store

As of January 2020, Google has removed more than 1.700 Play Store apps over the past three years and infected them with malware.

The new variant of Joker malware detected by Check Point achieves its purposes by utilizing the manifest file of the application, which it uses to load one file DEX coded Base64.

A second "intermediate" version uses a similar technique to hide the .dex file.

"To enable users to sign up for premium services without their knowledge or consent, the Joker malware used two main elements - the Notification Listener as part of the original application and one dex file which is loaded by the C&C server to perform the registration ", said the researchers.

The latest version of the Joker reminds us that Android malware is constantly evolving, so we must always be on the lookout.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Digital Fortress
Digital Fortresshttps://www.secnews.gr
Pursue Your Dreams & Live!

LIVE NEWS

00:01:47

Data breach in a law firm exposes data of Google employees

Immigration law firm Fragomen, Del Rey, Bernsen & Loewy, LLP revealed that it suffered a data breach that led to the leakage of personal data ...

How to install a .watchface file on Apple Watch

The Apple Watch lets you customize the faces of the watch to display all kinds of useful information. But did you know ...

The five biggest data breaches of the 21st century

Data is becoming more and more sought after as our daily lives become more digitized. The technology giants that monopolize data are ...

Microsoft is limiting the availability of Windows 10 20H2

Microsoft is currently restricting the availability of Windows 10 20H2 to provide all users who want to ...

How to enable the new Chrome Read more feature

The latest version of Google Chrome browser, v86, released earlier this month, contains a secret feature called Read ...

How to choose a custom color for the Start menu

Starting with the October 2020 update, Windows 10 is the default on a theme that removes bright colors from ...

NASA telescope discovers drinking water on the moon

Eleven years ago, a spacecraft changed our view of the moon forever. The data collected by ...

Microsoft: Enhances password spray attack detection capabilities

Microsoft has significantly improved the ability to detect password spray attacks in the Azure Active Directory (Azure AD) and has reached the point ...

How to prevent companies from finding our phone number

In the age of advertising, the more user information is known the more convenient it is for companies. And in particular, the ...

Violation in a psychotherapy clinic led to blackmail of patients

Two years ago, a cyber attack took place in a Finnish psychotherapy clinic, which resulted in data theft and ransom demand. Now,...