/?pid=20956

Updated:06:27 PM EST Feb 25


this is ggmania.com subsite 25 million Android devices get infected - TechAmok

25 million Android devices get infected - [security]
06:32 PM EDT - Jul,10 2019 - (3 comments)

The name 'Agent Smith' is usually associated with the famed Matrix movie trilogy. However, it is now being used to identify a new variant of malware discovered by security provider Check Point Research. The firm reports that around 25 million Android devices have been infected by Agent Smith over the course of the last three years, and that the attackers behind the scenes may be looking to expand their reach. The malware is spread through 9Apps, a third-party apps store, and has targeted mainly Asian users; however, countries such as the U.S. and U.K. have had a high amount of device breaches as well. Essentially, the life cycle of the malware revolves around three phases that have been described in the following way:
  • 1) A dropper app lures victim to install itself voluntarily. The initial dropper has a weaponized Feng Shui Bundle as encrypted asset files. Dropper variants are usually barely functioning photo utility, games, or sex related apps.
  • 2) The dropper automatically decrypts and installs its core malware APK which later conducts malicious patching and app updates. The core malware is usually disguised as Google Updater, Google Update for U or “com.google.vending”. The core malware's icon is hidden.
  • 3) The core malware extracts the device's installed app list. If it finds apps on its prey list (hard-coded or sent from C&C server), it will extract the base APK of the target innocent app on the device, patch the APK with malicious ads modules, install the APK back and replace the original one as if it is an update.
  • To expand a bit upon each of these phases, 'droppers' are apps that imitate popular utilities while quietly installing malicious content on a device. The dropper variants deployed as part of this attack include a number of different applications that may attract users of all ages. These typically offer little to no functionality, but a one-time installation is all that's required to address a major phase of the attack - actually getting the malware on the target device. Moving on, the core module of a 'loader' that's additionally coded with the dropper gets installed, and begins searching the infected device for pre-determined popular apps. The pre-determined list of apps is obtained through contact with a command-and-control (C&C) server. The apps include some highly popular and widely-used ones, such as WhatsApp, ShareIt, MX Player, the Opera browser and more. The loader then works with various other modules to infect the legitimate applications with its own code. As a result of this alteration, Android's package manager is duped into considering the malicious files as an update for said applications. Throughout the following 'update' process, the malware disguises itself as a Google-related updating tool, thus not rousing users' suspicions. The breached apps, now carrying the malicious ad modules patched into their APKS, start displaying these ads as a replacement of in-app activity. Even if said app isn't specified in the pre-created list, the ads are simply shown on any activity that is being loaded at the time. Notably, 'Agent Smith' will continue to infect the same device multiple times, whenever the latest malicious patches are available.

    Based on its research, Check Point believes that a Chinese firm operating in the city of Guangzhou is the main culprit behind the attacks. The name of the company has been redacted from its publication, and information related to the attacks has been provided to law enforcement officials, as well as Google, to assist them in further investigation. Although this form of malware was initially only spread through 9Apps, the researchers discovered traces of the malicious actors looking to spread their system to Play Store applications as well. During the search, 11 Play Store apps were found to be connected to the attackers. However, Check Point does state that it has worked closely with Google to remove all of these from the Play Store. Google has not issued a public statement regarding the matter as of yet, though we'll keep you updated. For now, do make sure that you download your applications from a trustworthy app store, and be on the lookout for ads that may crop up at unusual times.

    last 10 comments:

    (11:58 AM EDT - Jun,02 2020) - jackyj
    thankyou for sharing online healing courses
    (11:58 AM EDT - Jun,02 2020) - jackyj
    (06:59 AM EDT - May,13 2020) - fazadoxe
    The recent news break about the technology that there are millions of devices who are infected during the security breach. All this news is covering by uk essays review who provides the authentic news on all the technology.

    Add your comment (free registrationrequired)

    Short overview of recent news articles

    Feb,25 2026 Samsung Previews New AI Features Ahead of Flagship Phone Launch
    Feb,25 2026 China's DeepSeek Bars Nvidia and AMD from New AI Model, Boosts
    Feb,25 2026 Avast Impersonation Scam: Fake Site Tricks Users into Handing Over
    Feb,25 2026 Microsoft Pulls the Plug: Windows Server 2016 and 2016-Era Windows
    Feb,25 2026 I Scrapped 13 MACHINES to Prove a Point: STOP BUYING These Brands!
    Feb,25 2026 How Stealthy was the 7zip Malware and how to spot it?
    Feb,25 2026 Microsoft Drops Fresh Non-Security Boost for Windows 11 24H2 and
    Feb,24 2026 Game-Changer: ASML's 1kW EUV Upgrade Promises 50% Chip Production
    Feb,24 2026 This Outstanding Cooling Technology Might Have No Future
    Feb,24 2026 AMD Strix Halo 395 vs Intel Panther Lake - Real Benchmarks
    Feb,24 2026 Anthropic published a blog post saying Claude can modernize COBOL
    Feb,24 2026 WhatsApp Goes Beyond 2FA: Extra Password Layer Makes Accounts Nearly
    Feb,24 2026 Google Chrome Gets February 23 Security Boost with 3 High Fixes
    Feb,23 2026 Stargate Stalls: OpenAI's $500B Dream Hits Roadblocks as $14B 2026
    Feb,23 2026 Google Crushes Cyber Threats: Blocks 1.75 Million Bad Apps and Bans
    Feb,22 2026 Bitcoin Miner Bitdeer Sells Everything: Treasury Hits Zero in AI
    Feb,22 2026 HW News - More Valve RAM Shortages, Tariffs Ruling, AI Causes PS6
    Feb,22 2026 Microsoft's Deep Integration of Copilot in Windows 11 Raises
    Feb,22 2026 Elon Musk Confirms X Money Now Live in Internal Beta for Employees,
    Feb,22 2026 Scream (1996) Flashback Review
    Feb,22 2026 PayPal Confirms Major Breach: SSNs, Emails, and More Exposed from
    Feb,22 2026 Does Freezing Help Delidding? 9850X3D Delid & Overclocking Test
    Feb,22 2026 Microsoft is phasing out the custom primary password feature in its
    Feb,21 2026 Everyone is Buying the Wrong Dash Cam! (2026)
    Feb,20 2026 Big Brother on Discord: Leaked Code Shows Age Verification Runs You
    Feb,19 2026 OpenClaw’s Top Skill is a Malware that Stole SSH Keys and Opened
    Feb,19 2026 Google Adds Satellite SOS to its Affordable Pixel Phone
    Feb,19 2026 Phison CEO Warns: AI-Driven NAND and DRAM Shortage Could Bankrupt
    Feb,19 2026 NVIDIA CEO hypes up GTC 2026, promises to unveil a chip that will
    Feb,19 2026 Microsoft is uploading your confidential emails to Copilot for
    Feb,18 2026 Anthropic Releases Claude Sonnet 4.6 with Improved Coding, Computer
    Feb,17 2026 Apple Eyeing A Partnership With Chinese Memory Makers YMTC And CXMT
    Feb,17 2026 This $60,000 TV was IRRESISTIBLE
    Feb,17 2026 Keenadu Android Backdoor Infects Firmware, Spreads via Google Play
    Feb,17 2026 Discord's ID Check Nightmare Sparks Massive Exodus to TeamSpeak
    Feb,17 2026 Amazing Robot Performance at the 2026 Spring Festival Gala
    Feb,16 2026 Apple brings video podcasts and other improvements in iOS 26.4 beta
    Feb,16 2026 Dutch Defence Secretary Boldly Claims F-35 Software Could Be
    Feb,16 2026 Samsung shows off Galaxy S26 Ultra privacy display
    Feb,16 2026 60 Million Passwords Exposed? ETH Zurich Shatters 'Unbreakable'
    >> News Archive <<

    TechAmok - Privacy Policy        loading time:0.01secs