/?pid=25-million-android-devices-get-infected-20956

Updated:06:50 PM EDT Nov 01


this is ggmania.com subsite 25 million Android devices get infected - TechAmok

25 million Android devices get infected - [security]
06:32 PM EDT - Jul,10 2019 - (3 comments)

The name 'Agent Smith' is usually associated with the famed Matrix movie trilogy. However, it is now being used to identify a new variant of malware discovered by security provider Check Point Research. The firm reports that around 25 million Android devices have been infected by Agent Smith over the course of the last three years, and that the attackers behind the scenes may be looking to expand their reach. The malware is spread through 9Apps, a third-party apps store, and has targeted mainly Asian users; however, countries such as the U.S. and U.K. have had a high amount of device breaches as well. Essentially, the life cycle of the malware revolves around three phases that have been described in the following way:
  • 1) A dropper app lures victim to install itself voluntarily. The initial dropper has a weaponized Feng Shui Bundle as encrypted asset files. Dropper variants are usually barely functioning photo utility, games, or sex related apps.
  • 2) The dropper automatically decrypts and installs its core malware APK which later conducts malicious patching and app updates. The core malware is usually disguised as Google Updater, Google Update for U or “com.google.vending”. The core malware's icon is hidden.
  • 3) The core malware extracts the device's installed app list. If it finds apps on its prey list (hard-coded or sent from C&C server), it will extract the base APK of the target innocent app on the device, patch the APK with malicious ads modules, install the APK back and replace the original one as if it is an update.
  • To expand a bit upon each of these phases, 'droppers' are apps that imitate popular utilities while quietly installing malicious content on a device. The dropper variants deployed as part of this attack include a number of different applications that may attract users of all ages. These typically offer little to no functionality, but a one-time installation is all that's required to address a major phase of the attack - actually getting the malware on the target device. Moving on, the core module of a 'loader' that's additionally coded with the dropper gets installed, and begins searching the infected device for pre-determined popular apps. The pre-determined list of apps is obtained through contact with a command-and-control (C&C) server. The apps include some highly popular and widely-used ones, such as WhatsApp, ShareIt, MX Player, the Opera browser and more. The loader then works with various other modules to infect the legitimate applications with its own code. As a result of this alteration, Android's package manager is duped into considering the malicious files as an update for said applications. Throughout the following 'update' process, the malware disguises itself as a Google-related updating tool, thus not rousing users' suspicions. The breached apps, now carrying the malicious ad modules patched into their APKS, start displaying these ads as a replacement of in-app activity. Even if said app isn't specified in the pre-created list, the ads are simply shown on any activity that is being loaded at the time. Notably, 'Agent Smith' will continue to infect the same device multiple times, whenever the latest malicious patches are available.

    Based on its research, Check Point believes that a Chinese firm operating in the city of Guangzhou is the main culprit behind the attacks. The name of the company has been redacted from its publication, and information related to the attacks has been provided to law enforcement officials, as well as Google, to assist them in further investigation. Although this form of malware was initially only spread through 9Apps, the researchers discovered traces of the malicious actors looking to spread their system to Play Store applications as well. During the search, 11 Play Store apps were found to be connected to the attackers. However, Check Point does state that it has worked closely with Google to remove all of these from the Play Store. Google has not issued a public statement regarding the matter as of yet, though we'll keep you updated. For now, do make sure that you download your applications from a trustworthy app store, and be on the lookout for ads that may crop up at unusual times.

    last 10 comments:

    (11:58 AM EDT - Jun,02 2020) - jackyj
    thankyou for sharing online healing courses
    (11:58 AM EDT - Jun,02 2020) - jackyj
    (06:59 AM EDT - May,13 2020) - fazadoxe
    The recent news break about the technology that there are millions of devices who are infected during the security breach. All this news is covering by uk essays review who provides the authentic news on all the technology.

    Add your comment (free registrationrequired)

    Short overview of recent news articles

    Nov,01 2025 Battlefield REDSEC - Official Live-Action Trailer
    Nov,01 2025 What's the Best PC Upgrade (besides CPU/GPU)?
    Oct,31 2025 Directive 8020 - RTX On Trailer
    Oct,30 2025 Stranger Things 5 - Official Trailer
    Oct,29 2025 AMD Releases Software Adrenalin Edition 25.10.2 WHQL Drivers
    Oct,29 2025 Exploding AMD CPUs | Investigating ASRock's Murderboards
    Oct,29 2025 Setting Up Our First Huge Gaming Event was CHAOS
    Oct,27 2025 Malware of the Future: What an infected system looks like in 2025
    Oct,27 2025 F1: Race Highlights | 2025 Mexico City Grand Prix
    Oct,26 2025 F1: Qualifying Highlights | 2025 Mexico City Grand Prix
    Oct,25 2025 New Big Windows 11 25H2 October Update - New Taskbar Battery Icons
    Oct,25 2025 Apple Prepping 'Transfer to Android' Feature, Including 3rd-Party
    Oct,24 2025 HW News - RIP Internet, RAM Prices Skyrocket from AI Demand, Intel
    Oct,21 2025 Retro Gaming PC Upgrades go WRONG!
    Oct,21 2025 How social media has ruined us - the more time you spend online, the
    Oct,20 2025 FERRARI 12 CILINDRI // 340KMH REVIEW on AUTOBAHN
    Oct,20 2025 ROG Xbox Ally X - a PC Gamer's Perspective
    Oct,20 2025 Race Highlights | 2025 United States Grand Prix
    Oct,18 2025 RedMagic Puts Liquid Cooling in its New Gaming Phone
    Oct,18 2025 Russia Says U.S. Is Planning a $37 Trillion Crypto Reset
    Oct,18 2025 Tor Browser says no to Firefox's AI features as it removes them
    Oct,14 2025 NVIDIA GeForce 581.57 WHQL Driver
    Oct,13 2025 Samsung One UI 8.5 vs iOS 26 - COMPARISON
    Oct,12 2025 Google Turned Down by Supreme Court, Must Open up App Payments
    Oct,10 2025 AMD releases new 25.10.1 preview graphics driver with Battlefield 6
    Oct,10 2025 MERCY Official Trailer (2026) Chris Pratt
    Oct,07 2025 Galaxy S26 Ultra - Samsung, Please Don't Copy This
    Oct,06 2025 Canada's Las Vegas Sphere is here - and I game on it
    Oct,06 2025 Predator: Badlands - Official Final Trailer (2025)
    Oct,04 2025 Chasing a Gaming World Record
    Oct,02 2025 Frankenstein - Official Trailer (2025) Guillermo del Toro, Oscar
    Oct,02 2025 iPhone 17 Pro Max vs 16 Pro Max / Pixel 10 Pro XL / Galaxy S25 Ultra
    Sep,30 2025 iOS 26.0.1 is Out! - What's New?
    Sep,30 2025 NEW! 2026 Audi Q3 2.0 TFSI (265hp) vs. e-hybrid (272hp)| 0-100 km/h
    Sep,29 2025 Samsung One UI 8.5 Hands on - I Was Wrong
    Sep,28 2025 iPhone Air Teardown - What is 3D Printed Titanium?
    Sep,28 2025 Nvidia Wouldn't Send Me This $30,000 GPU - H200 Holy $H!T
    Sep,27 2025 The Astronaut - Official Trailer (2025) Kate Mara, Laurence
    Sep,25 2025 iPhone 17 Durability Test -- What Scratches are Permanent?
    Sep,23 2025 iPhone 17 Pro Max vs. Galaxy S25 Ultra Drop Test!
    >> News Archive <<

    TechAmok - Privacy Policy        loading time:0.01secs