Press ESC to close

3 Google Play Store Apps Exploit Android Zero-Day Used by NSO Group

CategoryDetails
Threat ActorsSideWinder APT, an Indian espionage group targeting organizations linked to the Pakistani military.
Campaign OverviewUse of malicious Android apps (Camero, FileCrypt, and callCam) to exploit vulnerabilities, root devices, and exfiltrate sensitive user data for espionage.
Target Regions (Victims)Android users worldwide, with a focus on individuals and organizations of interest to SideWinder APT.
MethodologyExploiting CVE-2019-2215 (use-after-free vulnerability) and MediaTek-SU driver flaws, using apps as droppers to install spyware, employing obfuscation and encryption for evasion, and hiding app icons to remain undetected.
Product TargetedAndroid devices, specifically apps like WeChat, Outlook, Twitter, Yahoo Mail, Facebook, Gmail, Chrome, and general device data.
Malware ReferenceCamero, FileCrypt, and callCam apps.
Tools UsedDroppers (Camero, FileCrypt), spyware payload (callCam), privilege escalation via CVE-2019-2215, dynamic code invocation, and obfuscation techniques.
Vulnerabilities ExploitedCVE-2019-2215 (local privilege escalation) and MediaTek-SU driver vulnerability for persistent root access.
TTPs– Deploying spyware through fake apps.
– Exploiting privilege escalation vulnerabilities.
– Data exfiltration via C&C servers.
– Hiding app icons for stealth.
AttributionSideWinder APT, attributed based on overlap in the location of command-and-control servers and historical targeting of Pakistani military-linked organizations.
Recommendations– Keep devices and apps up-to-date.
– Avoid downloading apps from unfamiliar sources.
– Review app permissions before installation.
– Back up data regularly.
– Install reputable antivirus software.
– Stay cautious of apps on Google Play Store.
SourceThe Hackers News

Read full article: https://thehackernews.com/2020/01/android-zero-day-malware-apps.html

The above summary has been generated by an AI language model

Leave a Reply

Your email address will not be published. Required fields are marked *