Trojan root Android device bypasses Google's security mode on Play Store
A new malware rooted the Android device with the ability to turn off the device's security settings and try to perform a standalone task in the background that was detected on Play Store.
The malicious code hidden in this application is so smart that it deceives Google's security mechanism, pretending to be a clean application, then replacing it with a poisoned version for a short time. Security researchers at Kaspersky Lab discovered that the new malware was released in the form of a Google Play Store game application, hidden behind the colorful block puzzle game that was downloaded at least 50,000 times before being removed.
Named Dvmap, this Android root malware disables the device's security settings to install a third-party malicious application and inserts a malicious code and system runtime library device to gain root access. phone.
"To overcome the security of Google Play Store, this malware creator used a very interesting method. They downloaded a clean application to the Store at the end of March 2017, then updated with the poisoned version in a short period of time, "the researchers said. "Normally, they will upload a clean version later on the same day. They did it at least 5 times between April 18 and May 15."
How it works Dvmap malware
The Trojan works on both 32-bit and 64-bit versions of Andorid, once installed, it will attempt to gain root access to the device and install some modules on the system, including some written in Chinese. together with standalone application named com.qualcmm.timeservices.
The root of the Android phone is in the puzzle game application
To ensure that the infected module can be run by the system, the malware overwrites the system's runtime library, depending on the version of the user's Android device. To complete the installation of the stand-alone application, the system's authorized trojan will turn off Verify Apps and adjust the system settings, allowing applications to be installed from third parties.
"In addition, it can give the com.qualcmm.timeservices application the Administrator Administrator administrative rights without user intervention, just by running the command. That's a very different way to gain administrative rights." This third-party application will connect the infected device to the attacker's server, giving complete control of the device to the hacker.
However, researchers still do not know which Android device is infected with the command, so it is unclear what kind of file it is executing, but it could be an ad file or a poison.
How to protect the phone from the Dvmap malware?
Researchers are still testing the malware, but users who have installed the game are advised to back up phone data and perform data reset to avoid malware attacks.
To protect your phone from such applications, always be cautious of untrusted applications, especially when downloading from Google Play Store. Remember to only grant application verification rights when the content is relevant to the purpose of the application. Don't forget to read the user comments section before installing. In addition, anti-malware applications on your phone can detect and block malware before they infect your phone.
You should read it
- 5 types of malware on Android
- New banking malware discovered that can remotely control Android devices
- Hackers are taking advantage of the Store to distribute malware
- New bank trojan detection on Android Red Alert
- How to detect and remove malware Agent Smith on Android
- Detecting Android malware can easily steal OTP code without the victim knowing
- How to remove malicious software (malware) on Android applications?
- Mobile malware infection rate increased by 400% in the past year. Android has the highest rate
- What is Clipper Malware? How does it affect Android users?
- Sockbot malware was discovered in applications on Google Play Store
- Detected 4 banking trojans in 11 apps on Google Play Store
- For Android, is an antivirus application really necessary?
Maybe you are interested
How to Create Power-Ups and Collections in Pygame How to create scrolling backgrounds in Pygame How does Google Photos work? How to make the most of 15GB of free storage? Difference between H.264 and X.264 These classic board games can be played on Android and iOS What is a ventilator that every country in the world is racing to have as much as possible?