Android users: under no circumstances should you sideload this spyware on your phone!

The software security company Zimperium says that a new and sophisticated malicious application for Android, which presents itself as a system update application, can wreak havoc on your phone and your life. The application can transfer control of your Android phone to malicious agents, who will be able to steal messages, data, images, take photos, consult your browser history, record calls and audio, view your WhatsApp messages and much more. This is indeed a serious feat.

Do not sideload this application on your Android phone!

The System Update app has never been on the Google Play Store, a fact confirmed by Google. The zLabs researchers discovered the app and, after conducting an investigation, found it to be a sophisticated spyware campaign with complex features. Now we know exactly what you are thinking. How long will Pizza Hut take to deliver a green pepper, onion and pineapple pizza? The second thought in your mind is that, if the app was never listed on the Google Play Store, how was it installed on your Android phone? The answer is simple, actually. It was installed via the sideload of a malicious application from a third-party application store.

After the application is installed, “the device is registered with Firebase Command and Control (C&C) with details such as the presence or absence of WhatsApp, percentage of battery, storage statistics, token received from the Firebase messaging service and the type of connection of internet. ” Spyware is triggered when several conditions take effect, such as adding a new contact, receiving a new SMS or installing a new application. Spyware is always looking for something to, well, spy on. If it detects that a phone call is taking place, it will record the conversation, add the updated call log and store the information on a command and control (C&C) server as an encrypted ZIP file. To make sure that there is no trace of what happened, spyware deletes the files as soon as it receives a thumbs up from the server stating that the files were received.

The data is then placed in several folders in the spyware’s private storage. A characteristic of spyware is that it always wants updated data. For example, if malicious software is set up to collect a new photo after 40 minutes, this is exactly what will happen. Location data is collected via GPS or over the network, depending on which one has the most recent data. If the current data is more than five minutes old, the location data will be collected and stored again.

Spyware will create a fake notification if the infected device’s screen is off when a command is received using the Firebase messaging service. One of the things this spyware does includes stealing thumbnails of images and video.

There is no doubt that this is a dangerous application. Perhaps the best thing you can do is to avoid sideloading an application called “Software Update”. Or you may want to consider staying away from third-party app stores. After all, check this list of things that this malicious application can do:

  • Steal instant messaging messages;
  • Steal instant messaging database files (if root is available);
  • Inspect bookmarks and searches from the default browser;
  • Inspect bookmarks and search history for browsers like Google Chrome, Mozilla Firefox and Samsung Internet Browser;
  • Search for files with certain extensions, such as .pdf, .doc, .docx and .xls, .xlsx;
  • Inspect the clipboard data;
  • Inspect the content of the notifications;
  • Record audio and phone calls;
  • Take pictures on a timed basis with the front or rear cameras;
  • Create a list of installed applications;
  • Monitor the GPS location;
  • Steal SMS messages; telephone contacts, images and videos and call logs;
  • Removing device from device information, such as installed apps, device name and storage statistics; and
  • hiding the app drawer and device menu icon.

You can see why it is important to avoid this application at all costs.

Source