A new Android threat sends your photos, texts, contacts, hardware data and more to a foreign server

According to Bleeping Computer, a new version of the XLoader (aka MoqHao) malware is making the rounds. Previously, this malware was spotted in the US, UK, Germany, France, Japan, South Korea and Taiwan. The malware is spread via SMS messages containing a shortened URL link and XLoader can be launched immediately after installation. This allows the malware to run undetected in the background while personal information is being stolen.

McAfee says: “While the app is installed, their malicious activity starts automatically. We have already reported this technique to Google and they are already working on implementing mitigations to prevent this type of auto-execution in a future version of Android.”

Malicious apps send permission requests by pretending to come from Google Chrome asking for permission to send and view SMS (text) messages and asking permission for “Chrome” to run in the background. And the coup de grace is allowing “Chrome” to become your default SMS app. The malware, once granted all these permissions, is used to send photos, text messages, contact lists and information about the hardware you’re using (including your phone’s unique IMEI number) to the control server. Yes, it’s very scary.

McAfee says that because the victim requires minimal interaction, the new XLoader malware is even more dangerous than its predecessor. There is good news. An update from McAfee from a few weeks ago says that Android devices with Google Play Services are protected against this type of malware attack using Google Play Protect, which is enabled by default.

However, there are some things to consider here. Never click on a shortened URL in a message. And never download an app from the side.

Source link

Leave a Reply

Your email address will not be published. Required fields are marked *