337 Android apps are currently targeted by a new strain of malware that just recently appeared in the criminal world; it comes together with a wide range of data theft capabilities that allow it to remain undetected why stealing personal data.
Also Read : SAFETY HACKS; Top 3 Alternatives to Google, Chrome, Twitter, and Other Popular Apps and Sites
- Keylogging*SMS harvesting: SMS forwarding
- SMS harvesting: SMS listing*SMS: Sending*Overlaying: Dynamic (Local injects obtained from C2)*Device info collection
- Self-protection: Hiding the App icon*Self-protection: Preventing removal
- Remote actions: Screen-locking
- Grant permissions
- AV detection
- Notifications collection
Once the Android malware is installed, users are asked to grant BlackRock access to the device's Accessibility feature, which can be used to perform taps on the user's behalf and automate tasks, making it one of the most powerful features of the Android's operating system. Accessibility feature allows the Android malware to access the admin system of the device using Android DPC (device policy controller or "work profile." ThreatFabric added that BlackRock can also perform other intrusive operations:
- Sabotage mobile antivirus apps, and more
- Intercept SMS messages
- Perform SMS floods
- Log key taps (keylogger functionality)
- Show custom push notifications
- Spam contacts with predefined SMS
- Start specific apps
Also Read: Twitter Bitcoin Hack: Here's a Shocking Info That Twitter Tries to Hide