Article Details

Scrape Timestamp (UTC): 2023-11-06 14:11:49.312

Source: https://thehackernews.com/2023/11/securidropper-new-android-dropper-as.html

Original Article Text

Click to Toggle View

SecuriDropper: New Android Dropper-as-a-Service Bypasses Google's Defenses. Cybersecurity researchers have shed light on a new dropper-as-a-service (DaaS) for Android called SecuriDropper that bypasses new security restrictions imposed by Google and delivers the malware. Dropper malware on Android is designed to function as a conduit to install a payload on a compromised device, making it a lucrative business model for threat actors, who can advertise the capabilities to other criminal groups. What's more, doing so also allows adversaries to separate the development and execution of an attack from the installation of the malware. "Droppers and the actors behind them are in a constant state of evolution as they strive to outwit evolving security measures," Dutch cybersecurity firm ThreatFabric said in a report shared with The Hacker News. One such security measure introduced by Google with Android 13 is what's called the Restricted Settings, which prevents sideloaded applications from obtaining Accessibility and Notification Listener permissions, which are often abused by banking trojans. SecuriDropper aims to get around this guardrail without getting detected, with the dropper often disguised as a seemingly harmless app. Some of the samples observed in the wild are as follows - "What makes SecuriDropper stand out is the technical implementation of its installation procedure," ThreatFabric explained. "Unlike its predecessors, this family uses a different Android API to install the new payload, mimicking the process used by marketplaces to install new applications." Specifically, this entails requesting for permissions to read and write data to external storage (READ_EXTERNAL_STORAGE and WRITE_EXTERNAL_STORAGE) as well as install and delete packages (REQUEST_INSTALL_PACKAGES and DELETE_PACKAGES). In the second stage, the installation of the malicious payload is facilitated by urging the victims to click on a "Reinstall" button on the app to resolve a purported installation error. ThreatFabric said it has observed Android banking trojans such as SpyNote and ERMAC distributed via SecuriDropper on deceptive websites and third-party platforms like Discord. Another dropper service that has also been spotted offering a similar Restricted Settings bypass is Zombinder, an APK binding tool that was suspected to be shut down earlier this year. It's currently not clear if there is any connection between the two tools. "As Android continues to raise the bar with each iteration, cybercriminals, too, adapt and innovate," the company said. "Dropper-as-a-Service (DaaS) platforms have emerged as potent tools, allowing malicious actors to infiltrate devices to distribute spyware and banking trojans."

Daily Brief Summary

CYBERCRIME // New Android Dropper-as-a-Service Circumvents Google's Security Measures

A new dropper-as-a-service (DaaS) for Android called SecuriDropper bypasses Google's latest security restrictions and delivers malware.

The dropper malware on Android serves as a conduit to install a payload onto compromised devices, making it a profitable business model for threat actors who can advertise its capabilities to other criminal groups.

The DaaS targets Google's Android 13 Restricted Settings that are designed to prevent sideloaded applications from obtaining Accessibility and Notification Listener permissions, which are often abused by banking trojans.

The dropper often appears as an innocuous app, providing a workaround to Android's security measures by requesting read and write data permissions to external storage and install/delete packages.

ThreatFabric, the Dutch cybersecurity firm which revealed SecuriDropper, reported that Android banking Trojans, such as SpyNote and ERMAC, were being distributed by the DaaS via deceptive websites and third-party platforms, including Discord.

Another similar tool using the Restricted Settings bypass being offered as a dropper service is Zombinder, which was believed to have been shutdown earlier this year.

The connection between these two tools is yet unclear and as Google ramps up security measures with each Android iteration, cybercriminals continue to adapt and innovate, with DaaS platforms becoming increasingly potent tools.