Article Details
Scrape Timestamp (UTC): 2023-11-06 12:02:30.766
Original Article Text
Click to Toggle View
Cybercrime service bypasses Android security to install malware. A new dropper-as-a-service (DaaS) cybercrime operation named 'SecuriDropper' has emerged, using a method that bypasses the 'Restricted Settings' feature in Android to install malware on devices and obtain access to Accessibility Services. Restricted Settings is a security feature introduced with Android 13 that prevents side-loaded applications installed from outside Google Play and from requesting access to powerful features like the Accessibility settings and Notification Listener. The two permissions are commonly abused by malware, so the feature was intended to protect users by blocking the approval of requests by displaying a warning when these permissions are requested. Accessibility can be abused to capture on-screen text, granting additional permissions, and performing navigation actions remotely, while the Notification Listener can be used to steal one-time passwords. In August 2022, ThreatFabric reported that malware developers were already adjusting their tactics to this new measure through a new dropper named 'BugDrop.' Based on its observations, the firm created a proof-of-concept (PoC) dropper to showcase that the bypass was possible. The trick is to use the session-based installation API for the malicious APK (Android package) files, which installs them in multiple steps, involving a "base" package and various "split" data files. When the particular API is used instead of the non-session method, Restricted Settings is bypassed, and users are not shown the 'Restricted setting' dialog that prevents them from granting the malware access to dangerous permissions. BleepingComputer has confirmed that the security issue is still present in Android 14, and, according to a new ThreatFabric report, SecuriDropper follows the same technique to side-load malware on target devices and give them access to risky sub-systems. This is the first observed case of this method being used in cybercrime operations targeting Android users. Android Dropper-as-a-Service operations SecuriDropper infects Android devices posing as a legitimate app, most often impersonating a Google app, Android update, video player, security app, or a game, and then installing a second payload, which is some form of malware. The dropper achieves this by securing access to the "Read & Write External Storage" and "Install & Delete Packages" permissions upon installation. The second-stage payload is installed through user deception and interface manipulation, prompting users to click a "Reinstall" button after displaying bogus error messages about the dropper app's installation. ThreatFabric has seen SpyNote malware distributed through SecuriDropper disguised as a Google Translate app. In other cases, SecuriDropper was seen distributing banking Ermac trojans disguised as the Chrome browser, targeting hundreds of cryptocurrency and e-banking applications. ThreatFabric also reports on the re-surfacing of Zombinder, a DaaS operation first documented in December 2022. This service "glues" malicious payloads with legitimate apps to infect Android devices with info-stealers and banking trojans. Worryingly, Zombinder's recent advertisements highlight the same Restricted Settings bypass strategy previously discussed, so the payloads are granted permission to use Accessibility settings upon installation. To protect against these attacks, Android users should avoid downloading APK files from obscure sources or publishers they don't know and trust. Access to permissions for any installed app can be reviewed and revoked by going to Settings → Apps → [select an app] → Permissions. BleepingComputer has contacted Google to ask if new security measures will be implemented to address this actively-leveraged problem, but we have not received a response by publication time.
Daily Brief Summary
A new dropper-as-a-Service (DaaS) operation named 'SecuriDropper' bypasses the 'Restricted Settings' feature in Android, allowing it to install malware on devices and obtain access to Accessibility Services.
The operation uses Android 13's Restricted Settings feature, which typically prevents non-Google Play applications from accessing features such as Accessibility settings and Notification Listener. However, SecuriDropper bypasses this with a session-based installation API for malicious Android package files.
This tactic sidesteps the Restricted Settings, avoiding the 'Restricted setting' dialog that prevents malware access to dangerous permissions. This security issue is reported to be present in Android 14.
SecuriDropper poses as legitimate apps, such as a Google app, Android update, video player, or game, then installs malware by securing access to necessary permissions and tricking users into installing a second-stage payload with deceitful interface manipulation.
Cybersecurity firm ThreatFabric noted instances of SecuriDropper distributing SpyNote malware and banking trojans. The company also reported a resurgence of Zombinder, another DaaS operation that uses a similar method to bypass Restricted Settings, gluing malicious payloads to legitimate apps to infect devices.
Google has not provided a comment or solution about this recurring problem at the time of this report. Android users are advised to avoid downloading APK files from obscure sources and regularly review and revoke app permissions as necessary.