CIO News Hubb
Advertisement
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
CIO News Hubb
No Result
View All Result
Home Information Security

Hackers Sign Android Malware Apps with Compromised Platform Certificates

admin by admin
December 2, 2022
in Information Security


Platform certificates used by Android smartphone vendors like Samsung, LG, and MediaTek have been found to be abused to sign malicious apps.

The findings were first discovered and reported by Google reverse engineer Łukasz Siewierski on Thursday.

“A platform certificate is the application signing certificate used to sign the ‘android’ application on the system image,” a report filed through the Android Partner Vulnerability Initiative (AVPI) reads.

“The ‘android’ application runs with a highly privileged user id – android.uid.system – and holds system permissions, including permissions to access user data.”

CyberSecurity

This effectively means that a rogue application signed with the same certificate can gain the highest level of privileges as the Android operating system, permitting it to harvest all kinds of sensitive information from a compromised device.

The list of malicious Android app packages that have abused the certificates is below –

  • com.russian.signato.renewis
  • com.sledsdffsjkh.Search
  • com.android.power
  • com.management.propaganda
  • com.sec.android.musicplayer
  • com.houla.quicken
  • com.attd.da
  • com.arlo.fappx
  • com.metasploit.stage
  • com.vantage.ectronic.cornmuni
Android Malware Apps

That said, it’s not immediately clear how and where these artifacts were found, and if they were used as part of any active malware campaign.

A search on VirusTotal shows that the identified samples have been flagged by antivirus solutions as HiddenAds adware, Metasploit, information stealers, downloaders, and other obfuscated malware.

When reached for comment, Google said it informed all impacted vendors to rotate the certificates and that there’s no evidence these apps were delivered through the Play Store.

“OEM partners promptly implemented mitigation measures as soon as we reported the key compromise,” the company told The Hacker News in a statement. “End users will be protected by user mitigations implemented by OEM partners.”

“Google has implemented broad detections for the malware in Build Test Suite, which scans system images. Google Play Protect also detects the malware. There is no indication that this malware is or was on the Google Play Store. As always, we advise users to ensure they are running the latest version of Android.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





Source link

Tags: computer securitycyber attackscyber newscyber security newscyber security news todaycyber security updatescyber updatesdata breachhacker newshacking newshow to hackinformation securitynetwork securityransomware malwaresoftware vulnerabilitythe hacker news
Previous Post

Deploy AWS Organizations resources by using CloudFormation

Next Post

What Makes XLAs So Special? & Why Businesses Should Adapt!

Related Posts

Information Security

Microsoft to Pay $20 Million Penalty for Illegally Collecting Kids’ Data on Xbox

by admin
June 8, 2023
Information Security

AWS Security Profile – Cryptography Edition: Valerie Lambert, Senior Software Development Engineer

by admin
June 8, 2023
Information Security

New Malware Campaign Leveraging Satacom Downloader to Steal Cryptocurrency

by admin
June 7, 2023
Information Security

Updated AWS Ramp-Up Guide available for security, identity, and compliance

by admin
June 7, 2023
Information Security

Lace Tempest Hackers Behind Active Exploitation of MOVEit Transfer App

by admin
June 6, 2023
Next Post

What Makes XLAs So Special? & Why Businesses Should Adapt!

Recommended

Illustratenonlinearlogic

June 8, 2023

Microsoft to Pay $20 Million Penalty for Illegally Collecting Kids’ Data on Xbox

June 8, 2023

AWS Security Profile – Cryptography Edition: Valerie Lambert, Senior Software Development Engineer

June 8, 2023

Inflection ~ Future of CIO

June 7, 2023

New Malware Campaign Leveraging Satacom Downloader to Steal Cryptocurrency

June 7, 2023

Updated AWS Ramp-Up Guide available for security, identity, and compliance

June 7, 2023

© CIO News Hubb All rights reserved.

Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Privacy Policy and Terms & Conditions.

Navigate Site

  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

Newsletter Sign Up

No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

© 2022 CIO News Hubb All rights reserved.