Steganography enables the threat actors to hide secret information within ordinary, non-secret files or messages to avoid detection.
The common forms include embedding text in images or audio files, and it is often used alongside encryption to enhance security.
Cybersecurity researchers at Kaspersky Lab recently discovered that Necro trojan has been using steganography techniques to hack 11 million Android devices.
The “Necro Trojan” is a sophisticated multi-stage Android malware that has infiltrated both “Google Play” and “unofficial app” sources which has affected over 11 million devices.
Meet the CISOs, Join the Virtual Panel to Learn compliance – Join Free
This malware exploits popular applications like “Wuta Camera,” “Max Browser,” and “modified versions of Spotify,” “WhatsApp,” and “Minecraft.”
Necro employs advanced evasion techniques like obfuscation using “OLLVM,” steganography to hide payloads in “PNG images” and a modular architecture for flexibility, reads the research.
The infection process begins with a loader that communicates with C2 servers, and this is done often using the “Firebase Remote Config.”
The plugin loader is responsible for downloading and executing dozens of plugins, each of which is in charge of its own malicious purpose.
Here below, we have mentioned those malicious purposes:-
Necro’s plugins (‘NProxy,’ ‘island,’ ‘web,’ ‘Happy SDK,’ ‘Cube SDK,’ and ‘Tap’) perform tasks ranging from creating tunnels via victim devices to manipulating the ad interactions.
The self-updating mechanism shows the adaptability of the malware and not only that even it also uses the reflection to add privileged “WebView” instances within processes which helps in evading the security defenses.
Monitoring an application within an official app store is important, as evidenced by the development of app security threats.
Between August 26 and September 15, more than “10,000 Necro attacks” were discovered globally, and in these attacks, Russia, Brazil, and Vietnam experienced the highest infection rates.
The modular architecture of the Trojan enables its creators to deliver targeted updates and new malicious modules flexibly, while this completely depends on the compromised application.
The use of “steganography” is particularly noteworthy as it’s an uncommon tactic in mobile malware.
This combination of techniques reveals the evolving complexity of mobile threats, making the actual number of infected devices significantly higher than initially estimated.
Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14-day free trial
Microsoft has issued a warning that both cybercriminals and state-sponsored threat actors are increasingly abusing…
CISOs face a paradox in their SOCs every day: more data and detections than ever…
BK Technologies Corporation, a provider of communications equipment for public safety and government agencies, has…
Raleigh, United States, October 7th, 2025, CyberNewsWire Report Shows Cross-Training as Strategic Solution to Operational…
Ransomware operators have shifted from opportunistic malware distribution to highly targeted campaigns that exploit legitimate…
A novel and alarming cybersecurity threat has emerged, turning an ordinary computer peripheral into a…