A new rooting malware has been detected recently by the security researchers at the Lookout Threat Lab, and this new flaw is distributed on several third-party app stores, even on the Google Play Store also.
This new rooting malware is dubbed “AbstractEmu,” and it enables an attacker to gain superuser privileges on the affected devices; it’s a feature that has rarely been seen in Android malware in recent years.
The AbstractEmu malware was distributed through 19 utility applications from several stores like Google Play Store, Amazon Appstore, Samsung Galaxy Store, and many others.
Among those 19 applications, there is one launcher, which made its way to Google Play Store, from where it was already downloaded 10,000 times. However, when Lookout Threat Lab notified Google about this new malicious app, Google promptly removed the app from Google Play Store to protect Android users.
Till now, it’s not yet clear that who is behind AbstractEmu, but it’s believed that the operators of AbstractEmu are a well-resourced group with financial motivation.
Even their code-base and deception techniques clearly depict that they are sophisticated, as they use:-
To gain superuser privileges the AbstractEmu downloads and executes one of the five exploits for old Android vulnerabilities once it reaches the victim’s device; here are the five vulnerabilities that AbstractEmu exploits:-
While the security analysts at Lookout Threat Lab, Kristina Balaam and Paul Shunk, stated:-
“AbstractEmu does not have any sophisticated zero-click remote exploit functionality used in advanced APT-style threats, it is activated simply by the user has opened the app. As the malware is disguised as functional apps, most users will likely interact with them shortly after downloading.”
Once the AbstractEmu is installed on the victim’s devices, it starts collecting the following data to send it to its command and control server:-
Once done with the above information, now AbstractEmu operators give the malware various commands like, get root privileges, collecting and stealing files depending on how new they are or matching a given pattern, and installing new apps.
Moreover, the permissions granted to the attackers through root access are similar to the permissions used by banking trojans like receiving any two-factor authentication codes sent through SMS, running in the background, and launching phishing attacks.
But, after rooting the device, AbstractEmu can track the:-
That’s why experts have strongly recommended users stay alert and keep their devices secure; users should install proper security software that promises to fight against all types of mobile threats like phishing, OS and app vulnerabilities, malware, and network threats.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates
A sophisticated cyberattack campaign attributed to the North Korean Advanced Persistent Threat (APT) group Kimsuky…
A critical issue affecting Windows 11 24H2 users has emerged, disrupting the connection between Veeam…
A high-severity security vulnerability discovered in NetApp SnapCenter could allow authenticated users to gain administrative…
A credential rotation error led to widespread service disruptions across multiple Cloudflare products on March…
Raspberry Robin, a complex and evolving malware threat, has been operating since 2019, initially spreading…
Researchers have discovered a major security vulnerability affecting multiple gaming laptop models using Clevo hardware. …