Facebook Twitter Instagram
    • Privacy Policy
    • Contact Us
    Facebook Twitter Instagram Pinterest Vimeo
    AI Home SecurityAI Home Security
    • Home
    • Home Security
    • Cyber Security
    • Biometric Technology
    Contact
    AI Home SecurityAI Home Security
    Cyber Security

    Thousands of Android Malware Apps Using Stealthy APK Compression to Evade Detection

    justmattgBy justmattgAugust 20, 2023No Comments2 Mins Read

    [ad_1]

    Aug 19, 2023THNMobile Security / Malware

    Android Malware Apps

    Threat actors are using Android Package (APK) files with unknown or unsupported compression methods to elude malware analysis.

    That’s according to findings from Zimperium, which found 3,300 artifacts leveraging such compression algorithms in the wild. 71 of the identified samples can be loaded on the operating system without any problems.

    There is no evidence that the apps were available on the Google Play Store at any point in time, indicating that the apps were distributed through other means, typically via untrusted app stores or social engineering to trick the victims into sideloading them.

    Cybersecurity

    The APK files use “a technique that limits the possibility of decompiling the application for a large number of tools, reducing the possibilities of being analyzed,” security researcher Fernando Ortega said. “In order to do that, the APK (which is in essence a ZIP file), is using an unsupported decompression method.”

    The advantage of such an approach is its ability to resist decompilation tools, while still being able to be installed on Android devices whose operating system version is above Android 9 Pie.

    The Texas-based cybersecurity firm said it started its own analysis after a post from Joe Security on X (previously Twitter) in June 2023 about an APK file that exhibited this behavior.

    Cybersecurity

    Android packages use the ZIP format in two modes, one without compression and one using the DEFLATE algorithm. The crucial finding here is that APKs packed using unsupported compression methods are not installable on handsets running Android versions below 9, but they work properly on subsequent versions.

    In addition, Zimperium discovered that malware authors are also deliberately corrupting the APK files by having filenames with more than 256 bytes and malformed AndroidManifest.xml files to trigger crashes on analysis tools.

    The disclosure comes weeks after Google revealed that threat actors are leveraging a technique called versioning to evade its Play Store’s malware detections and target Android users.

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.



    [ad_2]

    Source link

    Previous ArticleHubble Urges Customers, Security Pros to Return to Infosec Basics
    Next Article How to Wrap Enterprise Cybersecurity In the Data Fabric
    justmattg
    • Website

    Related Posts

    Cyber Security

    Name That Toon: Last Line of Defense

    April 16, 2024
    Cyber Security

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024
    Cyber Security

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024
    Add A Comment

    Leave A Reply Cancel Reply

    Facebook Twitter Instagram Pinterest
    • Privacy Policy
    • Contact Us
    AI Home Security © 2025 All rights reserved | Designed By ESmartsSolution

    Type above and press Enter to search. Press Esc to cancel.

    ↑