scorecardresearch

Rogue apps alert: Xamalicious strikes Google Play, affects 338,300 devices

There is a new threat to Android devices - Xamalicious. McAfee researchers unveil a backdoor malware infecting 338,300 devices via malicious Google Play Store apps.

advertisement
web3
profile
New Delhi , UPDATED: Dec 29, 2023 16:04 IST

Highlights

  • New Android malware, Xamalicious, has infected 338,000 devices
  • The malware has been discovered by McAfee researchers
  • Xamalicious stands out by being based on the.NET framework

In the evolving landscape of cybersecurity, a recent discovery by McAfee researchers has sent shockwaves through the Android community. Xamalicious, a newly identified Android backdoor malware, has infected approximately 338,300 devices via malicious apps on the Google Play Store.

advertisement

Malicious apps

Xamalicious was found embedded in 14 affected apps, with three accumulating a staggering 100,000 installs each before their removal from the Google Play Store. Despite their removal, users who inadvertently installed these apps since mid-2020 might still harbor Xamalicious on their devices.

Widely installed Xamalicious-affected Android apps

  • Essential Horoscope for Android (100,000 installs)
  • 3D Skin Editor for PE Minecraft (100,000 installs)
  • Logo Maker Pro (100,000 installs)
  • Auto Click Repeater (10,000 installs)
  • Count Easy Calorie Calculator (10,000 installs)
  • Dots: One Line Connector (10,000 installs)
  • Sound Volume Extender (5,000 installs)

Unauthorised third-party app stores

Beyond the Google Play Store, 12 malicious apps with the Xamalicious threat circulate on unauthorised third-party app stores. Users are susceptible through APK file downloads, as per media reports.

Unique characteristics of Xamalicious

Xamalicious stands out by being based on the .NET (It’s a developer platform for building many different types of applications) framework and integrated into apps developed using the open-source Xamarin framework. This unique feature poses challenges for cybersecurity experts engaged in code analysis.

advertisement

Modus operandi of Xamalicious

Upon installation, Xamalicious seeks access to the accessibility service, enabling it to execute navigation gestures, conceal on-screen elements, and acquire additional permissions. Subsequently, the malware communicates with a Command and Control (C2) server to retrieve the second-stage DLL payload ('cache.bin') based on specific criteria.

Protecting your device against Xamalicious

Users are strongly advised to manually check their devices for signs of Xamalicious infections. Even if the implicated apps have been uninstalled, the risk persists. Look for unwanted apps or suspicious settings and promptly remove them from your smartphone.

Antivirus software: A shield against Xamalicious

To fortify your device against malware threats, employing a reputable antivirus software is crucial. Regular manual clean-up and device scanning are recommended practices for ensuring ongoing protection.

In the face of the Xamalicious threat, knowledge is the first line of defense. Stay informed, take proactive measures, and prioritise the security of your Android device. Regularly scan for potential infections, use reliable antivirus software, and remain vigilant against emerging threats in the dynamic world of cybersecurity.

Published on: Dec 29, 2023 16:04 ISTPosted by: sonu vivek, Dec 29, 2023 16:04 IST

COMMENTS 0

Advertisement
Recommended