Security News > 2020 > July > Joker Malware Apps Once Again Bypass Google's Security to Spread via Play Store
In a report published by Check Point research today, the malware - infamously called Joker - has found another trick to bypass Google's Play Store protections: obfuscate the malicious DEX executable inside the application as Base64 encoded strings, which are then decoded and loaded on the compromised device.
"The Joker malware is tricky to detect, despite Google's investment in adding Play Store protections," said Check Point's Aviran Hazum, who identified the new modus operandi of Joker malware.
Campaigns involving Joker gained more foothold last year, with a number of malware-infected Android apps uncovered by CSIS Security Group, Trend Micro, Dr.Web, and Kaspersky, repeatedly finding unique ways to exploit gaps in Play Store security checks.
"As the Play Store has introduced new policies and Google Play Protect has scaled defenses, Bread apps were forced to continually iterate to search for gaps," Android's Security & Privacy Team said earlier this year.
As of January 2020, Google has removed more than 1,700 apps submitted to the Play Store over the past three years that had been infected with the malware.
News URL
http://feedproxy.google.com/~r/TheHackersNews/~3/XH6GIqWnLaE/joker-android-mobile-virus.html
Related news
- Google claims Big Sleep 'first' AI to spot freshly committed security bug that fuzzing missed (source)
- North Korean hackers create Flutter apps to bypass macOS security (source)
- Unlocking Google Workspace Security: Are You Doing Enough to Protect Your Data? (source)
- Researchers Uncover Malware Using BYOVD to Bypass Antivirus Protections (source)
- SpyLoan Android malware on Google play installed 8 million times (source)
- 8 Million Android Users Hit by SpyLoan Malware in Loan Apps on Google Play (source)
- Phishers send corrupted documents to bypass email security (source)
- Hackers Exploit Webview2 to Deploy CoinLurker Malware and Evade Security Detection (source)
- Ongoing phishing attack abuses Google Calendar to bypass spam filters (source)