Security News > 2021 > October > New AbstractEmu malware roots Android devices, evades detection

New AbstractEmu malware roots Android devices, evades detection
2021-10-28 13:15

New Android malware can root infected devices to take complete control and silently tweak system settings, as well as evade detection using code abstraction and anti-emulation checks.

The malware, dubbed AbstractEmu by security researchers at the Lookout Threat Labs who found it, was bundled with 19 utility apps distributed via Google Play and third-party app stores.

Apps bundling the malware included password managers and tools like data savers and app launchers, all of them providing the functionality they promised to avoid raising suspicions.

Lite Launcher, an app launcher and one of the apps used to deliver the AbstractEmu malware on unsuspecting Android users' devices, had over 10,000 downloads when taken down from Google Play.

To root Android devices it infects, AbstractEmu has multiple tools at its disposal in the form of exploits targeting several vulnerabilities, including CVE-2020-0041, a bug never exploited in the wild by Android apps before this.

AbstractEmu will wait for commands from its C2 server, which can instruct it to harvest and exfiltrate files based on how new they are or match a given pattern, root infected devices, or install new apps.


News URL

https://www.bleepingcomputer.com/news/security/new-abstractemu-malware-roots-android-devices-evades-detection/

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2020-03-10 CVE-2020-0041 Improper Input Validation vulnerability in Google Android
In binder_transaction of binder.c, there is a possible out of bounds write due to an incorrect bounds check.
local
low complexity
google CWE-20
7.8