Security News > 2022 > December > Legit Android apps poisoned by sticky 'Zombinder' malware

Threat researchers have discovered an obfuscation platform that attaches malware to legitimate Android applications to lure users to install the malicious payload and make it difficult for security tools to detect.
Analysts with cybersecurity vendor ThreatFabric found the platform, named "Zombinder," on the darknet while investigating a campaign that targeted both Android and Windows users with different types of malware.
Zombinder came to light while the researchers were analyzing a campaign involving the Ermac Android banking trojan.
These apps essentially were modified versions of legitimate apps, from a football streaming service to a Wi-Fi authenticator tool.
The malware packages bound to them also carried the same name as the legitimate apps.
The researchers discovered that the cybercriminals were using a third-party service - Zombinder - that provided the "Glue" to bind the malware dropper capabilities to the legitimate app.
News URL
https://go.theregister.com/feed/www.theregister.com/2022/12/09/zombinder_android_windows_malware/
Related news
- North Korea’s ScarCruft Deploys KoSpy Malware, Spying on Android Users via Fake Utility Apps (source)
- New Android malware uses Microsoft’s .NET MAUI to evade detection (source)
- APT36 Spoofs India Post Website to Infect Windows and Android Users with Malware (source)
- Android Malware Exploits a Microsoft-Related Security Blind Spot to Avoid Detection (source)
- New Crocodilus malware steals Android users’ crypto wallet keys (source)
- Counterfeit Android devices found preloaded With Triada malware (source)
- Triada Malware Preloaded on Counterfeit Android Phones Infects 2,600+ Devices (source)
- SpyNote, BadBazaar, MOONSHINE Malware Target Android and iOS Users via Fake Apps (source)
- New Android malware steals your credit cards for NFC relay attacks (source)
- SuperCard X Android Malware Enables Contactless ATM and PoS Fraud via NFC Relay Attacks (source)