Security News > 2022 > December > Legit Android apps poisoned by sticky 'Zombinder' malware

Threat researchers have discovered an obfuscation platform that attaches malware to legitimate Android applications to lure users to install the malicious payload and make it difficult for security tools to detect.
Analysts with cybersecurity vendor ThreatFabric found the platform, named "Zombinder," on the darknet while investigating a campaign that targeted both Android and Windows users with different types of malware.
Zombinder came to light while the researchers were analyzing a campaign involving the Ermac Android banking trojan.
These apps essentially were modified versions of legitimate apps, from a football streaming service to a Wi-Fi authenticator tool.
The malware packages bound to them also carried the same name as the legitimate apps.
The researchers discovered that the cybercriminals were using a third-party service - Zombinder - that provided the "Glue" to bind the malware dropper capabilities to the legitimate app.
News URL
https://go.theregister.com/feed/www.theregister.com/2022/12/09/zombinder_android_windows_malware/
Related news
- New FireScam Android malware poses as RuStore app to steal data (source)
- New FireScam Android data-theft malware poses as Telegram Premium app (source)
- FireScam Android Malware Poses as Telegram Premium to Steal Data and Control Devices (source)
- DoNot Team Linked to New Tanzeem Android Malware Targeting Intelligence Collection (source)
- Crypto-stealing iOS, Android malware found on App Store, Google Play (source)
- SpyLend Android malware downloaded 100,000 times from Google Play (source)