Article Details
Scrape Timestamp (UTC): 2024-04-26 10:50:45.509
Source: https://thehackernews.com/2024/04/new-brokewell-android-malware-spread.html
Original Article Text
Click to Toggle View
New 'Brokewell' Android Malware Spread Through Fake Browser Updates. Fake browser updates are being used to push a previously undocumented Android malware called Brokewell. "Brokewell is a typical modern banking malware equipped with both data-stealing and remote-control capabilities built into the malware," Dutch security firm ThreatFabric said in an analysis published Thursday. The malware is said to be in active development, adding new commands to capture touch events, textual information displayed on screen, and the applications a victim launches. The list of Brokewell apps that masquerade as Google Chrome, ID Austria, and Klarna is as follows - Like other recent Android malware families of its kind, Brokewell is capable of getting around restrictions imposed by Google that prevent sideloaded apps from requesting accessibility service permissions. The banking trojan, once installed and launched for the first time, prompts the victim to grant permissions to the accessibility service, which it subsequently uses to automatically grant other permissions and carry out various malicious activities. This includes displaying overlay screens on top of targeted apps to pilfer user credentials. It can also steal cookies by launching a WebView and loading the legitimate website, after which the session cookies are intercepted and transmitted to an actor-controlled server. Some of the other features of Brokewell include the ability to record audio, take screenshots, retrieve call logs, access device location, list installed apps, record every every event happening on the device, send SMS messages, do phone calls, install and uninstall apps, and even disable the accessibility service. The threat actors can also leverage the malware's remote control functionality to see what's displayed on screen in real-time, as well as interact with the device through clicks, swipes, and touches. Brokewell is said to be the work of a developer who goes by the name "Baron Samedit Marais" and manages the "Brokewell Cyber Labs" project, which also includes an Android Loader publicly hosted on Gitea. The loader is designed to act as a dropper that bypasses accessibility permissions restrictions in Android versions 13, 14, and 15 using a technique previously adopted by dropper-as-a-service (DaaS) offerings like SecuriDropper and deploy the trojan implant. By default, the loader apps generated through this process have the package name "com.brkwl.apkstore," although this can configured by the user by either providing a specific name or enabling the random package name generator. The free availability of the loader means it could be embraced by other threat actors looking to sidestep Android's security protections. "Second, existing 'Dropper-as-a-Service' offerings that currently provide this capability as a distinctive feature will likely either close their services or attempt to reorganize," ThreatFabric said. "This further lowers the entry barrier for cybercriminals looking to distribute mobile malware on modern devices, making it easier for more actors to enter the field." Goodbye, Atlassian Server. Goodbye… Backups? Protect your data on Atlassian Cloud from disaster with Rewind's daily backups and on-demand restores. How to Update and Automate Outdated Security Processes Download the eBook for step-by-step guidance on how to update your security processes as your business grows.
Daily Brief Summary
A new Android malware named Brokewell is being distributed via deceptive browser update prompts.
Brokewell has sophisticated functionalities including stealing data, remote control access, and recording user activities.
The malware circumvents Google’s security measures for sideloaded apps by leveraging accessibility service permissions.
Once installed, Brokewell can perform a variety of malicious activities such as stealing cookies, recording audio, capturing screen content, and intercepting SMS messages.
The malware’s developer, identified as Baron Samedit Marais, operates under "Brokewell Cyber Labs" and offers a loader tool on Gitea that can bypass newer Android version restrictions.
The existence of Brokewell and its associated loader tool lowers the entry barrier for other cybercriminals to deploy similar mobile malwares.
Security experts are concerned about the growing ease with which cybercriminals can utilize dropper-as-a-service platforms to spread malware on Android devices.