Article Details
Scrape Timestamp (UTC): 2024-02-08 18:38:11.036
Original Article Text
Click to Toggle View
Android XLoader malware can now auto-execute after installation. A new version of the XLoader Android malware was discovered that automatically executes on devices it infects, requiring no user interaction to launch. XLoader, aka MoqHao, is an Android malware operated and likely created by a financially motivated threat actor named 'Roaming Mantis,' previously seen targeting users in the U.S., U.K., Germany, France, Japan, South Korea, and Taiwan. Attackers primarily distribute the malware through SMS text that contains a (shortened) URL pointing to a site delivering an Android APK installation file for a mobile app. Researchers at McAfee report that recent XLoader variants demonstrate the ability to launch automatically after installation. This allows the malware to run stealthily in the background and siphon sensitive user information, among other things. "While the app is installed, their malicious activity starts automatically," explains McAfee, an Android's App Defense Alliance partner. "We have already reported this technique to Google and they are already working on the implementation of mitigations to prevent this type of auto-execution in a future Android version." To further obfuscate the malicious app, Roaming Mantis employs Unicode strings to disguise the malicious APKs as legitimate software, notably, the Chrome web browser. This impersonation is vital for the next step, which is to trick the user into approving risky permissions on the device, like sending and accessing SMS content, and to be allowed to 'always run in the background' by adding an exclusion from Android's Battery Optimization. The fake Chrome app also asks the user to set itself as the default SMS app, claiming that doing so will help prevent spam. The pop-up messages used in this step are available in English, Korean, French, Japanese, German, and Hindi, which indicates XLoader's current targets. Malware's operation XLoader's recent iteration creates notification channels to perform custom phishing attacks on the device. It extracts phishing messages and landing URLs from Pinterest profiles, likely to evade detection from security tools monitoring for suspicious traffic sources. Also, using Pinterest enables attackers to switch phishing destinations and messages on the fly without risking sending an update to the malware on the device. If that fails, XLoader reverts to using hardcoded phishing messages that alert the user to a problem with their bank account that requires them to take action. Additionally, the malware can execute a wide array of commands (20 in total) received from its command and control (C2) server via the WebSocket protocol. The most important XLoader commands are: Since its appearance in the mobile threat scene in 2015, XLoader has consistently evolved its attack methodologies, enhancing its stealth capabilities and effectiveness. McAfee warns that XLoader's newest variants can be particularly effective as they require minimal user interaction. Considering that the malware hides under the guise of Chrome, McAfee suggests using a security product that can scan the device and uproot those threats based on known indicators.
Daily Brief Summary
A new variant of XLoader Android malware now runs automatically without user interaction after installation.
The XLoader malware, attributed to threat actor 'Roaming Mantis,' targets users worldwide, including the U.S., U.K., and parts of Europe and Asia.
The malware is spread via SMS with URLs leading to a malicious APK, often disguised as the legitimate Chrome web browser.
McAfee researchers have reported the auto-execution technique to Google, and mitigations are being developed for future Android versions.
Roaming Mantis uses Unicode and app impersonation to trick users into granting extensive permissions, which can lead to phishing and theft of sensitive information.
Attackers utilize custom phishing attacks via notification channels, with phishing content extracted from Pinterest profiles to evade traditional security detection.
The new XLoader variant can execute 20 different commands from its C2 server, indicating a sophisticated and adaptable threat.
McAfee advises users to install security products capable of detecting and eradicating such threats based on known indicators.