<?xml version="1.0"?>
<rss version="2.0"><channel><title>Threats to mobile devices</title><link>https://news.drweb.com/news/</link><description>Doctor Web news - Threats to mobile devices</description><image><url>https://st.drweb.com/static/drweb_logo_en.gif</url><link>https://news.drweb.com/news/</link><title>Dr.Web anti-virus</title></image><item><guid>https://news.drweb.com/show/?i=15076&amp;lng=en</guid><title>Baohuo, the gray eminence. Android backdoor hijacks Telegram accounts, gaining complete control over them</title><link>https://news.drweb.com/show/?i=15076&amp;lng=en&amp;c=38</link><pubDate>Thu, 23 Oct 2025 10:32:20 GMT</pubDate><description>&lt;p&gt;&lt;strong&gt;October 23, 2025&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;newslead&gt;Doctor Web has identified a dangerous backdoor, &lt;a href="https://vms.drweb.com/search/?q=Android.Backdoor.Baohuo.1.origin&amp;lng=en"&gt;&lt;b&gt;Android.Backdoor.Baohuo.1.origin&lt;/b&gt;&lt;/a&gt;, in maliciously modified versions of the Telegram X messenger. In addition to being able to steal confidential data, including user logins and passwords, as well as chat histories, this malware has a number of unique features. For example, to prevent itself from being detected and to cover up the fact that an account has been compromised, &lt;a href="https://vms.drweb.com/search/?q=Android.Backdoor.Baohuo.1.origin&amp;lng=en"&gt;&lt;b&gt;Android.Backdoor.Baohuo.1.origin&lt;/b&gt;&lt;/a&gt; can conceal connections from third-party devices in the list of active Telegram sessions. Moreover, it can add and remove the user from Telegram channels and also join and leave chats on behalf of the victim, also concealing these actions. In fact, with this backdoor’s assistance, malicious actors gain full control over the victim’s account and the messenger functionality, while the trojan itself is a tool for boosting the number of subscribers in Telegram channels. Cybercriminals control the backdoor in different ways, one of which is via the Redis database; such a control mechanism is something that has not been seen previously in Android threats. According to our experts’ estimates, the number of devices infected with &lt;a href="https://vms.drweb.com/search/?q=Android.Backdoor.Baohuo.1.origin&amp;lng=en"&gt;&lt;b&gt;Android.Backdoor.Baohuo.1.origin&lt;/b&gt;&lt;/a&gt; has exceeded 58,000.&lt;/newslead&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.Backdoor.Baohuo.1.origin&amp;lng=en"&gt;&lt;b&gt;Android.Backdoor.Baohuo.1.origin&lt;/b&gt;&lt;/a&gt;&amp;nbsp;started being distributed back in mid-2024, as evidenced by earlier modifications found during its analysis. The main method for delivering this backdoor to target devices is through in-app ads in mobile programs. Potential victims are shown ads that encourage them to install the Telegram X messenger. When clicking on such banners, users are redirected to malicious websites from which the trojan APK file is downloaded.&lt;/p&gt;&lt;p&gt;These sites are designed to look like an app catalog, while the messenger itself is positioned on them as a platform for conveniently finding a partner for communication and dating. This is indicated by banners with overlaid advertizing text about “free video chats” and invitations to “talk” (for instance, disguised as screenshots of the video call window) as well as by reviews from supposedly happy users that the threat actors actually composed. It should be noted that these webpages have functionality for selecting the displayed language, but the images themselves do not change.&lt;/p&gt;&lt;div class="column_grid_review column_grid_review--o" style="margin-bottom:12px;"&gt;&lt;a class="preview" href="https://st.drweb.com/static/new-www/news/2025/october/android-backdoor-baohuo/01_Android.Backdoor.Baohuo.1.origin_web.png"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2025/october/android-backdoor-baohuo/01_Android.Backdoor.Baohuo.1.origin_web.1.png" alt="#drweb"&gt;&lt;/a&gt;&lt;/div&gt;&lt;p style="text-align:center;"&gt;&lt;i&gt;One of the malicious sites from which the trojan version of Telegram X is downloaded. Potential victims are offered the chance to install an app where, according to “reviews”, it is easy to find a partner for communication and dating&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Currently, cybercriminals have prepared standard templates with banners in only two languages—Portuguese, for users from Brazil, and Indonesian. Thus, Brazilian and Indonesian audiences are the main target for the attackers. At the same time, it is possible that over time, the threat actors’ interest will extend to users from other countries.&lt;/p&gt;&lt;p&gt;Studying the attackers’ network infrastructure allowed us to determine the scale of their activity. On average, Doctor Web’s malware analysts observe about 20,000 active connections of &lt;a href="https://vms.drweb.com/search/?q=Android.Backdoor.Baohuo.1.origin&amp;lng=en"&gt;&lt;b&gt;Android.Backdoor.Baohuo.1.origin&lt;/b&gt;&lt;/a&gt;. At the same time, the total number of infected devices has exceeded 58,000. Around 3,000 different models of smartphones, tablets, TV box sets, and even cars with Android-based on-board computers have been infected.&lt;/p&gt;&lt;div class="column_grid_review column_grid_review--o" style="margin-bottom:12px;"&gt;&lt;a class="preview" href="https://st.drweb.com/static/new-www/news/2025/october/android-backdoor-baohuo/02_Android.Backdoor.Baohuo.1.origin_map_en.png"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2025/october/android-backdoor-baohuo/02_Android.Backdoor.Baohuo.1.origin_map_en.1.png" alt="#drweb"&gt;&lt;/a&gt;&lt;/div&gt;&lt;p style="text-align:center;"&gt;&lt;i&gt;Countries with the highest number of devices infected with&amp;nbsp;&lt;a href="https://vms.drweb.com/search/?q=Android.Backdoor.Baohuo.1.origin&amp;lng=en"&gt;&lt;b&gt;Android.Backdoor.Baohuo.1.origin&lt;/b&gt;&lt;/a&gt; (according to Doctor Web’s anti-virus laboratory)&lt;/i&gt;&lt;/p&gt;&lt;p&gt;However, malicious websites are not the only source for &lt;a href="https://vms.drweb.com/search/?q=Android.Backdoor.Baohuo.1.origin&amp;lng=en"&gt;&lt;b&gt;Android.Backdoor.Baohuo.1.origin&lt;/b&gt;&lt;/a&gt;’s distribution. Our experts have also detected it in third-party app catalogs, including APKPure, ApkSum, and AndroidP. Additionally, in the APKPure app store, the malware is posted on behalf of the official messenger developer, despite the fact that the digital signatures of the original version and the trojan modification are different. We have notified the online platforms where the trojanized versions of Telegram X were found.&lt;/p&gt;&lt;div class="column_grid_review column_grid_review--o" style="margin-bottom:12px;"&gt;&lt;a class="preview" href="https://st.drweb.com/static/new-www/news/2025/october/android-backdoor-baohuo/03_Android.Backdoor.Baohuo.1.origin_apkpute_patched.png"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2025/october/android-backdoor-baohuo/03_Android.Backdoor.Baohuo.1.origin_apkpute_patched.1.png" alt="#drweb"&gt;&lt;/a&gt;&lt;/div&gt;&lt;p style="text-align:center;"&gt;&lt;i&gt;The modified Telegram X with&amp;nbsp;&lt;a href="https://vms.drweb.com/search/?q=Android.Backdoor.Baohuo.1.origin&amp;lng=en"&gt;&lt;b&gt;Android.Backdoor.Baohuo.1.origin&lt;/b&gt;&lt;/a&gt; implanted in it was distributed through APKPure on behalf of the messenger’s genuine developer&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Doctor Web’s anti-virus laboratory discovered several&amp;nbsp;&lt;a href="https://vms.drweb.com/search/?q=Android.Backdoor.Baohuo.1.origin&amp;lng=en"&gt;&lt;b&gt;Android.Backdoor.Baohuo.1.origin&lt;/b&gt;&lt;/a&gt; variations, which can be conditionally divided into 3 main modification groups:&lt;/p&gt;&lt;ul class="list"&gt;&lt;li&gt;versions where the threat actors embedded the backdoor into the main executable DEX file of the messenger;&lt;/li&gt;&lt;li&gt;versions where the backdoor is dynamically loaded in the form of a patch into the executable DEX file using the LSPatch tool;&lt;/li&gt;&lt;li&gt;versions where the backdoor is located in a separate DEX file in the app’s resources directory and loaded dynamically.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Regardless of the modification type,&amp;nbsp;&lt;a href="https://vms.drweb.com/search/?q=Android.Backdoor.Baohuo.1.origin&amp;lng=en"&gt;&lt;b&gt;Android.Backdoor.Baohuo.1.origin&lt;/b&gt;&lt;/a&gt; initializes when the messenger is launched. The messenger itself remains functional, and for users it looks like a regular program. In reality, however, malicious actors have complete control over it through the backdoor and can even alter the logic of its operation.&lt;/p&gt;&lt;p&gt;When cybercriminals need to perform an action that does not require interfering with the app’s main functionality, they use pre-prepared “mirrors” of the necessary messenger methods. For example, mirrors can be used to display phishing messages in windows that look indistinguishable from real Telegram X windows.&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;&lt;i&gt;Methods are separate blocks of code in the structure of Android programs that are responsible for performing certain tasks.&lt;/i&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;If the action is not standard for the messenger, then the Xposed framework is used. It directly changes a certain functionality of the app via dynamic method modification. In particular, it can be used to hide certain chats and authorized devices as well as to steal the clipboard contents.&lt;/p&gt;&lt;p&gt;The main difference between the earlier versions of the malicious program and the current ones is in how the malware is controlled. Older versions communicated with cybercriminals and received commands from them via a C2 server, which is a traditional channel. However, over time, malware writers added to&amp;nbsp;&lt;a href="https://vms.drweb.com/search/?q=Android.Backdoor.Baohuo.1.origin&amp;lng=en"&gt;&lt;b&gt;Android.Backdoor.Baohuo.1.origin&lt;/b&gt;&lt;/a&gt; the ability to receive additional commands that come from the Redis database, thus expanding its functionality. At the same time, they also provided for the duplication of new commands through a regular C2 server in case the database becomes unavailable. This is the first known case of using Redis to control Android malware.&lt;/p&gt;&lt;p&gt;When launched,&amp;nbsp;&lt;a href="https://vms.drweb.com/search/?q=Android.Backdoor.Baohuo.1.origin&amp;lng=en"&gt;&lt;b&gt;Android.Backdoor.Baohuo.1.origin&lt;/b&gt;&lt;/a&gt; connects to the initial C2 server to download a configuration that, among other parameters, contains data to connect to Redis. Through this database, threat actors not only send specific commands to the malicious app but also update the trojan’s settings. For example, they assign current addresses for the C2 server and the NPS server. Malware writers use the latter to connect infected devices to their internal network (intranet) and turn them into a proxy for accessing the Internet.&lt;/p&gt;&lt;p&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.Backdoor.Baohuo.1.origin&amp;lng=en"&gt;&lt;b&gt;Android.Backdoor.Baohuo.1.origin&lt;/b&gt;&lt;/a&gt;&amp;nbsp;regularly connects to the C2 server via API requests and can receive the following tasks:&lt;/p&gt;&lt;ul class="list"&gt;&lt;li&gt;upload incoming SMS and contacts from the infected device’s phonebook to the C2 server;&lt;/li&gt;&lt;li&gt;upload the contents of the clipboard to the C2 server when minimizing the messenger and restoring its window;&lt;/li&gt;&lt;li&gt;receive URLs from the C2 server to display ads, as well as the server address from which the trojan’s update in the form of a DEX file will be downloaded;&lt;/li&gt;&lt;li&gt;receive encryption keys that are used when certain data is uploaded to the C2 server (for instance, the clipboard contents);&lt;/li&gt;&lt;li&gt;request a group of commands for collecting information about installed apps, the message history, and contacts from the device’s phonebook, and about the devices logged into Telegram (this request is executed every 30 minutes);&lt;/li&gt;&lt;li&gt;request an URL from the C2 server to download an update for Telegram X;&lt;/li&gt;&lt;li&gt;request from the C2 server a configuration which is then saved as a JSON file;&lt;/li&gt;&lt;li&gt;request information about the Redis database;&lt;/li&gt;&lt;li&gt;upload information about the device to the C2 server whenever messenger network activity is detected;&lt;/li&gt;&lt;li&gt;receive from the C2 server a list of bots that are to be added to the Telegram contact list;&lt;/li&gt;&lt;li&gt;upload the following information to the C2 server every 3 minutes: the current app’s permissions, the device’s state (whether its screen is on or off, whether the app is active), and the mobile phone number with the name and password for the Telegram account;&lt;/li&gt;&lt;li&gt;every minute, request commands in the same format as the commands from the Redis database.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;To receive commands via Redis,&amp;nbsp;&lt;a href="https://vms.drweb.com/search/?q=Android.Backdoor.Baohuo.1.origin&amp;lng=en"&gt;&lt;b&gt;Android.Backdoor.Baohuo.1.origin&lt;/b&gt;&lt;/a&gt; connects to the attackers’ corresponding server where it registers its own sub-channel. Threat actors connect to this sub-channel and post tasks in it, which the backdoor then executes. The malicious program can receive the following commands:&lt;/p&gt;&lt;ul class="list"&gt;&lt;li&gt;create a blacklist of chats that will not be displayed in the Telegram X window;&lt;/li&gt;&lt;li&gt;conceal specified devices from the user in the list of authorized devices for their account;&lt;/li&gt;&lt;li&gt;block notifications from blacklisted chats for a specified time;&lt;/li&gt;&lt;li&gt;display a window with information about the Telegram X messenger update (when the user clicks it, they are redirected to a target website);&lt;/li&gt;&lt;li&gt;send the C2 server information about all of the installed apps;&lt;/li&gt;&lt;li&gt;terminate the user’s current authorized Telegram login session on the infected device;&lt;/li&gt;&lt;li&gt;display a window with information about the Telegram X app update, where the user is asked to install an APK file (if the file is missing, the trojan downloads it first);&lt;/li&gt;&lt;li&gt;remove the Telegram Premium icon in the app’s interface for the current user;&lt;/li&gt;&lt;li&gt;upload to the C2 server information from the Telegram X databases that store chat history, messages, and other confidential data;&lt;/li&gt;&lt;li&gt;subscribe the user to a specified Telegram channel;&lt;/li&gt;&lt;li&gt;leave a specified Telegram channel;&lt;/li&gt;&lt;li&gt;join a specified Telegram channel on behalf of the user, using the provided URL;&lt;/li&gt;&lt;li&gt;obtain the list of devices authorized in Telegram;&lt;/li&gt;&lt;li&gt;request the user’s authentication token and upload it to the C2 server.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;It should be noted that hijacking data from the clipboard (when the user minimizes the messenger and restores its window) allows various scenarios for stealing confidential data to be implemented. For example, the victim can copy the password or mnemonic phrase used to access their crypto wallet, copy text from some important document to send it to business partners, etc. The trojan will intercept this information from the clipboard and send it to the malicious actors.&lt;/p&gt;&lt;p&gt;Dr.Web Security Space for mobile devices successfully detects and deletes all known versions of &lt;a href="https://vms.drweb.com/search/?q=Android.Backdoor.Baohuo.1.origin&amp;lng=en"&gt;&lt;b&gt;Android.Backdoor.Baohuo.1.origin&lt;/b&gt;&lt;/a&gt;, so this malware does not pose a threat to our users.&lt;/p&gt;&lt;p&gt;More details about &lt;a href="https://vms.drweb.com/virus/?i=30931101&amp;amp;lng=en"&gt;&lt;strong&gt;Android.Backdoor.Baohuo.1.origin&lt;/strong&gt;&lt;/a&gt;&lt;br&gt;&lt;a href="https://github.com/DoctorWebLtd/malware-iocs/blob/master/Android.Backdoor.Baohuo.1.origin/README.adoc"&gt;Indicators of compromise&lt;/a&gt;&lt;/p&gt;</description></item><item><guid>https://news.drweb.com/show/?i=15060&amp;lng=en</guid><title>Doctor Web’s Q3 2025 review of virus activity on mobile devices</title><link>https://news.drweb.com/show/?i=15060&amp;lng=en&amp;c=38</link><pubDate>Wed, 01 Oct 2025 03:00:00 GMT</pubDate><description>&lt;p&gt;&lt;b&gt;October 1, 2025&lt;/b&gt;&lt;/p&gt;

&lt;section&gt;
    &lt;p&gt;&lt;strong&gt;&lt;newslead&gt;According to detection statistics collected by Dr.Web Security Space for mobile devices, &lt;a href="https://vms.drweb.com/search/?q=Android.MobiDash&amp;lng=en"&gt;&lt;b&gt;Android.MobiDash&lt;/b&gt;&lt;/a&gt; ad-displaying trojans were the most widespread threats of Q3 2025. They were detected on protected devices 18.19% more often than during the previous observation period.&lt;/newslead&gt;&lt;/strong&gt;&lt;/p&gt;
    &lt;p&gt;The adware trojans &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;, whose activity decreased for the second quarter in a row, fell to second place. In the past 3 months, users encountered them 71.85% less often. These malicious apps conceal their icons, making the trojans harder to detect and remove, and then display ads, including full-screen videos.&lt;/p&gt;
    &lt;p&gt;Third place was again occupied by the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; trojans that cybercriminals use in various fraudulent schemes; the number of times they were detected decreased by 7.49%. Instead of providing the declared functionality, these malicious apps often load various websites, including fraudulent and malicious ones, as well as bookmaker and online casino websites.&lt;/p&gt;
    &lt;p&gt;Despite a 38.88% decline in activity, &lt;a href="https://vms.drweb.com/search/?q=Android.Banker&amp;lng=en"&gt;&lt;b&gt;Android.Banker&lt;/b&gt;&lt;/a&gt; trojans remain the most widespread banking malware. Threat actors use them to gain illegal access to banking accounts and steal money. These trojans can display phishing windows to hijack logins and passwords, imitate the appearance of real banking software, intercept SMS to obtain one-time codes, etc.&lt;/p&gt;
    &lt;p&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.Banker&amp;lng=en"&gt;&lt;b&gt;Android.Banker&lt;/b&gt;&lt;/a&gt; trojans were followed by the &lt;a href="https://vms.drweb.com/search/?q=Android.BankBot&amp;lng=en"&gt;&lt;b&gt;Android.BankBot&lt;/b&gt;&lt;/a&gt; trojans, which were detected 18.91% more often than in Q2. Such trojans also try to gain access to users’ online banking accounts by intercepting confirmation codes. At the same time, these malicious apps can execute various commands coming from cybercriminals. Some of them also allow infected devices to be controlled remotely.&lt;/p&gt;
    &lt;p&gt;Rounding out the top three, &lt;b&gt;Android.SpyMax&lt;/b&gt; banking trojans were detected 17.25% less often than in the previous quarter. These malicious apps are based on the source code of the spyware trojan SpyNote and provide a wide range of functions, including the ability to remotely control affected devices.&lt;/p&gt;
    &lt;p&gt;In August, we &lt;a href="https://news.drweb.com/show/?lng=en&amp;i=15047" target="_blank"&gt;informed&lt;/a&gt; users about a malware distribution campaign involving the &lt;a href="https://vms.drweb.com/search/?q=Android.Backdoor.916.origin&amp;lng=en"&gt;&lt;b&gt;Android.Backdoor.916.origin&lt;/b&gt;&lt;/a&gt; multi-functional backdoor. Cybercriminals use this piece of malware to steal confidential data and spy on Android device users. Threat actors sent messages to potential victims via various messengers, offering an “anti-virus” that can be installed from the attached APK file. Doctor Web’s anti-virus laboratory discovered the first versions of this backdoor back in January 2025 and has continued to monitor its development ever since. Our experts believe that this backdoor is used in targeted attacks and is not intended for mass distribution. The main target for cybercriminals is representatives of Russian businesses.&lt;/p&gt;
    &lt;p&gt;Over the course of Q3, a large number of malicious programs were distributed on Google Play for a combined total of over 1,459,000 installations. Among them were dozens of &lt;a href="https://vms.drweb.com/search/?q=Android.Joker&amp;lng=en"&gt;&lt;b&gt;Android.Joker&lt;/b&gt;&lt;/a&gt; trojans that subscribe victims to paid services and &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; malicious fake programs. In addition, our malware analysts discovered yet another app that supposedly allowed virtual rewards to be converted into real money.&lt;/p&gt;
    &lt;div class="colorful"&gt;
        &lt;h3&gt;Principal trends of Q3 2025&lt;/h3&gt;
        &lt;ul&gt;
            &lt;li&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.MobiDash&amp;lng=en"&gt;&lt;b&gt;Android.MobiDash&lt;/b&gt;&lt;/a&gt; ad-displaying trojans became the most widespread threats&lt;/li&gt;
            &lt;li&gt;The activity of &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; adware trojans continued to decline&lt;/li&gt;
            &lt;li&gt;The number of &lt;a href="https://vms.drweb.com/search/?q=Android.BankBot&amp;lng=en"&gt;&lt;b&gt;Android.BankBot&lt;/b&gt;&lt;/a&gt; banking trojan attacks increased&lt;/li&gt;
            &lt;li&gt;Banking trojans &lt;a href="https://vms.drweb.com/search/?q=Android.Banker&amp;lng=en"&gt;&lt;b&gt;Android.Banker&lt;/b&gt;&lt;/a&gt; and &lt;b&gt;Android.SpyMax&lt;/b&gt; were less active&lt;/li&gt;
            &lt;li&gt;Cybercriminals used a multi-functional backdoor, &lt;a href="https://vms.drweb.com/search/?q=Android.Backdoor.916.origin&amp;lng=en"&gt;&lt;b&gt;Android.Backdoor.916.origin&lt;/b&gt;&lt;/a&gt;, to attack representatives of Russian businesses&lt;/li&gt;
            &lt;li&gt;Many malicious apps were found on Google Play&lt;/li&gt;
        &lt;/ul&gt;
    &lt;/div&gt;
&lt;/section&gt;

&lt;section&gt;
    &lt;h3&gt;According to statistics collected by Dr.Web Security Space for mobile devices&lt;/h3&gt;
    &lt;div class="column_grid_review column_grid_review--o"&gt;
        &lt;a href="https://st.drweb.com/static/new-www/news/2025/october/review_mobile_q3/01_malware_q3_2025_en.png" class="preview"&gt;
          &lt;img src="https://st.drweb.com/static/new-www/news/2025/october/review_mobile_q3/01_malware_q3_2025_en.1.png" alt="Malware_Stat_Q3_2025"&gt;
        &lt;/a&gt;
    &lt;/div&gt;
    &lt;dl class="dlList"&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.MobiDash&amp;lng=en"&gt;&lt;b&gt;Android.MobiDash&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7859&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;A trojan app that displays obnoxious ads. It is a special software module that developers incorporate into applications.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1600&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;A trojan app that loads the website that is hardcoded into its settings. Known modifications of this malicious program load an online casino site.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.Click&amp;lng=en"&gt;&lt;b&gt;Android.Click&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1812&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for malicious &lt;i&gt;WhatsApp&lt;/i&gt; messenger mods that can covertly load various websites in the background.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.673.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;A trojan app designed to display intrusive ads. Members of the &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; family are often distributed as popular and harmless applications. In some cases, other malware can install them in the system directory. When these infect Android devices, they typically conceal their presence from the user. For example, they “hide” their icons from the home screen menu.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.Triada&amp;lng=en"&gt;&lt;b&gt;Android.Triada&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.5847&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for a packer for &lt;a href="https://vms.drweb.com/search/?q=Android.Triada&amp;lng=en"&gt;&lt;b&gt;Android.Triada&lt;/b&gt;&lt;/a&gt; trojans that is designed to protect them from being detected and analyzed. Threat actors most often use the packer together with malicious Telegram messenger mods in which these trojans are embedded.&lt;/dd&gt;
    &lt;/dl&gt;
    &lt;div class="column_grid_review column_grid_review--o"&gt;
        &lt;a href="https://st.drweb.com/static/new-www/news/2025/october/review_mobile_q3/02_unwanted_q3_2025_en.png" class="preview"&gt;
          &lt;img src="https://st.drweb.com/static/new-www/news/2025/october/review_mobile_q3/02_unwanted_q3_2025_en.1.png" alt="Unwanted_Stat_Q3_2025"&gt;
        &lt;/a&gt;
    &lt;/div&gt;
    &lt;dl class="dlList"&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.FakeMoney&amp;lng=en"&gt;&lt;b&gt;Program.FakeMoney&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.11&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for Android applications that allegedly allow users to earn money by completing different tasks. These apps make it look as if rewards are accruing for each one that is completed. At the same time, users are told that they have to accumulate a certain sum to withdraw their “earnings”. Typically, such apps have a list of popular payment systems and banks that supposedly could be used to withdraw the rewards. But even if users succeed in accumulating the needed amount, in reality they cannot get any real payments. This virus record is also used to detect other unwanted software based on the source code of such apps.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.CloudInject&amp;lng=en"&gt;&lt;b&gt;Program.CloudInject&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.5&lt;/b&gt;&lt;/dt&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.CloudInject&amp;lng=en"&gt;&lt;b&gt;Program.CloudInject&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for Android programs that have been modified using the CloudInject cloud service and the eponymous Android utility (the latter was added to the Dr.Web virus database as &lt;a href="https://vms.drweb.com/search/?q=Tool.CloudInject&amp;lng=en"&gt;&lt;b&gt;Tool.CloudInject&lt;/b&gt;&lt;/a&gt;). Such programs are modified on a remote server; meanwhile, the modders (users) who are interested in such modifications cannot control exactly what will be added to the apps. Moreover, these programs receive a number of dangerous system permissions. Once modification is complete, modders can remotely manage these apps—blocking them, displaying custom dialogs, tracking when other software is being installed or removed from a device, etc.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.FakeAntiVirus&amp;lng=en"&gt;&lt;b&gt;Program.FakeAntiVirus&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for adware programs that imitate anti-virus software. These apps inform users of nonexistent threats, mislead them, and demand that they purchase the software’s full version.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.TrackView&amp;lng=en"&gt;&lt;b&gt;Program.TrackView&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for a program that allows users to be monitored via their Android devices. Malicious actors can utilize it to track a target device’s location, take photos and video with the camera, eavesdrop via the microphone, record audio, etc.&lt;/dd&gt;
    &lt;/dl&gt;
    &lt;div class="column_grid_review column_grid_review--o"&gt;
        &lt;a href="https://st.drweb.com/static/new-www/news/2025/october/review_mobile_q3/03_riskware_q3_2025_en.png" class="preview"&gt;
          &lt;img src="https://st.drweb.com/static/new-www/news/2025/october/review_mobile_q3/03_riskware_q3_2025_en.1.png" alt="Riskware_Stat_Q3_2025"&gt;
        &lt;/a&gt;
    &lt;/div&gt;
    &lt;dl class="dlList"&gt;
        &lt;dt&gt;&lt;b&gt;Tool.NPMod.3&lt;/b&gt;&lt;/dt&gt;
        &lt;dt&gt;&lt;b&gt;Tool.NPMod.1&lt;/b&gt;&lt;/dt&gt;
        &lt;dt&gt;&lt;b&gt;Tool.NPMod.4&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for Android programs that have been modified using the NP Manager utility. A special module is embedded in such apps, and it allows them to bypass digital signature verification once they have been modified.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.LuckyPatcher&amp;lng=en"&gt;&lt;b&gt;Tool.LuckyPatcher&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.2.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;A tool that allows apps installed on Android devices to be modified (i.e., by creating patches for them) in order to change the logic of their work or to bypass certain restrictions. For instance, users can apply it to disable root-access verification in banking software or to obtain unlimited resources in games. To add patches, this utility downloads specially prepared scripts from the Internet, which can be crafted and added to a shared database by any third party. The functionality of such scripts can prove to be malicious; thus, patches made with this tool can pose a potential threat.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.Androlua&amp;lng=en"&gt;&lt;b&gt;Tool.Androlua&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for some potentially dangerous versions of a specialized framework for developing Android software based on the Lua scripting language. The main logic of Lua-based apps resides in corresponding scripts that are encrypted and decrypted by the interpreter upon execution. By default, this framework often requests access to a large number of system permissions in order to operate. As a result, the Lua scripts that it executes can potentially perform various malicious actions in accordance with the acquired permissions.&lt;/dd&gt;
    &lt;/dl&gt;
    &lt;div class="column_grid_review column_grid_review--o"&gt;
        &lt;a href="https://st.drweb.com/static/new-www/news/2025/october/review_mobile_q3/04_adware_q2_2025_en.png" class="preview"&gt;
          &lt;img src="https://st.drweb.com/static/new-www/news/2025/october/review_mobile_q3/04_adware_q2_2025_en.1.png" alt="Adware_Stat_Q3_2025"&gt;
        &lt;/a&gt;
    &lt;/div&gt;
    &lt;dl class="dlList"&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.AdPush&amp;lng=en"&gt;&lt;b&gt;Adware.AdPush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.Adpush&amp;lng=en"&gt;&lt;b&gt;Adware.Adpush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.21846&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;Adware modules that can be built into Android apps. They display notifications containing ads that mislead users. For example, such notifications can look like messages from the operating system. In addition, these modules collect a variety of confidential data and are able to download other apps and initiate their installation.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.ModAd&amp;lng=en"&gt;&lt;b&gt;Adware.ModAd&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for some modified versions (mods) of the &lt;i&gt;WhatsApp&lt;/i&gt; messenger, whose functions have been injected with a specific code. This code is responsible for loading target URLs by displaying web content (via the Android WebView component) when the messenger is in operation. Such web addresses perform redirects to advertised sites, including online casino, bookmaker, and adult sites.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.Youmi&amp;lng=en"&gt;&lt;b&gt;Adware.Youmi&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.4&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for an unwanted adware module that adds advertizing shortcuts onto the Android OS home screen.&lt;/dd&gt;
        &lt;dt&gt;&lt;b&gt;Adware.Basement.1&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;These are apps that display unwanted ads which often lead to malicious and fraudulent websites. They share a common code base with the &lt;a href="https://vms.drweb.com/search/?q=Program.FakeMoney&amp;lng=en"&gt;&lt;b&gt;Program.FakeMoney&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.11&lt;/b&gt; unwanted applications.&lt;/dd&gt;
    &lt;/dl&gt;
&lt;/section&gt;

&lt;section&gt;
    &lt;h3&gt;Threats on Google Play&lt;/h3&gt;
    &lt;p&gt;In Q3 2025, Doctor Web's anti-virus laboratory detected over 50 trojans from the &lt;a href="https://vms.drweb.com/search/?q=Android.Joker&amp;lng=en"&gt;&lt;b&gt;Android.Joker&lt;/b&gt;&lt;/a&gt; family which subscribe users to paid services. They were distributed under the guise of different software, including messengers, various system tools, image-editing apps, camera apps, programs for working with documents, etc.&lt;/p&gt;
    &lt;div class="column_grid_review column_grid_review--o" style="margin-bottom: 12px;"&gt;
        &lt;a href="https://st.drweb.com/static/new-www/news/2025/october/review_mobile_q3/05_Android.Joker.png" class="preview"&gt;
          &lt;img src="https://st.drweb.com/static/new-www/news/2025/october/review_mobile_q3/05_Android.Joker.1.png" alt="#drweb"&gt;
        &lt;/a&gt;
    &lt;/div&gt;
    &lt;p style="text-align: center;"&gt;&lt;em&gt;One trojan was hidden in the system-optimizing app Clean Boost (&lt;b&gt;Android.Joker.2412&lt;/b&gt;), and another — in the app Convert Text to PDF (&lt;b&gt;Android.Joker.2422&lt;/b&gt;) for creating PDF documents&lt;/em&gt;&lt;/p&gt;
    &lt;p&gt;Moreover, our specialists discovered more fake apps from the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; family being used in fraudulent schemes. As before, cybercriminals passed off some of them as financial apps, like reference books and teaching aids and software for accessing investing services. Other &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; trojans were distributed as games and under certain conditions could load bookmaker and online casino websites instead of operating as promised.&lt;/p&gt;
    &lt;div class="column_grid_review column_grid_review--o" style="margin-bottom: 12px;"&gt;
        &lt;a href="https://st.drweb.com/static/new-www/news/2025/october/review_mobile_q3/06_Android.FakeApp.png" class="preview"&gt;
          &lt;img src="https://st.drweb.com/static/new-www/news/2025/october/review_mobile_q3/06_Android.FakeApp.1.png" alt="#drweb"&gt;
        &lt;/a&gt;
    &lt;/div&gt;
    &lt;p style="text-align: center;"&gt;&lt;em&gt;Examples of &lt;b&gt;Android.FakeApp&lt;/b&gt; trojans disguised as financial apps. &lt;b&gt;Android.FakeApp.1889&lt;/b&gt; offered users the chance to test their financial literacy and &lt;b&gt;Android.FakeApp.1890&lt;/b&gt; the opportunity to develop financial intellection&lt;/em&gt;&lt;/p&gt;
    &lt;p&gt;Our experts also discovered &lt;a href="https://vms.drweb.com/search/?q=Program.FakeMoney&amp;lng=en"&gt;&lt;b&gt;Program.FakeMoney&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.16&lt;/b&gt;—an unwanted app, distributed as software called &lt;i&gt;Zeus Jackpot Mania&lt;/i&gt;. In this program, users could get virtual rewards that they could supposedly convert into real money and withdraw it.&lt;/p&gt;
    &lt;div class="column_grid_review column_grid_review--o" style="margin-bottom: 12px;"&gt;
        &lt;a href="https://st.drweb.com/static/new-www/news/2025/october/review_mobile_q3/09_Program.FakeMoney.16_1_Zeus Jackpot Mania.png" class="preview"&gt;
          &lt;img src="https://st.drweb.com/static/new-www/news/2025/october/review_mobile_q3/09_Program.FakeMoney.16_1_Zeus Jackpot Mania.1.png" alt="#drweb"&gt;
        &lt;/a&gt;
    &lt;/div&gt;
    &lt;p style="text-align: center;"&gt;&lt;em&gt;&lt;b&gt;Program.FakeMoney.16&lt;/b&gt; on Google Play&lt;/em&gt;&lt;/p&gt;
    &lt;p&gt;To “withdraw” the money, victims had to give this app some of their data. However, ultimately, they did not receive any payments.&lt;/p&gt;
    &lt;div class="column_grid_review column_grid_review--o" style="margin-bottom: 12px;"&gt;
        &lt;a href="https://st.drweb.com/static/new-www/news/2025/october/review_mobile_q3/10_Program.FakeMoney.16.png" class="preview"&gt;
          &lt;img src="https://st.drweb.com/static/new-www/news/2025/october/review_mobile_q3/10_Program.FakeMoney.16.1.png" alt="#drweb"&gt;
        &lt;/a&gt;
    &lt;/div&gt;
    &lt;p style="text-align: center;"&gt;&lt;em&gt;&lt;b&gt;Program.FakeMoney.16&lt;/b&gt; asks users to provide their full name and information about their bank account&lt;/em&gt;&lt;/p&gt;
    &lt;p&gt;To protect your Android device from malware and unwanted programs, we recommend installing Dr.Web anti-virus products for Android.&lt;/p&gt;
    &lt;a href="https://github.com/DoctorWebLtd/malware-iocs/blob/master/Q3%202025%20review%20of%20virus%20activity%20on%20mobile%20devices/README.adoc" target="_blank" rel="noopener noreferrer"&gt;Indicators of compromise&lt;/a&gt;
&lt;/section&gt;</description></item><item><guid>https://news.drweb.com/show/?i=15047&amp;lng=en</guid><title>Android backdoor spies on employees of Russian businesses</title><link>https://news.drweb.com/show/?i=15047&amp;lng=en&amp;c=38</link><pubDate>Wed, 20 Aug 2025 10:47:54 GMT</pubDate><description>&lt;p&gt;&lt;b&gt;August 20, 2025&lt;/b&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;newslead&gt;Doctor Web is informing users about Android.Backdoor.916.origin, a multi-functional backdoor that spreads in the wild and targets Russian businesses. The malware is capable of executing multiple commands received from attackers and has rich functionality for espionage and data theft. Among other capabilities, it can listen to conversations, broadcast from a device’s camera, steal content from messengers and browsers, and use its keylogger functionality to hijack entered text, including passwords.&lt;/newslead&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The first &lt;b&gt;Android.Backdoor.916.origin&lt;/b&gt; versions emerged in January 2025. Since discovering the backdoor, Doctor Web’s anti-virus laboratory has tracked the malware’s evolution and detected a number of versions (information about them is provided in the corresponding indicators of compromise) of it. Our experts believe that &lt;b&gt;Android.Backdoor.916.origin&lt;/b&gt; is likely designed more for targeted attacks than for mass distribution among Android device users. Its main target is Russian business representatives.&lt;/p&gt;

&lt;p&gt;Threat actors use direct messages in messengers to distribute the backdoor’s APK file under the guise of an anti-virus called “GuardCB”. The app’s icon resembles the emblem of the Russian Federation’s Central Bank; the emblem is set against the background of a shield. At the same time, the app’s interface provides only one language—Russian. Thus, the malware is entirely focused on Russian users. This is confirmed by other detected modifications with names like “SECURITY_FSB”, “ФСБ” (FSB), and others, which cybercriminals are trying to pass off as security-related programs that are supposedly related to Russian law enforcement agencies.&lt;/p&gt;

&lt;div class="img img-two-v"&gt;
   &lt;a href="https://st.drweb.com/static/new-www/news/2025/august/android_backdoor/Android.Backdoor.916.origin_01.png" data-fancybox&gt;
    &lt;img src="https://st.drweb.com/static/new-www/news/2025/august/android_backdoor/Android.Backdoor.916.origin_01.png" alt="#drweb"&gt;
  &lt;/a&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2025/august/android_backdoor/Android.Backdoor.916.origin_02.png" data-fancybox&gt;
    &lt;img src="https://st.drweb.com/static/new-www/news/2025/august/android_backdoor/Android.Backdoor.916.origin_02.png" alt="#drweb"&gt;
  &lt;/a&gt;      
&lt;/div&gt;
&lt;p style="text-align: center;"&gt;&lt;em&gt;Icons of the malware mislead potential victims&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;The app does not in fact have any anti-virus features. When it runs, &lt;b&gt;Android.Backdoor.916.origin&lt;/b&gt; acts like it is performing an anti-virus scan on a device, while the probability of “detecting” threats is programmed into it. The more time that has passed since the previous “scan”, the higher the chance is, but no more than 30%. The number of allegedly found threats is determined randomly and ranges from 1 to 3.&lt;/p&gt;

&lt;div class="img img-two-v same-height"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2025/august/android_backdoor/Android.Backdoor.916.origin_03.png" data-fancybox&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2025/august/android_backdoor/Android.Backdoor.916.origin_03.png" alt="#drweb"&gt;
    &lt;/a&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2025/august/android_backdoor/Android.Backdoor.916.origin_04.png" data-fancybox&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2025/august/android_backdoor/Android.Backdoor.916.origin_04.png" alt="#drweb"&gt;
    &lt;/a&gt;
&lt;/div&gt;

&lt;p&gt;When it first launches, &lt;b&gt;Android.Backdoor.916.origin&lt;/b&gt; requests access to many system permissions:&lt;/p&gt;

&lt;ul class="list"&gt;
    &lt;li&gt;Geolocation;&lt;/li&gt;
    &lt;li&gt;Audio recording;&lt;/li&gt;
    &lt;li&gt;Access to SMS, contacts, call history, media files, permission to make calls;&lt;/li&gt;
    &lt;li&gt;Camera (to take pictures and record videos);&lt;/li&gt;
    &lt;li&gt;Permission to run in the background;&lt;/li&gt;
    &lt;li&gt;Device administrator rights;&lt;/li&gt;
    &lt;li&gt;Accessibility Service.&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="margTM margBM flex center"&gt;
  &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2025/august/android_backdoor/Android.Backdoor.916.origin_05_video.png" class="preview"&gt;
         &lt;img src="https://st.drweb.com/static/new-www/news/2025/august/android_backdoor/Android.Backdoor.916.origin_05_video.1.png" alt="#drweb"&gt;
      &lt;/a&gt;
  &lt;/div&gt;
  &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2025/august/android_backdoor/Android.Backdoor.916.origin_06_audio.png" class="preview"&gt;
         &lt;img src="https://st.drweb.com/static/new-www/news/2025/august/android_backdoor/Android.Backdoor.916.origin_06_audio.1.png" alt="#drweb"&gt;
      &lt;/a&gt;
  &lt;/div&gt;
  &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2025/august/android_backdoor/Android.Backdoor.916.origin_07_admin.png" class="preview"&gt;
         &lt;img src="https://st.drweb.com/static/new-www/news/2025/august/android_backdoor/Android.Backdoor.916.origin_07_admin.1.png" alt="#drweb"&gt;
      &lt;/a&gt;
  &lt;/div&gt;
  &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2025/august/android_backdoor/Android.Backdoor.916.origin_08_accessibility.png" class="preview"&gt;
         &lt;img src="https://st.drweb.com/static/new-www/news/2025/august/android_backdoor/Android.Backdoor.916.origin_08_accessibility.1.png" alt="#drweb"&gt;
      &lt;/a&gt;
  &lt;/div&gt;
&lt;/div&gt;
&lt;p class="noMargT alignCenter" style="text-align: center;"&gt;&lt;em&gt;Examples of the requested permissions&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;The malware then launches several of its own services and checks their activity every minute, restarting them again if needed. The backdoor uses these services to connect to the C2 server and receive a large number of commands. Among them are:&lt;/p&gt;

&lt;ul class="list"&gt;
    &lt;li&gt;upload incoming and outgoing SMS to the C2 server;&lt;/li&gt;
    &lt;li&gt;upload the contacts list to the C2 server;&lt;/li&gt;
    &lt;li&gt;upload call history to the C2 server;&lt;/li&gt;
    &lt;li&gt;upload geolocation data to the C2 server;&lt;/li&gt;
    &lt;li&gt;start or stop audio streaming through the device’s microphone;&lt;/li&gt;
    &lt;li&gt;start or stop video streaming from the device’s camera;&lt;/li&gt;
    &lt;li&gt;start or stop streaming the device’s screen;&lt;/li&gt;
    &lt;li&gt;upload all images stored on a memory card to the C2 server;&lt;/li&gt;
    &lt;li&gt;upload images from a memory card to the C2 server according to a given range of names;&lt;/li&gt;
    &lt;li&gt;upload a specified image from a memory card to the C2 server;&lt;/li&gt;
    &lt;li&gt;enable or disable the backdoor’s self-protection;&lt;/li&gt;
    &lt;li&gt;execute a received shell command;&lt;/li&gt;
    &lt;li&gt;upload information about the device’s network and interfaces to the C2 server.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The backdoor streams the different types of data it collects to separate C2 server ports.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Android.Backdoor.916.origin&lt;/b&gt; uses Accessibility Service to execute keylogger functionality and intercept content from messengers and browsers. These apps are monitored by the trojan:&lt;/p&gt;

&lt;ul class="list"&gt;
    &lt;li&gt;Telegram&lt;/li&gt;
    &lt;li&gt;Google Chrome&lt;/li&gt;
    &lt;li&gt;Gmail&lt;/li&gt;
    &lt;li&gt;Яндекс Старт (Yandex Start)&lt;/li&gt;
    &lt;li&gt;Яндекс Браузер (Yandex Browser)&lt;/li&gt;
    &lt;li&gt;WhatsApp&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The backdoor also uses Accessibility Service to protect itself from being deleted if it receives the corresponding command from the threat actors.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Android.Backdoor.916.origin&lt;/b&gt; has functionality that allows it to operate with a large number of C2 servers whose information is stored in its configuration. Moreover, it can switch between hosting providers, the number of which can be as high as 15, but this option is not being used at the moment. Doctor Web’s anti-virus laboratory has informed domain registrars about the violations it has uncovered.&lt;/p&gt;

&lt;p&gt;Dr.Web Security Space for mobile devices reliably detects and removes all known &lt;b&gt;Android.Backdoor.916.origin&lt;/b&gt; modifications, keeping our users well protected from this threat.&lt;/p&gt;

&lt;p&gt;More about &lt;a href="https://vms.drweb.com/virus/?i=30452347&amp;lng=en" target="_blank"&gt;&lt;b&gt;Android.Backdoor.916.origin&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://github.com/DoctorWebLtd/malware-iocs/blob/master/Android.Backdoor.916.origin/README.adoc" target="_blank"&gt;Indicators of compromise&lt;/a&gt;&lt;/p&gt;</description></item><item><guid>https://news.drweb.com/show/?i=15027&amp;lng=en</guid><title>Doctor Web’s Q2 2025 review of virus activity on mobile devices</title><link>https://news.drweb.com/show/?i=15027&amp;lng=en&amp;c=38</link><pubDate>Tue, 01 Jul 2025 06:00:00 GMT</pubDate><description>&lt;p&gt;&lt;b&gt;July 1, 2025&lt;/b&gt;&lt;/p&gt;

&lt;section class="margTM margBM" id="main"&gt;
    &lt;p&gt;&lt;newslead&gt;According to detection statistics collected by Dr.Web Security Space for mobile devices, adware trojans from various families remained the most common malware. Members of the &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; trojan family were again the most active, despite the fact that users encountered them 8.62% less often. These were followed by &lt;a href="https://vms.drweb.com/search/?q=Android.MobiDash&amp;lng=en"&gt;&lt;b&gt;Android.MobiDash&lt;/b&gt;&lt;/a&gt; adware trojans; the number of attacks involving them increased by 11.17%. &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; malicious programs, used in various fraudulent schemes, ranked third; they were detected on protected devices 25.17% less frequently.&lt;/newslead&gt;&lt;/p&gt;
    &lt;p&gt;
        The activity of &lt;a href="https://vms.drweb.com/search/?q=Android.Banker&amp;lng=en"&gt;&lt;b&gt;Android.Banker&lt;/b&gt;&lt;/a&gt; banking trojans increased by 73.15%, compared to the previous quarter. 
        At the same time, some other banking trojan families were detected less often, e.g., &lt;a href="https://vms.drweb.com/search/?q=Android.BankBot&amp;lng=en"&gt;&lt;b&gt;Android.BankBot&lt;/b&gt;&lt;/a&gt; (by 37.19%) and &lt;b&gt;Android.SpyMax&lt;/b&gt; (by 19.14%).
    &lt;/p&gt;
    &lt;p&gt;
        In April, our virus analysts &lt;a href="https://news.drweb.com/show/?i=15002&amp;lng=en" target="_blank"&gt;informed&lt;/a&gt; 
        the public about the discovery of a large-scale campaign to steal cryptocurrency from Android smartphone users. 
        During this campaign, malicious actors hid &lt;a href="https://vms.drweb.com/search/?q=Android.Clipper.31&amp;lng=en"&gt;&lt;b&gt;Android.Clipper.31&lt;/b&gt;&lt;/a&gt; in a modified version of the WhatsApp 
        messenger and implanted it into the firmware of some budget Android smartphone models. This trojan hijacks messages 
        sent and received in the messenger, searches the Tron and Ethereum crypto wallet addresses in them, and replaces 
        legitimate addresses with ones belonging to the scammers. At the same time, the trojan conceals this substitution, 
        and users of infected devices see the “correct” wallets in their messages. Moreover, &lt;a href="https://vms.drweb.com/search/?q=Android.Clipper.31&amp;lng=en"&gt;&lt;b&gt;Android.Clipper.31&lt;/b&gt;&lt;/a&gt; 
        sends all images in the &lt;i&gt;jpg&lt;/i&gt;, &lt;i&gt;png&lt;/i&gt;, and &lt;i&gt;jpeg&lt;/i&gt; formats to a remote server to search mnemonic phrases 
        for their victims’ crypto wallets.
    &lt;/p&gt;
    &lt;p&gt;
        Also in April, we &lt;a href="https://news.drweb.com/show/?i=15006&amp;lng=en" target="_blank"&gt;reported&lt;/a&gt; on a spyware trojan targeting Russian military personnel. 
        The &lt;a href="https://vms.drweb.com/search/?q=Android.Spy.1292.origin&amp;lng=en"&gt;&lt;b&gt;Android.Spy.1292.origin&lt;/b&gt;&lt;/a&gt; malicious program was hidden in a modified version of Alpine Quest mapping software. It was distributed via a fake Telegram 
        channel of an app created by the threat actors as well as via one of the Russian Android app catalogs. 
        &lt;a href="https://vms.drweb.com/search/?q=Android.Spy.1292.origin&amp;lng=en"&gt;&lt;b&gt;Android.Spy.1292.origin&lt;/b&gt;&lt;/a&gt; sent various confidential data to the attackers, including user accounts, their mobile phone number, contacts from the phone book, 
        and information about the infected device’s geolocation and the files stored in its memory. When commanded by malicious actors, the trojan could steal specified files. 
        The malware creators were particularly interested in confidential documents sent via popular messengers as well as in Alpine Quest’s location log file.
    &lt;/p&gt;
    &lt;p&gt;
        At the same time, during this most recent observation period, Doctor Web’s virus laboratory detected more threats on Google Play. 
        Among them were various trojans and unwanted ad-displaying software.
    &lt;/p&gt;
    &lt;div class="colorful"&gt;
        &lt;h3&gt;Principal trends of Q2 2025&lt;/h3&gt;
        &lt;ul&gt;
            &lt;li&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; adware trojans intensified their activity&lt;/li&gt;
            &lt;li&gt;Adware trojans from the &lt;a href="https://vms.drweb.com/search/?q=Android.MobiDash&amp;lng=en"&gt;&lt;b&gt;Android.MobiDash&lt;/b&gt;&lt;/a&gt; family also heightened their activity&lt;/li&gt;
            &lt;li&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.Banker&amp;lng=en"&gt;&lt;b&gt;Android.Banker&lt;/b&gt;&lt;/a&gt; banking trojans were less commonly detected on protected devices, compared to the previous quarter&lt;/li&gt;
            &lt;li&gt;Decreased numbers of &lt;a href="https://vms.drweb.com/search/?q=Android.BankBot&amp;lng=en"&gt;&lt;b&gt;Android.BankBot&lt;/b&gt;&lt;/a&gt; and &lt;b&gt;Android.SpyMax&lt;/b&gt; banking trojan family attacks were noted&lt;/li&gt;
            &lt;li&gt;A trojan designed to steal cryptocurrency was found in the firmware of several budget Android smartphone models&lt;/li&gt;
            &lt;li&gt;Malicious actors distributed a trojan that spied on Russian military personnel&lt;/li&gt;
            &lt;li&gt;More threats emerged on Google Play&lt;/li&gt;
        &lt;/ul&gt;
    &lt;/div&gt;
&lt;/section&gt;

&lt;section class="margTM margBM" id="stat"&gt;
    &lt;h3&gt;According to statistics collected by Dr.Web Security Space for mobile devices&lt;/h3&gt;
    &lt;div class="column_grid_review column_grid_review--o"&gt;
        &lt;a href="https://st.drweb.com/static/new-www/news/2025/july/review_mobile_q2/01_malware_q2_2025_en.png" class="preview"&gt;
          &lt;img src="https://st.drweb.com/static/new-www/news/2025/july/review_mobile_q2/01_malware_q2_2025_en.png" alt="Malware_Stat_Q2_2025"&gt;
        &lt;/a&gt;
    &lt;/div&gt;
    &lt;dl class="dlList"&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.657.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.4214&lt;/b&gt;&lt;/dt&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.4213&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;Trojan apps designed to display intrusive ads. Members of the &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; family are often distributed as popular and harmless applications. In some cases, other malware can install them in the system directory. When these infect Android devices, they typically conceal their presence from the user. For example, they “hide” their icons from the home screen menu.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.MobiDash&amp;lng=en"&gt;&lt;b&gt;Android.MobiDash&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7859&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;A trojan app that displays obnoxious ads. It is a special software module that developers incorporate into applications.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1600&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;A trojan app that loads a website that is hardcoded into its settings. Known modifications of this malicious program load an online casino site.&lt;/dd&gt;
    &lt;/dl&gt;
    &lt;div class="column_grid_review column_grid_review--o"&gt;
        &lt;a href="https://st.drweb.com/static/new-www/news/2025/july/review_mobile_q2/02_unwanted_q2_2025_en.png" class="preview"&gt;
          &lt;img src="https://st.drweb.com/static/new-www/news/2025/july/review_mobile_q2/02_unwanted_q2_2025_en.png" alt="Unwanted_Stat_Q2_2025"&gt;
        &lt;/a&gt;
    &lt;/div&gt;
    &lt;dl class="dlList"&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.FakeMoney&amp;lng=en"&gt;&lt;b&gt;Program.FakeMoney&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.11&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for Android applications that allegedly allow users to earn money by completing different tasks. These apps make it look as if rewards are accruing for each one that is completed. At the same time, users are told that they have to accumulate a certain sum to withdraw their “earnings”. Typically, such apps have a list of popular payment systems and banks that supposedly could be used to withdraw the rewards. But even if users succeed in accumulating the needed amount, in reality they cannot get any real payments. This virus record is also used to detect other unwanted software based on the source code of such apps.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.CloudInject&amp;lng=en"&gt;&lt;b&gt;Program.CloudInject&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for Android programs that have been modified using the CloudInject cloud service and the eponymous Android utility (the latter was added to the Dr.Web virus database as &lt;a href="https://vms.drweb.com/search/?q=Tool.CloudInject&amp;lng=en"&gt;&lt;b&gt;Tool.CloudInject&lt;/b&gt;&lt;/a&gt;). Such programs are modified on a remote server; meanwhile, the modders (users) who are interested in such modifications cannot control exactly what will be added to the apps. Moreover, these programs receive a number of dangerous system permissions. Once modification is complete, modders can remotely manage these apps—blocking them, displaying custom dialogs, tracking when other software is being installed or removed from a device, etc.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.FakeAntiVirus&amp;lng=en"&gt;&lt;b&gt;Program.FakeAntiVirus&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for adware programs that imitate anti-virus software. These apps inform users of nonexistent threats, mislead them, and demand that they purchase the software’s full version.&lt;/dd&gt;    
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.TrackView&amp;lng=en"&gt;&lt;b&gt;Program.TrackView&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for a program that allows users to be monitored via their Android devices. Malicious actors can utilize it to track a target device’s location, take photos and video with the camera, eavesdrop via the microphone, record audio, etc.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.SecretVideoRecorder&amp;lng=en"&gt;&lt;b&gt;Program.SecretVideoRecorder&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for various modifications of an application that is designed to record videos and take photos in the background, using built-in Android device cameras. It can operate covertly by allowing notifications about ongoing recordings to be disabled. It also allows an app’s icon and name to be replaced with fake ones. This functionality makes this software potentially dangerous.&lt;/dd&gt;
    &lt;/dl&gt;
    &lt;div class="column_grid_review column_grid_review--o"&gt;
        &lt;a href="https://st.drweb.com/static/new-www/news/2025/july/review_mobile_q2/03_riskware_q2_2025_en.png" class="preview"&gt;
          &lt;img src="https://st.drweb.com/static/new-www/news/2025/july/review_mobile_q2/03_riskware_q2_2025_en.png" alt="Riskware_Stat_Q2_2025"&gt;
        &lt;/a&gt;
    &lt;/div&gt;
    &lt;dl class="dlList"&gt;
        &lt;dt&gt;&lt;b&gt;Tool.NPMod.3&lt;/b&gt;&lt;/dt&gt;
        &lt;dt&gt;&lt;b&gt;Tool.NPMod.1&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for Android programs that have been modified using the NP Manager utility. A special module is embedded in such apps, and it allows them to bypass digital signature verification once they have been modified.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.Androlua&amp;lng=en"&gt;&lt;b&gt;Tool.Androlua&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for some potentially dangerous versions of a specialized framework for developing Android software based on the Lua scripting language. The main logic of Lua-based apps resides in the corresponding scripts that are encrypted and decrypted by the interpreter upon execution. By default, this framework often requests access to a large number of system permissions in order to operate. As a result, the Lua scripts that it executes can potentially perform various malicious actions in accordance with the acquired permissions.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.14.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;A riskware platform that allows applications to launch APK files without installing them. It creates a virtual runtime environment in the context of the apps in which they are integrated. The APK files launched with the help of this platform can operate as if they are part of such programs and can also obtain the same permissions.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.Packer&amp;lng=en"&gt;&lt;b&gt;Tool.Packer&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;A packer tool designed to protect Android applications from unauthorized modifications and reverse engineering. This tool is not malicious in itself, but it can be used to protect both harmless and malicious software.&lt;/dd&gt;
    &lt;/dl&gt;
    &lt;div class="column_grid_review column_grid_review--o"&gt;
        &lt;a href="https://st.drweb.com/static/new-www/news/2025/july/review_mobile_q2/04_adware_q2_2025_en.png" class="preview"&gt;
          &lt;img src="https://st.drweb.com/static/new-www/news/2025/july/review_mobile_q2/04_adware_q2_2025_en.png" alt="Adware_Stat_Q2_2025"&gt;
        &lt;/a&gt;
    &lt;/div&gt;
    &lt;dl class="dlList"&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.ModAd&amp;lng=en"&gt;&lt;b&gt;Adware.ModAd&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for some modified versions (mods) of the WhatsApp messenger, whose functions have been injected with a specific code. This code is responsible for loading target URLs by displaying web content (via the Android WebView component) when the messenger is in operation. Such web addresses perform redirects to advertised sites, including online casino, bookmaker, and adult sites.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.AdPush&amp;lng=en"&gt;&lt;b&gt;Adware.AdPush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;Adware modules that can be built into Android apps. They display notifications containing ads that mislead users. For example, such notifications can look like messages from the operating system. In addition, these modules collect a variety of confidential data and are able to download other apps and initiate their installation.&lt;/dd&gt;
        &lt;dt&gt;&lt;b&gt;Adware.Basement.1&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;These are apps that display unwanted ads which often lead to malicious and fraudulent websites. They share a common code base with the &lt;a href="https://vms.drweb.com/search/?q=Program.FakeMoney&amp;lng=en"&gt;&lt;b&gt;Program.FakeMoney&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.11&lt;/b&gt; unwanted applications.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.Fictus&amp;lng=en"&gt;&lt;b&gt;Adware.Fictus&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;An adware module that malicious actors embed into the cloned versions of popular Android games and applications. Its incorporation is facilitated by a specialized net2share packer. Copies of software created this way are then distributed through various software catalogs. When installed on Android devices, such apps and games display obnoxious ads.&lt;/dd&gt;
        &lt;dt&gt;&lt;b&gt;Adware.Jiubang.1&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;Unwanted ad-displaying software for Android devices that displays a banner showing recommended programs when applications are being installed.&lt;/dd&gt;
    &lt;/dl&gt;
&lt;/section&gt;

&lt;section class="margTM margBM" id="gplay"&gt;
    &lt;h3&gt;Threats on Google Play&lt;/h3&gt;
    &lt;p&gt;
        Over the course of the second quarter of 2025, Doctor Web’s virus analysts discovered several dozen threats on Google Play, 
        including various fake programs from the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; family. These trojans were again actively being distributed 
        under the guise of finance-related programs and, instead of the promised functionality, could load fraudulent websites.
    &lt;/p&gt;
    &lt;div class="flex fxCenter"&gt;
        &lt;div class="margRM"&gt;
              &lt;a href="https://st.drweb.com/static/new-www/news/2025/july/review_mobile_q2/05_Android.FakeApp.1863.png" class="preview"&gt;
                  &lt;img src="https://st.drweb.com/static/new-www/news/2025/july/review_mobile_q2/05_Android.FakeApp.1863.1.png" alt="Android.FakeApp_Q2_2025" style="max-width: 350px;"&gt;
              &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
              &lt;a href="https://st.drweb.com/static/new-www/news/2025/july/review_mobile_q2/06_Android.FakeApp.1859.png" class="preview"&gt;
                  &lt;img src="https://st.drweb.com/static/new-www/news/2025/july/review_mobile_q2/06_Android.FakeApp.1859.1.png" alt="Android.FakeApp_Q2_2025" style="max-width: 350px;"&gt;
              &lt;/a&gt;
        &lt;/div&gt;
    &lt;/div&gt;
    &lt;p class="noMargT alignCenter"&gt;&lt;em&gt;
        &lt;b&gt;Android.FakeApp.1863&lt;/b&gt; and &lt;b&gt;Android.FakeApp.1859&lt;/b&gt; are examples of the trojans that were discovered. 
        The former was hidden in the “TPAO” app and targeted Turkish users who were told that the app could help them 
        “easily control their deposits and incomes”. The latter was disguised as a “financial assistant” (“Quantum MindPro”) 
        and was geared toward a French-speaking audience.
    &lt;/em&gt;&lt;/p&gt;
    &lt;p&gt;
        Games remain another popular disguise for such fake programs. Under certain conditions, they load online casino and bookmaker websites instead of providing gaming functionality.
    &lt;/p&gt;
    &lt;div class="flex fxCenter"&gt;
        &lt;a href="https://st.drweb.com/static/new-www/news/2025/july/review_mobile_q2/07_Android.FakeApp.1840.png" class="preview"&gt;
          &lt;img src="https://st.drweb.com/static/new-www/news/2025/july/review_mobile_q2/07_Android.FakeApp.1840.1.png" alt="Android.FakeApp_Q2_2025"&gt;
        &lt;/a&gt;
    &lt;/div&gt;
    &lt;p class="noMargT alignCenter"&gt;&lt;em&gt;
        &lt;b&gt;Android.FakeApp.1840&lt;/b&gt; (“Pino Bounce”) is one of the fake games that could load an online casino site.
    &lt;/em&gt;&lt;/p&gt;
    &lt;p&gt;
        In addition, our specialists detected the unwanted ad-displaying software &lt;b&gt;Adware.Adpush.21912&lt;/b&gt;. 
        It was hidden in the &lt;i&gt;“Coin News Promax”&lt;/i&gt; app, which contains informational materials about cryptocurrencies. 
        &lt;b&gt;Adware.Adpush.21912&lt;/b&gt; displays notifications that, when clicked, load into WebView the link specified by the С2 server.
    &lt;/p&gt;
     &lt;div class="flex fxCenter"&gt;
        &lt;a href="https://st.drweb.com/static/new-www/news/2025/july/review_mobile_q2/08_Adware.Adpush.21912.png" class="preview"&gt;
          &lt;img src="https://st.drweb.com/static/new-www/news/2025/july/review_mobile_q2/08_Adware.Adpush.21912.1.png" alt="Adware.Adpush_Q2_2025"&gt;
        &lt;/a&gt;
    &lt;/div&gt;
    &lt;p&gt;
        To protect your Android device from malware and unwanted programs, we recommend installing Dr.Web anti-virus products for Android.
    &lt;/p&gt;
&lt;/section&gt;
&lt;br /&gt;
&lt;a href="https://github.com/DoctorWebLtd/malware-iocs/blob/master/Q2%202025%20review%20of%20virus%20activity%20on%20mobile%20devices/README.adoc" target="_blank" rel="noopener noreferrer"&gt;Indicators of compromise&lt;/a&gt;</description></item><item><guid>https://news.drweb.com/show/?i=15006&amp;lng=en</guid><title>Android spyware trojan targets Russian military personnel who use Alpine Quest mapping software</title><link>https://news.drweb.com/show/?i=15006&amp;lng=en&amp;c=38</link><pubDate>Mon, 21 Apr 2025 01:00:00 GMT</pubDate><description>&lt;p&gt;&lt;b&gt;April 21, 2025&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;newslead&gt;Doctor Web’s experts have discovered Android.Spy.1292.origin, spyware whose main target is Russian military personnel. The attackers hide this trojan inside modified Alpine Quest mapping software and distribute it in various ways, including through one of the Russian Android app catalogs. Among other things, the malware sends the attackers phonebook contact information and the infected device’s geolocation. Moreover, this spyware collects data about the files stored on the devices and, when commanded by threat actors, can download additional modules possessing the functionality needed to steal the files.&lt;/newslead&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Alpine Quest is topographic software that allows different maps to be used both in online and offline mode. It is popular among athletes, travelers, and hunters but also widely used by Russian military personnel in the Special Military Operation zone—and this is what the malware campaign organizers decided to exploit. Threat actors embedded &lt;b&gt;Android.Spy.1292.origin&lt;/b&gt; into one of the older Alpine Quest app versions and distributed the trojanized variant under the guise of a freely available version of Alpine Quest Pro, a program with advanced functionality. They created a fake Telegram channel for the software; the channel provided a link for downloading the app in one of the Russian app catalogs. The same trojan version, disguised as the app’s “update”, was later distributed via this very same channel.&lt;/p&gt;
&lt;p class="noMargB alignCenter"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2025/april/vir-news/Android.Spy.1292.origin_telegram_group.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2025/april/vir-news/Android.Spy.1292.origin_telegram_group.1.png" alt="#drweb"&gt;
    &lt;/a&gt;
&lt;/p&gt;
&lt;p class="noMargT alignCenter"&gt;&lt;em&gt;The Telegram channel through which threat actors distributed the &lt;b&gt;Android.Spy.1292.origin&lt;/b&gt; trojan&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Because &lt;b&gt;Android.Spy.1292.origin&lt;/b&gt; is embedded into a copy of the genuine app, it looks and operates as the original, which allows it to stay undetected and execute malicious tasks for longer periods of time.&lt;/p&gt;
&lt;p&gt;Each time it is launched, the trojan collects and sends the following data to the C&amp;C server:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;the user’s mobile phone number and their accounts;&lt;/li&gt;
&lt;li&gt;contacts from the phonebook;&lt;/li&gt;
&lt;li&gt;the current date;&lt;/li&gt;
&lt;li&gt;the current geolocation;&lt;/li&gt;
&lt;li&gt;information about the files stored on the device;&lt;/li&gt;
&lt;li&gt;the app’s version.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;At the same time, it duplicates some of this information in the attackers’ Telegram bot. For instance, the trojan sends it the geolocation data every time the device’s location changes.&lt;/p&gt;
&lt;p&gt;After receiving information about the available files, threat actors can command the trojan to download and run additional modules that are to be used to steal the necessary files. The analysis performed by our specialists indicates that the creators of the trojan are particularly interested in confidential documents that users sent via the Telegram and WhatsApp messengers as well as the &lt;span class="string"&gt;locLog&lt;/span&gt; location log file created directly by the Alpine Quest program.&lt;/p&gt;
&lt;p&gt;As a result, &lt;b&gt;Android.Spy.1292.origin&lt;/b&gt; not only allows user locations to be monitored but also confidential files to be hijacked. In addition, its functionality can be expanded via the download of new modules, which allows it to then execute a wider spectrum of malicious tasks.&lt;/p&gt;
&lt;p&gt;Doctor Web’s specialists recommend installing Android programs only from reputable sources, such as official app catalogs, and opting against downloading software from Telegram channels and dubious websites, especially when it comes to supposedly freely available paid versions of programs. At the same time, it is important to pay attention to who is distributing the apps of interest, as attackers often disguise themselves as real developers, using similar names and logos.&lt;/p&gt;
&lt;p&gt;To protect Android devices, it is essential to use an anti-virus. Dr.Web Security Space for mobile devices reliably detects and deletes the &lt;b&gt;Android.Spy.1292.origin&lt;/b&gt; trojan, keeping our users well protected from this threat.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://github.com/DoctorWebLtd/malware-iocs/blob/master/Android.Spy.1292.origin/README.adoc"&gt;Indicators of compromise&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;More details about &lt;a href="https://vms.drweb.com/search/?q=Android.Spy.1292.origin&amp;lng=en"&gt;&lt;b&gt;Android.Spy.1292.origin&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
</description></item><item><guid>https://news.drweb.com/show/?i=15002&amp;lng=en</guid><title>Nice chatting with you: what connects cheap Android smartphones, WhatsApp and cryptocurrency theft?</title><link>https://news.drweb.com/show/?i=15002&amp;lng=en&amp;c=38</link><pubDate>Mon, 14 Apr 2025 02:00:00 GMT</pubDate><description>&lt;p&gt;&lt;b&gt;April 14, 2025&lt;/b&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;newslead&gt;Every year, cryptocurrencies become more and more common as a payment method. According to the data for 2023, in developed countries about 20% of the population has at some time used such a means of payment, and in developing countries, where the banking sector does not meet the needs of the population, the number of cryptocurrency users is even higher. In cryptocurrency adoption rankings, Russia is among the top ten countries in terms of number of users. Anonymity, fast transactions, global accessibility and low transfer fees are the main advantages that attract ordinary users. Fraudsters, on the other hand, appreciate the irreversibility of the transactions, the lack of regulation, and the lack of user knowledge due to the relative novelty of the technology, which allows them to implement a variety of illicit enrichment schemes.&lt;/newslead&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Starting from June 2024, the Doctor Web virus laboratory has received a number of reports from our customers who installed Dr.Web Security Space antivirus on their newly purchased Android phones. A scan of the system partition revealed a suspicious application disguised as WhatsApp messenger. During their investigation, our analysts were able to establish that those cases were not a mere blip on the radar. It turned out that they were all part of a campaign to steal cryptocurrency through clipping.&lt;/p&gt;

&lt;blockquote&gt;Clipping means stealing information by intercepting and/or spoofing data that a user copies to the clipboard. Most commonly, clippers are designed to search the clipboard for strings corresponding to cryptocurrency wallet addresses. On average, such strings contain between 25 and 42 characters. And to avoid any hassle, users typically use standard "copy" and "paste" operations to work with such data. A clipper can take advantage of this by intercepting the contents of the clipboard and discreetly replacing all cryptocurrency wallet addresses with those of the cybercriminals.&lt;/blockquote&gt;

&lt;p&gt;Using messengers trojanized by clippers to steal financial information is not a new tactic for hackers: one such campaign began in 2023. At that time, a group of attackers used a number of legitimate platforms, such as YouTube, to distribute links to malicious Telegram and WhatsApp apps. These links were placed in the video descriptions. The main target audience was Chinese users, who do not have access to foreign messengers. And since they have to use a number of tricks to get around the geoblocking, usually by downloading programs from third-party sites, this campaign was quite successful.&lt;/p&gt;

&lt;p&gt;Now the attackers moved to the next level, gaining access to the supply chain of a number of Chinese manufacturers of Android-based smartphones. These are the smartphones that have been reported to Doctor Web's virus lab. Fraudulent applications were detected directly in the software pre-installed on the phone. In this case, the malicious code was added to the WhatsApp messenger.&lt;/p&gt;

&lt;p&gt;It should be noted that in most cases the compromised devices were low-end and had names similar to the models of well-known brands: S23 Ultra, Note 13 Pro, P70 Ultra, and so on. At the same time, their actual technical specifications were far from what their product page claimed. The threat actors used an application that allowed them to easily spoof all of the technical information displayed not only on the About Device page but also in the reports of such popular applications as AIDA64 and CPU-Z. In addition, although the About Device page claimed that the phones have the latest version of Android 14 installed on them, all of the devices were actually running the same build of Android 12. A third of the models listed below are manufactured under the SHOWJI brand. Unfortunately, we were unable to identify the manufacturer of the remaining models.&lt;/p&gt;

&lt;div class="ScrollX"&gt;
  &lt;table class="Table"&gt;
    &lt;tr&gt;
      &lt;td&gt;SHOWJI S19 Pro&lt;/td&gt;
      &lt;td&gt;Note 30i&lt;/td&gt;
      &lt;td&gt;Camon 20&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;SHOWJI Note 13 Pro&lt;/td&gt;
      &lt;td&gt;S23 Ultra&lt;/td&gt;
      &lt;td&gt;P70 Ultra&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;SHOWJI X100S Pro&lt;/td&gt;
      &lt;td&gt;S18 Pro&lt;/td&gt;
      &lt;td&gt;M14 Ultra&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;SHOWJI Reno12 Pro&lt;/td&gt;
      &lt;td&gt;6 Pro&lt;/td&gt;
      &lt;td&gt;S24 Ultra&lt;/td&gt;
    &lt;/tr&gt;
  &lt;/table&gt;
&lt;/div&gt;
&lt;p class="noMargT alignCenter"&gt;&lt;em&gt;Smartphone models purchased by our users that came with preinstalled malicious software&lt;/em&gt;&lt;/p&gt;

&lt;div class="flex fxCenter"&gt;
   &lt;div class="margRM"&gt;
     &lt;a href="https://st.drweb.com/static/new-www/news/2025/april/shibai/pic1.png" class="preview"&gt;
       &lt;img src="https://st.drweb.com/static/new-www/news/2025/april/shibai/pic1.1.png" alt="phone" style="max-width: 350px;"&gt;
     &lt;/a&gt;
   &lt;/div&gt;
   &lt;div class="margRM"&gt;
     &lt;a href="https://st.drweb.com/static/new-www/news/2025/april/shibai/pic2.png" class="preview"&gt;
       &lt;img src="https://st.drweb.com/static/new-www/news/2025/april/shibai/pic2.1.png" alt="phone" style="max-width: 350px;"&gt;
     &lt;/a&gt;
   &lt;/div&gt;
&lt;/div&gt;
&lt;div class="flex fxCenter"&gt;
   &lt;div class="margRM"&gt;
     &lt;a href="https://st.drweb.com/static/new-www/news/2025/april/shibai/pic3.png" class="preview"&gt;
       &lt;img src="https://st.drweb.com/static/new-www/news/2025/april/shibai/pic3.1.png" alt="phone" style="max-width: 350px;"&gt;
     &lt;/a&gt;
   &lt;/div&gt;
   &lt;div class="margRM"&gt;
     &lt;a href="https://st.drweb.com/static/new-www/news/2025/april/shibai/pic4.png" class="preview"&gt;
       &lt;img src="https://st.drweb.com/static/new-www/news/2025/april/shibai/pic4.1.png" alt="phone" style="max-width: 350px;"&gt;
     &lt;/a&gt;
   &lt;/div&gt;
&lt;/div&gt;
&lt;p class="noMargT alignCenter"&gt;&lt;em&gt;Product descriptions in bad Russian boasting “Fast Tastydragon CPU” [sic!] and “50 million cameras” [even sic’er!]&lt;/em&gt;&lt;/p&gt;

&lt;div class="flex fxCenter"&gt;
   &lt;div class="margRM"&gt;
     &lt;a href="https://st.drweb.com/static/new-www/news/2025/april/shibai/pic5.png" class="preview"&gt;
       &lt;img src="https://st.drweb.com/static/new-www/news/2025/april/shibai/pic5.2.png" alt="virus app" style="max-width: 350px;"&gt;
     &lt;/a&gt;
   &lt;/div&gt;
   &lt;div class="margRM"&gt;
     &lt;a href="https://st.drweb.com/static/new-www/news/2025/april/shibai/pic6.png" class="preview"&gt;
       &lt;img src="https://st.drweb.com/static/new-www/news/2025/april/shibai/pic6.2.png" alt="virus app" style="max-width: 350px;"&gt;
     &lt;/a&gt;
   &lt;/div&gt;
&lt;/div&gt;
&lt;p class="noMargT alignCenter"&gt;&lt;em&gt;Screenshot of the application used to spoof technical specifications of the device and the result of its operation&lt;/em&gt;&lt;/p&gt;

&lt;blockquote&gt;To verify device specifications with greater certainty, you can use an app called DevCheck. In most cases, this application accurately determines the product specifications, even if the manufacturer is trying to mislead the consumer.&lt;/blockquote&gt;

&lt;p&gt;To create their trojanized WhatsApp application, the threat actors used the &lt;a href="https://github.com/LSPosed/LSPatch" target="_blank"&gt;LSPatch&lt;/a&gt; tool. This framework allows the behavior of the main application to be modified, without altering its code, and additional software modules to be loaded. In this case, the criminals placed the malicious module &lt;span class="string"&gt;com.whatsHook.apk&lt;/span&gt; in the &lt;span class="string"&gt;assets&lt;/span&gt; folder, which performs the following functions:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;application update hijacking. Now, instead of checking for updates at &lt;span class="string"&gt;hxxps://www.whatsapp[.]com/android/current/WhatsApp[.]apk&lt;/span&gt;, the application accesses one of the attackers' servers, e.g., &lt;span class="string"&gt;hххps://apk-download[.]pro/download/whatsapp[.]apk&lt;/span&gt;. This keeps the application trojanized and allows it to make the changes the threat actors need;&lt;/li&gt;
&lt;/ul&gt;

&lt;p class="alignCenter"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2025/april/shibai/pic7.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2025/april/shibai/pic7.1.png" alt="#drweb"&gt;
    &lt;/a&gt;
&lt;/p&gt;
&lt;p class="noMargT alignCenter"&gt;&lt;em&gt;Method that hijacks requests to the legitimate update server&lt;/em&gt;&lt;/p&gt;

&lt;p class="alignCenter"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2025/april/shibai/pic8.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2025/april/shibai/pic8.1.png" alt="#drweb"&gt;
    &lt;/a&gt;
&lt;/p&gt;
&lt;p class="noMargT alignCenter"&gt;&lt;em&gt;Class that swaps the legitimate update address with the fake one&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;searches for strings in received and sent messages that match the wallet address patterns for the Tron (34-character string starting with T) and Ethereum (42-character string starting with 0x) cryptocurrencies and replaces them with the attackers' addresses. The cybercriminals expanded the basic clipper functionality, and now the victim does not even suspect that something is wrong. In the case of an outgoing message, the compromised device displays the correct address of the victim's own wallet, while the recipient of the message is shown the address of the fraudsters' wallet. And when an incoming message is received, the sender sees the address of their own wallet; meanwhile, on the victim's device, the incoming address is replaced with the address of the hackers' wallet. The scammers change wallet addresses with each iteration of the campaign, but the trojan also contains backup addresses ("TN7pfenJ1ePpjoPFaeu46pxjT9rhYDqW66", "0x673dB7Ed16A13Aa137d39401a085892D5e1f0fCA") that can be used if for some reason communication cannot be established with the C2 server. In addition, the trojan sends all messages from all WhatsApp chats to the attacker's server;&lt;/li&gt;
&lt;/ul&gt;

&lt;p class="alignCenter"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2025/april/shibai/pic9.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2025/april/shibai/pic9.1.png" alt="#drweb"&gt;
    &lt;/a&gt;
&lt;/p&gt;
&lt;p class="noMargT alignCenter"&gt;&lt;em&gt;Parser that searches for strings matching Tron wallet addresses&lt;/em&gt;&lt;/p&gt;

&lt;p class="alignCenter"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2025/april/shibai/pic10.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2025/april/shibai/pic10.1.png" alt="#drweb"&gt;
    &lt;/a&gt;
&lt;/p&gt;
&lt;p class="noMargT alignCenter"&gt;&lt;em&gt;Parser that searches for strings matching Ethereum wallet addresses&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;searches for all .jpg, .png, and .jpeg images in the following folders and sends them to the attackers’ server&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="ScrollX"&gt;
  &lt;table class="Table"&gt;
    &lt;tr&gt;
      &lt;td&gt;DCIM&lt;/td&gt;
      &lt;td&gt;DOWNLOADS&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;PICTURES&lt;/td&gt;
      &lt;td&gt;DOCUMENTS&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;ALARMS&lt;/td&gt;
      &lt;td&gt;SCREENSHOTS&lt;/td&gt;
    &lt;/tr&gt;
  &lt;/table&gt;
&lt;/div&gt;

&lt;p&gt;This is done to find the so-called mnemonic (recovery) phrase for crypto wallets, which is a set of 12-24 words in a specific order. Such a phrase is displayed once when a wallet is created, and many users simply take a screenshot of it instead of writing it down or saving it to a separate medium. For legitimate purposes, such phrases allow the wallet to be accessed if the user forgets the password. For attackers, obtaining such data means the ability to instantly withdraw all the money from the cryptocurrency wallet.&lt;/p&gt;

&lt;p class="alignCenter"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2025/april/shibai/pic11.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2025/april/shibai/pic11.1.png" alt="#drweb"&gt;
    &lt;/a&gt;
&lt;/p&gt;
&lt;p class="noMargT alignCenter"&gt;&lt;em&gt;An example of a mnemonic phrase for recovering access to a cryptocurrency wallet. The user must enter these words in numerical order.&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;sends information about the device: the device manufacturer, model, language settings, and the name of the trojanized application. In total, the scammers modified about 40 different applications. These include the aforementioned WhatsApp and Telegram, as well as other messengers, QR code scanners, etc. But, most important, it was popular cryptocurrency wallet applications (MathWallet, Trust Wallet, and others) that were affected.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This trojan has been given the unique name Shibai in the Doctor Web virus database due to the string &lt;span class="string"&gt;Log.e("", "-------------------SHIBAI-释放------------")&lt;/span&gt; contained in its code. We assume that this is a reference to the name of another crypto coin.&lt;/p&gt;

&lt;p&gt;Unfortunately, this campaign has gained a great deal of momentum. The hackers employ more than 60 C2 servers to manage it and approximately 30 domains to distribute malicious applications. We were also able to obtain information about the financial gains made by the trojan’s creators. One of the wallets has received more than a million dollars over the last two years. Overall assets in another wallet amounted to half a million dollars. The rest of the wallets (about 20 of them) held amounts up to $100,000. It is impossible to get a complete picture of the profitability of this campaign, as the wallet addresses are obtained from the server of the attackers, and they may be different from time to time.&lt;/p&gt;

&lt;p class="alignCenter"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2025/april/shibai/pic12.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2025/april/shibai/pic12.1.png" alt="#drweb"&gt;
    &lt;/a&gt;
&lt;/p&gt;
&lt;p class="noMargT alignCenter"&gt;&lt;em&gt;One of the crypto wallets with the most assets&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;To protect yourself from such attacks, our virus analysts recommend installing Dr.Web Security Space antivirus for mobile devices, shunning smartphones with features that clearly do not match their price, downloading applications only from trusted sources, such as Google Play, RuStore and AppGallery, and not storing on their devices screenshots with mnemonic phrases, passwords, and keys in unencrypted form.&lt;/p&gt;

&lt;p&gt;Read more about &lt;a href="https://vms.drweb.com/search/?q=Tool.LSPatch.1&amp;lng=en"&gt;&lt;b&gt;Tool.LSPatch.1&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Read more about &lt;a href="https://vms.drweb.com/search/?q=Android.Clipper.31&amp;lng=en"&gt;&lt;b&gt;Android.Clipper.31&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://github.com/DoctorWebLtd/malware-iocs/blob/master/SHIBAI_campaign/Readme.adoc"&gt;Indicators of compromise&lt;/a&gt;&lt;/p&gt;
</description></item><item><guid>https://news.drweb.com/show/?i=14991&amp;lng=en</guid><title>Doctor Web’s Q1 2025 review of virus activity on mobile devices</title><link>https://news.drweb.com/show/?i=14991&amp;lng=en&amp;c=38</link><pubDate>Thu, 27 Mar 2025 00:00:00 GMT</pubDate><description>



&lt;p&gt;&lt;b&gt;March 27, 2025&lt;/b&gt;&lt;/p&gt;

&lt;section class="margTM margBM" id="main"&gt;
    &lt;p&gt;&lt;newslead&gt;According to detection statistics collected by Dr.Web Security Space for mobile devices, ad-displaying &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; trojans remained the most common Android malware. Moreover, they were detected on protected devices more than twice as often as in the fourth quarter of last year. Second place once again went to &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; malware, which cybercriminals use in various fraudulent schemes—their activity increased by almost 8%. Adware trojans from the &lt;a href="https://vms.drweb.com/search/?q=Android.MobiDash&amp;lng=en"&gt;&lt;b&gt;Android.MobiDash&lt;/b&gt;&lt;/a&gt; family ranked third; the number of their detections almost quintupled.&lt;/newslead&gt;&lt;/p&gt;
    &lt;p&gt;
        Similar dynamics were observed among many banking trojans. For instance, an increase was recorded in the number of attacks involving 
        &lt;a href="https://vms.drweb.com/search/?q=Android.BankBot&amp;lng=en"&gt;&lt;b&gt;Android.BankBot&lt;/b&gt;&lt;/a&gt; and &lt;a href="https://vms.drweb.com/search/?q=Android.Banker&amp;lng=en"&gt;&lt;b&gt;Android.Banker&lt;/b&gt;&lt;/a&gt; trojan family members—by 20.68% and 151.71%, respectively. At the same time, &lt;b&gt;Android.SpyMax&lt;/b&gt; 
        trojans, whose activity grew throughout almost all of 2024, were detected 41.94% less frequently than in the previous quarter.
    &lt;/p&gt;
    &lt;p&gt;
        Over the past 3 months, Doctor Web’s specialists discovered dozens of new threats on Google Play. Our virus laboratory’s findings in 
        this catalog included cryptocurrency-stealing malware and other trojans that display intrusive ads, along with the traditionally large 
        number of &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; trojans.
    &lt;/p&gt;
    &lt;div class="paddXM paddYM bg_ocean_1 white custom-color-link"&gt;
        &lt;h4 class="white alignCenter"&gt;PRINCIPAL TRENDS OF Q1 2025&lt;/h4&gt;
        &lt;ul&gt;
            &lt;li&gt;Increased activity on the part of adware trojans&lt;/li&gt;
            &lt;li&gt;Increased numbers of &lt;a href="https://vms.drweb.com/search/?q=Android.BankBot&amp;lng=en"&gt;&lt;b&gt;Android.BankBot&lt;/b&gt;&lt;/a&gt; and &lt;a href="https://vms.drweb.com/search/?q=Android.Banker&amp;lng=en"&gt;&lt;b&gt;Android.Banker&lt;/b&gt;&lt;/a&gt; banker malware attacks &lt;/li&gt;
            &lt;li&gt;Decreased activity on the part of &lt;b&gt;Android.SpyMax&lt;/b&gt; spyware trojans&lt;/li&gt;
            &lt;li&gt;The emergence of many new threats on Google Play&lt;/li&gt;
        &lt;/ul&gt;
    &lt;/div&gt;
&lt;/section&gt;

&lt;section class="margTM margBM" id="stat"&gt;
    &lt;h2 class="alignCenter"&gt;According to statistics collected by Dr.Web Security Space for mobile devices&lt;/h2&gt;
    &lt;div class="column_grid_review column_grid_review--o"&gt;
        &lt;a href="https://st.drweb.com/static/new-www/news/2025/april/review_mobile_q1/01_malware_q1_2025_en.png" class="preview"&gt;
          &lt;img src="https://st.drweb.com/static/new-www/news/2025/april/review_mobile_q1/01_malware_q1_2025_en.png" alt="Malware_Stat_Q1_2025"&gt;
        &lt;/a&gt;
    &lt;/div&gt;
    &lt;dl class="dlList"&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.657.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.655.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.4214&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;Trojan apps designed to display intrusive ads. Members of the &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; family are often distributed as popular and harmless applications. In some cases, other malware can install them in the system directory. When these infect Android devices, they typically conceal their presence from the user. For example, they “hide” their icons from the home screen menu.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1600&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;A trojan app that loads a website that is hardcoded into its settings. Known modifications of this malicious program load an online casino site.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.MobiDash&amp;lng=en"&gt;&lt;b&gt;Android.MobiDash&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7859&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;A trojan app that displays obnoxious ads. It is a special software module that developers incorporate into applications.&lt;/dd&gt;
    &lt;/dl&gt;
    &lt;div class="column_grid_review column_grid_review--o"&gt;
        &lt;a href="https://st.drweb.com/static/new-www/news/2025/april/review_mobile_q1/02_unwanted_q1_2025_en.png" class="preview"&gt;
          &lt;img src="https://st.drweb.com/static/new-www/news/2025/april/review_mobile_q1/02_unwanted_q1_2025_en.png" alt="Unwanted_Stat_Q1_2025"&gt;
        &lt;/a&gt;
    &lt;/div&gt;
    &lt;dl class="dlList"&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.FakeMoney&amp;lng=en"&gt;&lt;b&gt;Program.FakeMoney&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.11&lt;/b&gt;&lt;/dt&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.FakeMoney&amp;lng=en"&gt;&lt;b&gt;Program.FakeMoney&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.14&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for Android applications that allegedly allow users to earn money by completing different tasks. These apps make it look as if rewards are accruing for each one that is completed. At the same time, users are told that they have to accumulate a certain sum to withdraw their “earnings”. Typically, such apps have a list of popular payment systems and banks that supposedly could be used to withdraw the rewards. But even if users succeed in accumulating the needed amount, in reality they cannot get any real payments. This virus record is also used to detect other unwanted software based on the source code of such apps.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.FakeAntiVirus&amp;lng=en"&gt;&lt;b&gt;Program.FakeAntiVirus&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for adware programs that imitate anti-virus software. These apps inform users of nonexistent threats, mislead them, and demand that they purchase the software’s full version.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.CloudInject&amp;lng=en"&gt;&lt;b&gt;Program.CloudInject&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for Android programs that have been modified using the CloudInject cloud service and the eponymous Android utility (the latter was added to the Dr.Web virus database as &lt;a href="https://vms.drweb.com/search/?q=Tool.CloudInject&amp;lng=en"&gt;&lt;b&gt;Tool.CloudInject&lt;/b&gt;&lt;/a&gt;). Such programs are modified on a remote server; meanwhile, the modders (users) who are interested in such modifications cannot control exactly what will be added to the apps. Moreover, these programs receive a number of dangerous system permissions. Once modification is complete, users can remotely manage these apps. They can block them, display custom dialogs, and track when other software is being installed or removed from a device, etc.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.TrackView&amp;lng=en"&gt;&lt;b&gt;Program.TrackView&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for a program that allows users to be monitored via their Android devices. Malicious actors can utilize it to track a target device’s location, take photos and video with the camera, eavesdrop via the microphone, record audio, etc.&lt;/dd&gt;
    &lt;/dl&gt;
    &lt;div class="column_grid_review column_grid_review--o"&gt;
        &lt;a href="https://st.drweb.com/static/new-www/news/2025/april/review_mobile_q1/03_riskware_q1_2025_en.png" class="preview"&gt;
          &lt;img src="https://st.drweb.com/static/new-www/news/2025/april/review_mobile_q1/03_riskware_q1_2025_en.png" alt="Riskware_Stat_Q1_2025"&gt;
        &lt;/a&gt;
    &lt;/div&gt;
    &lt;dl class="dlList"&gt;
        &lt;dt&gt;&lt;b&gt;Tool.NPMod.1&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for Android programs that have been modified using the NP Manager utility. A special module is embedded in such apps, and it allows them to bypass digital signature verification once they have been modified.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.Androlua&amp;lng=en"&gt;&lt;b&gt;Tool.Androlua&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for some potentially dangerous versions of a specialized framework for developing Android software based on the Lua scripting language. The main logic of Lua-based apps resides in the corresponding scripts that are encrypted and decrypted by the interpreter upon execution. By default, this framework often requests access to a large number of system permissions in order to operate. As a result, the Lua scripts that it executes can potentially perform various malicious actions in accordance with the acquired permissions.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.14.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;A riskware platform that allows applications to launch APK files without installing them. It creates a virtual runtime environment in the context of the apps in which they are integrated. The APK files launched with the help of this platform can operate as if they are part of such programs and can also obtain the same permissions.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.LuckyPatcher&amp;lng=en"&gt;&lt;b&gt;Tool.LuckyPatcher&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;A tool that allows apps installed on Android devices to be modified (i.e., by creating patches for them) in order to change the logic of their work or to bypass certain restrictions. For instance, users can apply it to disable root-access verification in banking software or to obtain unlimited resources in games. To add patches, this utility downloads specially prepared scripts from the Internet, which can be crafted and added to the common database by any third party. The functionality of such scripts can prove to be malicious; thus, patches made with this tool can pose a potential threat.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.Packer&amp;lng=en"&gt;&lt;b&gt;Tool.Packer&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;A packer tool designed to protect Android applications from unauthorized modifications and reverse engineering. This tool is not malicious in itself, but it can be used to protect both harmless and malicious software.&lt;/dd&gt;
    &lt;/dl&gt;
    &lt;div class="column_grid_review column_grid_review--o"&gt;
        &lt;a href="https://st.drweb.com/static/new-www/news/2025/april/review_mobile_q1/04_adware_q1_2025_en.png" class="preview"&gt;
          &lt;img src="https://st.drweb.com/static/new-www/news/2025/april/review_mobile_q1/04_adware_q1_2025_en.png" alt="Adware_Stat_Q1_2025"&gt;
        &lt;/a&gt;
    &lt;/div&gt;
    &lt;dl class="dlList"&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.ModAd&amp;lng=en"&gt;&lt;b&gt;Adware.ModAd&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for some modified versions (mods) of the WhatsApp messenger, whose functions have been injected with a specific code. This code is responsible for loading target URLs by displaying web content (via the Android WebView component) when the messenger is in operation. Such web addresses perform redirects to advertised sites, including online casino, bookmaker, and adult sites.&lt;/dd&gt;
        &lt;dt&gt;&lt;b&gt;Adware.Basement.1&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;These are apps that display unwanted ads which often lead to malicious and fraudulent websites. They share a common code base with the &lt;a href="https://vms.drweb.com/search/?q=Program.FakeMoney&amp;lng=en"&gt;&lt;b&gt;Program.FakeMoney&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.11&lt;/b&gt; unwanted applications.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.AdPush&amp;lng=en"&gt;&lt;b&gt;Adware.AdPush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.Adpush&amp;lng=en"&gt;&lt;b&gt;Adware.Adpush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.21846&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;Adware modules that can be built into Android apps. They display notifications containing ads that mislead users. For example, such notifications can look like messages from the operating system. In addition, these modules collect a variety of confidential data and are able to download other apps and initiate their installation.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.Fictus&amp;lng=en"&gt;&lt;b&gt;Adware.Fictus&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;An adware module that malicious actors embed into the cloned versions of popular Android games and applications. Its incorporation is facilitated by a specialized net2share packer. Copies of software created this way are then distributed through various software catalogs. When installed on Android devices, such apps and games display obnoxious ads.&lt;/dd&gt;
    &lt;/dl&gt;
&lt;/section&gt;

&lt;section class="margTM margBM" id="gplay"&gt;
    &lt;h2 class="alignCenter"&gt;Threats on Google Play&lt;/h2&gt;
    &lt;p&gt;
        In Q1 2025, Doctor Web’s virus laboratory detected several dozen malicious programs. Among them were various modifications of the trojans 
        &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.4213&lt;/b&gt; and &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.4215&lt;/b&gt;, which conceal their presence on infected devices and 
        start displaying ads on top of other apps’ windows and the operating system UI. They masqueraded as software for taking photos and videos 
        with different effects, image-editing programs, an image collection app, and a women’s health diary.
    &lt;/p&gt;
    &lt;div class="flex fxCenter"&gt;
        &lt;div class="margRM"&gt;
              &lt;a href="https://st.drweb.com/static/new-www/news/2025/april/review_mobile_q1/05_Android.HiddenAds.4213_q1_2025.png" class="preview"&gt;
                  &lt;img src="https://st.drweb.com/static/new-www/news/2025/april/review_mobile_q1/05_Android.HiddenAds.4213_q1_2025.png" alt="Android.HiddenAds_Q1_2025" style="max-width: 350px;"&gt;
              &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
              &lt;a href="https://st.drweb.com/static/new-www/news/2025/april/review_mobile_q1/06_Android.HiddenAds.4215_q1_2025.png" class="preview"&gt;
                  &lt;img src="https://st.drweb.com/static/new-www/news/2025/april/review_mobile_q1/06_Android.HiddenAds.4215_q1_2025.png" alt="Android.HiddenAds_Q1_2025" style="max-width: 350px;"&gt;
              &lt;/a&gt;
        &lt;/div&gt;
    &lt;/div&gt;
    &lt;p class="noMargT alignCenter"&gt;&lt;em&gt;
        The &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; adware trojans concealed in the apps “Time Shift Cam” and “Fusion Collage Editor”
    &lt;/em&gt;&lt;/p&gt;
    &lt;p&gt;
        Our specialists also discovered &lt;a href="https://vms.drweb.com/search/?q=Android.CoinSteal&amp;lng=en"&gt;&lt;b&gt;Android.CoinSteal&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.202&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.CoinSteal&amp;lng=en"&gt;&lt;b&gt;Android.CoinSteal&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.203&lt;/b&gt;, and 
        &lt;a href="https://vms.drweb.com/search/?q=Android.CoinSteal&amp;lng=en"&gt;&lt;b&gt;Android.CoinSteal&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.206&lt;/b&gt;, malicious programs designed to steal cryptocurrency that are distributed under the guise 
        of official software from the Raydium and Aerodrome Finance blockchain platforms and the Dydx cryptocurrency exchange.
    &lt;/p&gt;
    &lt;div class="flex fxCenter"&gt;
        &lt;div class="margRM"&gt;
              &lt;a href="https://st.drweb.com/static/new-www/news/2025/april/review_mobile_q1/07_Android.CoinSteal.202_q1_2025.png" class="preview"&gt;
                  &lt;img src="https://st.drweb.com/static/new-www/news/2025/april/review_mobile_q1/07_Android.CoinSteal.202_q1_2025.png" alt="Android.CoinSteal_Q1_2025" style="max-width: 350px;"&gt;
              &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
              &lt;a href="https://st.drweb.com/static/new-www/news/2025/april/review_mobile_q1/08_Android.CoinSteal.203_q1_2025.png" class="preview"&gt;
                  &lt;img src="https://st.drweb.com/static/new-www/news/2025/april/review_mobile_q1/08_Android.CoinSteal.203_q1_2025.png" alt="Android.CoinSteal_Q1_2025" style="max-width: 350px;"&gt;
              &lt;/a&gt;
        &lt;/div&gt;
    &lt;/div&gt;
    &lt;p class="noMargT alignCenter"&gt;&lt;em&gt;
        The “Raydium” and “Dydx Exchange” programs are trojans that steal cryptocurrency
    &lt;/em&gt;&lt;/p&gt;
    &lt;p&gt;
        When launched, these malicious apps ask potential victims to enter a mnemonic phrase (the seed phrase)—supposedly to connect their crypto wallet. 
        But, in reality, the data that users provide is sent to threat actors. To further mislead users, forms for entering mnemonic phrases can be disguised 
        as requests from other crypto platforms. As shown in the example below, &lt;a href="https://vms.drweb.com/search/?q=Android.CoinSteal&amp;lng=en"&gt;&lt;b&gt;Android.CoinSteal&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.206&lt;/b&gt; 
        displayed a phishing form allegedly on behalf of the crypto exchange PancakeSwap.
    &lt;/p&gt;
    &lt;div class=" flex fxCenter"&gt;
        &lt;div class="margRM"&gt;
            &lt;a href="https://st.drweb.com/static/new-www/news/2025/april/review_mobile_q1/09_seed_q1_2025.png" class="preview"&gt;
              &lt;img src="https://st.drweb.com/static/new-www/news/2025/april/review_mobile_q1/09_seed_q1_2025.1.png" alt="PancakeSwap"&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
            &lt;a href="https://st.drweb.com/static/new-www/news/2025/april/review_mobile_q1/10_seed_q1_2025.png" class="preview"&gt;
              &lt;img src="https://st.drweb.com/static/new-www/news/2025/april/review_mobile_q1/10_seed_q1_2025.1.png" alt="PancakeSwap"&gt;
            &lt;/a&gt;
        &lt;/div&gt;
    &lt;/div&gt;
    &lt;p&gt;
        At the same time, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; fake programs were once again being distributed via Google Play. 
        Fraudsters passed off many of them as finance-related software, including teaching aids, instruments for accessing 
        investing services, and personal finance software. They loaded various phishing websites, including those used by threat actors to collect personal information.
    &lt;/p&gt;
    &lt;div class="flex fxCenter"&gt;
        &lt;div class="margRM"&gt;
              &lt;a href="https://st.drweb.com/static/new-www/news/2025/april/review_mobile_q1/11_Android.FakeApp.1803_q1_2025.png" class="preview"&gt;
                  &lt;img src="https://st.drweb.com/static/new-www/news/2025/april/review_mobile_q1/11_Android.FakeApp.1803_q1_2025.png" alt="Android.FakeApp_Q1_2025" style="max-width: 350px;"&gt;
              &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
              &lt;a href="https://st.drweb.com/static/new-www/news/2025/april/review_mobile_q1/12_Android.FakeApp.1777_q1_2025.png" class="preview"&gt;
                  &lt;img src="https://st.drweb.com/static/new-www/news/2025/april/review_mobile_q1/12_Android.FakeApp.1777_q1_2025.png" alt="Android.FakeApp_Q1_2025" style="max-width: 350px;"&gt;
              &lt;/a&gt;
        &lt;/div&gt;
    &lt;/div&gt;
    &lt;p class="noMargT alignCenter"&gt;&lt;em&gt;
        Examples of the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; trojan apps distributed under the guise of financial software: «Умные Деньги» (“Smart Money”) is &lt;b&gt;Android.FakeApp.1803&lt;/b&gt;, 
        and “Economic Union” is &lt;b&gt;Android.FakeApp.1777&lt;/b&gt;
    &lt;/em&gt;&lt;/p&gt;
    &lt;p&gt;
        Under certain conditions, other &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; trojans loaded bookmaker and online casino sites. Such malware variants were distributed as different games and other software, 
        like a speed-typing trainer and a drawing tutorial. Among them were new modifications of the 
        &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1669&lt;/b&gt; trojan.
    &lt;/p&gt;
    &lt;div class="flex fxCenter"&gt;
        &lt;div class="margRM"&gt;
              &lt;a href="https://st.drweb.com/static/new-www/news/2025/april/review_mobile_q1/13_Android.FakeApp.1669_q1_2025.png" class="preview"&gt;
                  &lt;img src="https://st.drweb.com/static/new-www/news/2025/april/review_mobile_q1/13_Android.FakeApp.1669_q1_2025.png" alt="Android.FakeApp_Q1_2025" style="max-width: 350px;"&gt;
              &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
              &lt;a href="https://st.drweb.com/static/new-www/news/2025/april/review_mobile_q1/14_Android.FakeApp.1669_q1_2025.png" class="preview"&gt;
                  &lt;img src="https://st.drweb.com/static/new-www/news/2025/april/review_mobile_q1/14_Android.FakeApp.1669_q1_2025.png" alt="Android.FakeApp_Q1_2025" style="max-width: 350px;"&gt;
              &lt;/a&gt;
        &lt;/div&gt;
    &lt;/div&gt;
    &lt;p class="noMargT alignCenter"&gt;&lt;em&gt;
        Examples of malicious fake apps that, instead of providing the declared functionality, could load online casino and bookmaker websites
    &lt;/em&gt;&lt;/p&gt;
    &lt;p&gt;
        To protect your Android device from malware and unwanted programs, we recommend installing Dr.Web anti-virus products for Android.
    &lt;/p&gt;
&lt;/section&gt;

&lt;a href="https://github.com/DoctorWebLtd/malware-iocs/blob/master/Q1%202025%20review%20of%20virus%20activity%20on%20mobile%20devices/README.adoc" target="_blank" rel="noopener noreferrer"&gt;Indicators of compromise&lt;/a&gt;

&lt;style&gt;
    .custom-color-link a {
        color: #73b320;
    }
&lt;/style&gt;

</description></item><item><guid>https://news.drweb.com/show/?i=14970&amp;lng=en</guid><title>Doctor Web’s review of virus activity on mobile devices in 2024</title><link>https://news.drweb.com/show/?i=14970&amp;lng=en&amp;c=38</link><pubDate>Thu, 30 Jan 2025 00:00:00 GMT</pubDate><description>


&lt;p&gt;&lt;b&gt;January 30, 2025&lt;/b&gt;&lt;/p&gt;

&lt;section class="margTM margBM" id="main"&gt;
    &lt;p&gt;&lt;newslead&gt;In 2024, ad-displaying trojans were once again the most widespread Android threats. Fraudulent software, ransom trojans, clickers, and banking trojans were more active than in the previous year. Among the latter, compared to 2023, the most common were simple banking trojans that steal only online bank account access data and SMS confirmation codes.&lt;/newslead&gt;&lt;/p&gt;
    &lt;p&gt;
        Among the most active unwanted software programs were apps offering users the opportunity to complete various tasks in exchange 
        for virtual rewards, which can supposedly be converted into real money. The most commonly detected riskware apps were tools that 
        allow Android programs to launch without being installed. And the most active adware programs were specially modified WhatsApp 
        messenger versions whose functions had been injected with code for loading adware URLs.
    &lt;/p&gt;
    &lt;p&gt;
        Over the course of last year, Doctor Web's malware analysts discovered hundreds of new threats on Google Play, with over 26.7 million 
        cumulative downloads. Among these were malicious programs, including a spyware trojan, and unwanted and adware apps.
    &lt;/p&gt;
    &lt;p&gt;
        Our experts also uncovered a new attack on Android-based TV box sets. Around 1.3 million devices were affected by a backdoor 
        that infected the system storage and, when commanded by attackers, could download and install third-party software.
    &lt;/p&gt;
    &lt;p&gt;
        In addition, Doctor Web’s virus analysts noted the growing popularity of a number of techniques aimed at making Android 
        malware more complicated to analyze and more difficult for antiviruses to detect. These techniques included various 
        manipulations with the ZIP archive format (the APK files of Android apps are based on the ZIP format), manipulations with 
        the apps’ configuration file 
        &lt;span class="string"&gt;AndroidManifest.xml&lt;/span&gt;,
        and others. These methods were most often found to be used in banking trojans.
    &lt;/p&gt;

    &lt;div class="paddXM paddYM bg_ocean_1 white custom-color-link"&gt;
        &lt;h4 class="white alignCenter"&gt;PRINCIPAL TRENDS IN 2024&lt;/h4&gt;
        &lt;ul&gt;
            &lt;li&gt;Ad-displaying malware remained the most widespread threat;&lt;/li&gt;
            &lt;li&gt;An increase in banking trojan activity;&lt;/li&gt;
            &lt;li&gt;
                Cybercriminals increasingly used simple &lt;a href="https://vms.drweb.com/search/?q=Android.Banker&amp;lng=en"&gt;&lt;b&gt;Android.Banker&lt;/b&gt;&lt;/a&gt; 
                banking trojans, which steal only login data for online bank accounts and also verification codes from SMS;
            &lt;/li&gt;
            &lt;li&gt;
                Threat actors increasingly resorted to manipulating the format of APK apps and their structural components 
                to avoid being detected by anti-viruses and to make it more difficult for their malware to be analyzed;
            &lt;/li&gt;
            &lt;li&gt;An increase in the number of &lt;a href="https://vms.drweb.com/search/?q=Android.Locker&amp;lng=en"&gt;&lt;b&gt;Android.Locker&lt;/b&gt;&lt;/a&gt; ransomware trojans and &lt;a href="https://vms.drweb.com/search/?q=Android.Click&amp;lng=en"&gt;&lt;b&gt;Android.Click&lt;/b&gt;&lt;/a&gt; trojan clickers;&lt;/li&gt;
            &lt;li&gt;The emergence of many new threats on Google Play.&lt;/li&gt;
        &lt;/ul&gt;
    &lt;/div&gt;
&lt;/section&gt;

&lt;section class="margTM margBM" id="events"&gt;
    &lt;h2 class="alignCenter"&gt;The most notable events of 2024&lt;/h2&gt;
    &lt;p&gt;
        Last May, Doctor Web’s experts 
        &lt;a href="https://news.drweb.com/show/?i=14860&amp;lng=en" target="_blank" rel="noopener noreferrer"&gt;informed&lt;/a&gt;
        users about the &lt;a href="https://vms.drweb.com/search/?q=Android.Click.414.origin&amp;lng=en"&gt;&lt;b&gt;Android.Click.414.origin&lt;/b&gt;&lt;/a&gt; trojan clicker, which was found in an app used to control sex toys 
        and in software for tracking physical activity. Both programs were distributed through Google Play and had more than 
        1.5 million installs combined. 
        &lt;a href="https://vms.drweb.com/search/?q=Android.Click.414.origin&amp;lng=en"&gt;&lt;b&gt;Android.Click.414.origin&lt;/b&gt;&lt;/a&gt; had a modular structure and used its components to execute certain tasks. 
        For example, the trojan covertly loaded advertising websites and performed various actions on them. It could 
        scroll webpages, enter text into forms, mute audio on webpages, and take screenshots of webpages to analyze 
        their contents and click on desired areas. In addition, &lt;a href="https://vms.drweb.com/search/?q=Android.Click.414.origin&amp;lng=en"&gt;&lt;b&gt;Android.Click.414.origin&lt;/b&gt;&lt;/a&gt; 
        sent detailed information about infected devices to its C&amp;C server. At the same time, the clicker did not 
        specifically attack certain users, and it did not start on devices where the interface language was set to Chinese.
    &lt;/p&gt;

    &lt;div class=" flex fxCenter"&gt;
        &lt;div class="margRM"&gt;
            &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/01_Android.Click.414.origin_2024_1.png" class="preview"&gt;
              &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/01_Android.Click.414.origin_2024_1.1.png" alt="Android.Click_2024"&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
            &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/01_Android.Click.414.origin_2024_2.png" class="preview"&gt;
              &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/01_Android.Click.414.origin_2024_2.1.png" alt="Android.Click_2024"&gt;
            &lt;/a&gt;
        &lt;/div&gt;
    &lt;/div&gt;
    &lt;p class="noMargT alignCenter"&gt;&lt;em&gt;Some versions of the Love Spouse and QRunning programs had the &lt;b&gt;Android.Click.414.origin&lt;/b&gt; trojan hidden in them&lt;/em&gt;&lt;/p&gt;

    &lt;p&gt;
        In September, our specialists revealed the details of their 
        &lt;a href="https://news.drweb.com/show/?i=14900&amp;lng=en" target="_blank" rel="noopener noreferrer"&gt;analysis&lt;/a&gt;
        regarding cases of Android TV box sets being infected with the &lt;a href="https://vms.drweb.com/search/?q=Android.Vo1d&amp;lng=en"&gt;&lt;b&gt;Android.Vo1d&lt;/b&gt;&lt;/a&gt; backdoor. 
        This modular malware affected nearly 1.3 million devices belonging to users in 197 countries. 
        It placed its components into the system storage area and could covertly download and install 
        third-party software when commanded by threat actors.
    &lt;/p&gt;

    &lt;div class="column_grid_review column_grid_review--o"&gt;
        &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/02_Android.Vo1d_map_en.png" class="preview"&gt;
          &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/02_Android.Vo1d_map_en.png" alt="Android.Void_2024"&gt;
        &lt;/a&gt;
    &lt;/div&gt;
    &lt;p class="noMargT alignCenter"&gt;&lt;em&gt;Countries found to have the highest number of TV boxes infected with the &lt;a href="https://vms.drweb.com/search/?q=Android.Vo1d&amp;lng=en"&gt;&lt;b&gt;Android.Vo1d&lt;/b&gt;&lt;/a&gt; backdoor&lt;/em&gt;&lt;/p&gt;

    &lt;p&gt;
        Already in November, our virus analysts used &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp.1669&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp.1669&lt;/b&gt;&lt;/a&gt; as an example 
        &lt;a href="https://news.drweb.com/show/?i=14935&amp;lng=en" target="_blank" rel="noopener noreferrer"&gt;to show&lt;/a&gt;
        how threat actors use the DNS protocol to covertly connect malware to C&amp;C servers. 
        &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp.1669&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp.1669&lt;/b&gt;&lt;/a&gt; is a rather primitive trojan whose only task is to load target websites. 
        It differs from most of the threats similar to it in that it receives the addresses of target sites from the 
        TXT record of a malicious DNS server. For this, it uses the modified code of an open source dnsjava library. 
        At the same time, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp.1669&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp.1669&lt;/b&gt;&lt;/a&gt; 
        manifests its malicious nature only when connected to the Internet through certain providers; in other cases it operates as harmless software.
    &lt;/p&gt;

    &lt;div class="column_grid_review column_grid_review--o"&gt;
        &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/03_Android.FakeApp.1669_c2_response.png" class="preview"&gt;
          &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/03_Android.FakeApp.1669_c2_response.png" alt="DNS_Trojan_2024"&gt;
        &lt;/a&gt;
    &lt;/div&gt;
    &lt;p class="noMargT alignCenter"&gt;&lt;em&gt;An example of a target domain’s TXT record. It was sent by the DNS server upon request via the Linux ‘dig’ tool while one of the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp.1669&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp.1669&lt;/b&gt;&lt;/a&gt; modifications was undergoing analysis&lt;/em&gt;&lt;/p&gt;
&lt;/section&gt;

&lt;section class="margTM margBM" id="stat"&gt;
    &lt;h2 class="alignCenter"&gt;Statistics&lt;/h2&gt;
    &lt;p&gt;
        According to detection statistics collected by Dr.Web Security Space for mobile devices, malicious programs were the threats most 
        commonly detected in 2024.They accounted for 74.67% of all registered detections. Adware programs, with a share of 10.96%, ranked 
        second. Riskware apps, which accounted for 10.55% of all detections, ranked third. The fourth most common threats were unwanted apps, 
        which users encountered in 3.82% of cases.
    &lt;/p&gt;

    &lt;div class="column_grid_review column_grid_review--o"&gt;
        &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/04_threat_share_2024_en.png" class="preview"&gt;
          &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/04_threat_share_2024_en.png" alt="Android_Danger_Stat_2024"&gt;
        &lt;/a&gt;
    &lt;/div&gt;
    
    &lt;h3&gt;Malicious programs&lt;/h3&gt;
    &lt;p&gt;
        Once again the malicious Android apps most commonly encountered were ad-displaying trojans from the &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; family. 
        Over the course of last year, their share of the total number of malware programs detected by the Dr.Web anti-virus increased by 0.34 pp. to 31.95% of all detections.
    &lt;/p&gt;

    &lt;div class="column_grid_review column_grid_review--o"&gt;
        &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/05_Android.HiddenAds_dynamics_2024_en.png" class="preview"&gt;
          &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/05_Android.HiddenAds_dynamics_2024_en.png" alt="Android.Hidden.Ads_2024"&gt;
        &lt;/a&gt;
    &lt;/div&gt;

    &lt;p&gt;
        In this malware family, the most active member was &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3956&lt;/b&gt;
        (15.10% of the detections for the entire family and 4.84% of all malware detected). This is one of many variants of 
        &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1994&lt;/b&gt; malware that users have been encountering for several years now. This particular version, 
        &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3956&lt;/b&gt;, emerged in 2023 along with other modifications. We 
        &lt;a href="https://news.drweb.com/show/review/?i=14846&amp;lng=en#stat" target="_blank" rel="noopener noreferrer"&gt;predicted&lt;/a&gt;
        that it could take a leading position in the family, which is what eventually happened. In 2024, its new variants also became widespread: 
        &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3980&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3989&lt;/b&gt;, 
        &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3994&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.655.origin&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.657.origin&lt;/b&gt;, and some others.
    &lt;/p&gt;
    &lt;p&gt;
        At the same time, our experts also noticed activity on the part of the &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds.Aegis&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds.Aegis&lt;/b&gt;&lt;/a&gt; subfamily. 
        Unlike most other &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; malware, members of this group have the ability to autorun and have some other
        &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds.Aegis&amp;lng=en" target="_blank" rel="noopener noreferrer"&gt;features&lt;/a&gt;. 
        Modifications like &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds.Aegis&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds.Aegis&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;, 
        &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds.Aegis&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds.Aegis&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.4.origin&lt;/b&gt;, 
        &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds.Aegis&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds.Aegis&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7.origin&lt;/b&gt;, and &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds.Aegis&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds.Aegis&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt; 
        were the ones most commonly detected on devices protected by Dr.Web anti-virus.
    &lt;/p&gt;
    &lt;p&gt;
        The second most widespread malicious programs were trojans from the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; 
        family, which cybercriminals use in various fraudulent schemes. Last year, they accounted for 
        18.28% of all malware detections, which is 16.45 pp. higher than the year before. Typically, 
        such trojans load unwanted websites designed for phishing attacks and online fraud.
    &lt;/p&gt;
    &lt;p&gt;
        &lt;a href="https://vms.drweb.com/search/?q=Android.Spy&amp;lng=en"&gt;&lt;b&gt;Android.Spy&lt;/b&gt;&lt;/a&gt; trojans, which have spyware functionality, ranked third with a share of 11.52%; 
        their share decreased by 16.7 pp., compared to 2023. As in the year before, the most common member of 
        this family was &lt;a href="https://vms.drweb.com/search/?q=Android.Spy.5106&amp;lng=en"&gt;&lt;b&gt;Android.Spy.5106&lt;/b&gt;&lt;/a&gt;. 
        It accounted for 5.95% of all detected malware.
    &lt;/p&gt;
    &lt;p&gt;
        In 2024, we observed a mixed trend in the distribution of malware that is designed to download and install other apps and capable 
        of executing arbitrary code. Compared to the previous year, the share of &lt;a href="https://vms.drweb.com/search/?q=Android.DownLoader&amp;lng=en"&gt;&lt;b&gt;Android.DownLoader&lt;/b&gt;&lt;/a&gt; downloader trojans decreased by 0.49 pp. 
        to 1.69%; the share of &lt;a href="https://vms.drweb.com/search/?q=Android.Mobifun&amp;lng=en"&gt;&lt;b&gt;Android.Mobifun&lt;/b&gt;&lt;/a&gt; trojans decreased by 0.15 pp. to 0.10%; and the share of &lt;a href="https://vms.drweb.com/search/?q=Android.Xiny&amp;lng=en"&gt;&lt;b&gt;Android.Xiny&lt;/b&gt;&lt;/a&gt; trojans decreased by 0.14 pp. to 0.13%. 
        At the same time, &lt;a href="https://vms.drweb.com/search/?q=Android.Triada&amp;lng=en"&gt;&lt;b&gt;Android.Triada&lt;/b&gt;&lt;/a&gt; and &lt;a href="https://vms.drweb.com/search/?q=Android.RemoteCode&amp;lng=en"&gt;&lt;b&gt;Android.RemoteCode&lt;/b&gt;&lt;/a&gt; trojans were detected more often. The number of detection cases for the former 
        increased by 0.6 pp. to 2.74%, and for the latter by 0.95 pp. to 3.78%.
    &lt;/p&gt;
    &lt;p&gt;
        The share of &lt;a href="https://vms.drweb.com/search/?q=Android.Packed&amp;lng=en"&gt;&lt;b&gt;Android.Packed&lt;/b&gt;&lt;/a&gt; malware protected by software packers decreased from 7.98% to 5.49%, nearly returning to the 2022 figure. 
        The number of attacks involving &lt;a href="https://vms.drweb.com/search/?q=Android.MobiDash&amp;lng=en"&gt;&lt;b&gt;Android.MobiDash&lt;/b&gt;&lt;/a&gt; adware trojans also decreased—from 10.06% to 5.38%. At the same time, the number of &lt;a href="https://vms.drweb.com/search/?q=Android.Locker&amp;lng=en"&gt;&lt;b&gt;Android.Locker&lt;/b&gt;&lt;/a&gt; 
        ransomware and &lt;a href="https://vms.drweb.com/search/?q=Android.Proxy&amp;lng=en"&gt;&lt;b&gt;Android.Proxy&lt;/b&gt;&lt;/a&gt; trojan detections increased slightly—from 1.15% to 1.60% and from 0.57% to 0.81%, respectively. 
        &lt;a href="https://vms.drweb.com/search/?q=Android.Proxy&amp;lng=en"&gt;&lt;b&gt;Android.Proxy&lt;/b&gt;&lt;/a&gt; trojans allow threat actors using infected Android devices to redirect their network traffic through them. In addition, the activity of 
        &lt;a href="https://vms.drweb.com/search/?q=Android.Click&amp;lng=en"&gt;&lt;b&gt;Android.Click&lt;/b&gt;&lt;/a&gt; malicious programs increased significantly, from 0.82% to 3.56%. These trojans can open advertising websites and perform clicks on webpages.
    &lt;/p&gt;
    &lt;p&gt;The ten most commonly detected malicious programs in 2024:&lt;/p&gt;

    &lt;div class="column_grid_review column_grid_review--o"&gt;
        &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/06_top_malware_2024_en.png" class="preview"&gt;
          &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/06_top_malware_2024_en.png" alt="Most_Common_Malware_2024"&gt;
        &lt;/a&gt;
    &lt;/div&gt;

    &lt;dl class="dlList"&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1600&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;A trojan app that loads a website that is hardcoded into its settings. Known modifications of this malicious program load an online casino site.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.Spy.5106&amp;lng=en"&gt;&lt;b&gt;Android.Spy.5106&lt;/b&gt;&lt;/a&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for a trojan that presents itself as modified versions of unofficial WhatsApp messenger mods. This malicious program can steal the contents of notifications and offer users other apps from unknown sources for installation. And when such a modified messenger is used, it can also display dialog boxes containing remotely configurable content.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3956&lt;/b&gt;&lt;/dt&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3851&lt;/b&gt;&lt;/dt&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.655.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3994&lt;/b&gt;&lt;/dt&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.657.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;Trojan apps designed to display intrusive ads. Members of the &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; family are often distributed as popular and harmless applications. In some cases, other malware can install them in the system directory. When these infect Android devices, they typically conceal their presence from the user. For example, they “hide” their icons from the home screen menu.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.Click.1751&amp;lng=en"&gt;&lt;b&gt;Android.Click.1751&lt;/b&gt;&lt;/a&gt;&lt;/dt&gt;
        &lt;dd&gt;This trojan is built into third-party WhatsApp messenger mods and camouflaged as Google library classes. While the host application is being used, &lt;a href="https://vms.drweb.com/search/?q=Android.Click.1751&amp;lng=en"&gt;&lt;b&gt;Android.Click.1751&lt;/b&gt;&lt;/a&gt; connects to one of the C&amp;C servers and receives two URLs from it. One of them is intended for Russian-speaking users, and the other is for everyone else. The trojan then displays a dialog box whose contents it has also received from a remote server. When a user clicks on the confirmation button, malware loads the corresponding link in the browser.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds.Aegis&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds.Aegis&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;A trojan app that conceals its presence on Android devices and displays intrusive ads. It has a number of characteristics that differentiate it from other members of the &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; family. For example, this trojan can run automatically after its installation. Moreover, it implements a mechanism that allows its service to remain constantly running. And, in some cases, it can also use hidden Android operating system functions.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.MobiDash&amp;lng=en"&gt;&lt;b&gt;Android.MobiDash&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7815&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;A trojan app that displays obnoxious ads. It is a special software module that developers incorporate into applications.&lt;/dd&gt;
    &lt;/dl&gt;

    &lt;h3&gt;Unwanted software&lt;/h3&gt;
    &lt;p&gt;
        The unwanted program most commonly detected in 2024 was &lt;a href="https://vms.drweb.com/search/?q=Program.FakeMoney&amp;lng=en"&gt;&lt;b&gt;Program.FakeMoney&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.11&lt;/b&gt;. It accounted for more than half (52.10%) of the total number 
        of unwanted software detected on protected devices. It belongs to a class of apps that offer users a chance to make money by completing various tasks but ultimately 
        do not provide any real rewards.
    &lt;/p&gt;
    &lt;p&gt;
        Programs that Dr.Web anti-virus detects as &lt;a href="https://vms.drweb.com/search/?q=Program.CloudInject&amp;lng=en"&gt;&lt;b&gt;Program.CloudInject&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt; ranked second, with a share of 19.21% (up 9.75 pp. from the previous year). 
        Such apps are modified through the CloudInject cloud service. When modified, they have dangerous permissions and an obfuscated code added to them, and the purpose 
        of that code cannot be controlled.
    &lt;/p&gt;
    &lt;p&gt;
        &lt;a href="https://vms.drweb.com/search/?q=Program.FakeAntiVirus&amp;lng=en"&gt;&lt;b&gt;Program.FakeAntiVirus&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt; program activity declined for the second year in a row. With a share of 10.07%, which is down 9.35 pp. 
        from 2023, these programs became the third most widespread unwanted software. They imitate anti-virus software, detect nonexistent threats, and 
        ask users to buy full versions to “fix” the issues that have allegedly been found.
    &lt;/p&gt;
    &lt;p&gt;
        Over the course of last year, users encountered a variety of programs for monitoring and controlling activity. Such software can be used to collect data, 
        both with the consent of device owners and without their knowledge. In the latter case, these actually turn into spying tools. The following monitoring 
        programs were most often detected on devices protected by Dr.Web anti-virus: 
        &lt;a href="https://vms.drweb.com/search/?q=Program.TrackView&amp;lng=en"&gt;&lt;b&gt;Program.TrackView&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt; (2.40% of cases), &lt;a href="https://vms.drweb.com/search/?q=Program.SecretVideoRecorder&amp;lng=en"&gt;&lt;b&gt;Program.SecretVideoRecorder&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt; (2.03% of cases), 
        &lt;a href="https://vms.drweb.com/search/?q=Program.wSpy&amp;lng=en"&gt;&lt;b&gt;Program.wSpy&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3.origin&lt;/b&gt; (0.98% of cases), &lt;a href="https://vms.drweb.com/search/?q=Program.SecretVideoRecorder&amp;lng=en"&gt;&lt;b&gt;Program.SecretVideoRecorder&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.2.origin&lt;/b&gt; (0.90% of cases), 
        &lt;a href="https://vms.drweb.com/search/?q=Program.Reptilicus&amp;lng=en"&gt;&lt;b&gt;Program.Reptilicus&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.8.origin&lt;/b&gt; (0.64% of cases), &lt;a href="https://vms.drweb.com/search/?q=Program.wSpy&amp;lng=en"&gt;&lt;b&gt;Program.wSpy&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt; (0.39% of cases), and &lt;a href="https://vms.drweb.com/search/?q=Program.MonitorMinor&amp;lng=en"&gt;&lt;b&gt;Program.MonitorMinor&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.11&lt;/b&gt; (0.38% of cases).
    &lt;/p&gt;
    &lt;p&gt;
        Additionally, &lt;a href="https://vms.drweb.com/search/?q=Program.Opensite&amp;lng=en"&gt;&lt;b&gt;Program.Opensite&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.2.origin&lt;/b&gt; Android programs, with a share of 0.60% of all the unwanted software detected, were also spotted. 
        These programs are designed to load target websites and display ads.
    &lt;/p&gt;
    &lt;p&gt;The ten unwanted programs most commonly detected in 2024:&lt;/p&gt;

    &lt;div class="column_grid_review column_grid_review--o"&gt;
        &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/07_top_unwanted_2024_en.png" class="preview"&gt;
          &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/07_top_unwanted_2024_en.png" alt="Most_Common_Unwanted_2024"&gt;
        &lt;/a&gt;
    &lt;/div&gt;

    &lt;dl class="dlList"&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.FakeMoney&amp;lng=en"&gt;&lt;b&gt;Program.FakeMoney&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.11&lt;/b&gt;&lt;/dt&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.FakeMoney&amp;lng=en"&gt;&lt;b&gt;Program.FakeMoney&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for Android applications that allegedly allow users to earn money by completing different tasks. These apps make it look as if rewards are accruing for each one that is completed. At the same time, users are told that they have to accumulate a certain sum to withdraw their “earnings”. Typically, such apps have a list of popular payment systems and banks that supposedly could be used to withdraw the rewards. But even if users succeed in accumulating the needed amount, in reality they cannot get any real payments. This virus record is also used to detect other unwanted software based on the source code of such apps.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.CloudInject&amp;lng=en"&gt;&lt;b&gt;Program.CloudInject&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for Android programs that have been modified using the CloudInject cloud service and the eponymous Android utility (the latter was added to the Dr.Web virus database as &lt;a href="https://vms.drweb.com/search/?q=Tool.CloudInject&amp;lng=en"&gt;&lt;b&gt;Tool.CloudInject&lt;/b&gt;&lt;/a&gt;). Such programs are modified on a remote server; meanwhile, the modders (users) who are interested in such modifications cannot control exactly what will be added to the apps. Moreover, these programs receive a number of dangerous system permissions. Once modification is complete, users can remotely manage these apps. They can block them, display custom dialogs, and track when other software is being installed or removed from a device, etc.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.FakeAntiVirus&amp;lng=en"&gt;&lt;b&gt;Program.FakeAntiVirus&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for adware programs that imitate anti-virus software. These apps inform users of nonexistent threats, mislead them, and demand that they purchase the software’s full version.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.TrackView&amp;lng=en"&gt;&lt;b&gt;Program.TrackView&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for a program that allows users to be monitored via their Android devices. Malicious actors can utilize it to track a target device’s location, use the camera to record video and take photos, eavesdrop via the microphone, record audio, etc.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.SecretVideoRecorder&amp;lng=en"&gt;&lt;b&gt;Program.SecretVideoRecorder&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.SecretVideoRecorder&amp;lng=en"&gt;&lt;b&gt;Program.SecretVideoRecorder&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.2.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for various modifications of an application that is designed to record videos and take photos in the background, using built-in Android device cameras. It can operate covertly by allowing notifications about ongoing recordings to be disabled. It also allows an app’s icon and name to be replaced with fake ones. This functionality makes this software potentially dangerous.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.wSpy&amp;lng=en"&gt;&lt;b&gt;Program.wSpy&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;This is a commercial spyware app designed to covertly monitor Android device user activity. It allows intruders to read SMS and chats in popular messaging software, listen to the surroundings, track device location and browser history, gain access to the phonebook and contacts, photos and videos, and take screenshots and pictures through a device’s built-in camera. In addition, it has keylogger functionality.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.Reptilicus&amp;lng=en"&gt;&lt;b&gt;Program.Reptilicus&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.8.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;An application that allows Android device users to be monitored. It can track device location, collect information from SMS and social media messages, intercept phone calls and record the surroundings, take screenshots, act as a keylogger, copy files from a target device and perform other actions.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.Opensite&amp;lng=en"&gt;&lt;b&gt;Program.Opensite&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.2.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for single-type Android programs whose function is to load target websites and display ads. Such apps often masquerade as other software. For instance, there exist modifications that are distributed under the guise of YouTube player. They load a genuine YouTube website and display advertisement banners, using the advertising SDKs connected to them.&lt;/dd&gt;
    &lt;/dl&gt;

    &lt;h3&gt;Riskware&lt;/h3&gt;
    &lt;p&gt;
        In 2024, &lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt; utilities, which allow Android programs to launch without being installed, retained their leading 
        positions in terms of riskware software detection numbers. In total, they accounted for more than a third of all apps of this type identified 
        on protected devices. Modifications like &lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.17.origin&lt;/b&gt; (16.17%), &lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.14.origin&lt;/b&gt; (9.80%), 
        &lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7.origin&lt;/b&gt; (3.25%), and &lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.6.origin&lt;/b&gt; (2.99%) were most often detected.
    &lt;/p&gt;
    &lt;p&gt;
        Other common riskware apps were programs modified using the NP Manager utility. This tool embeds a special module into the target software, which allows the digital 
        signature verification process to be bypassed once the apps have been modified. Dr.Web anti-virus detects such programs as different variants of the &lt;b&gt;Tool.NPMod&lt;/b&gt; family. 
        Of these, &lt;b&gt;Tool.NPMod.1&lt;/b&gt; variants were most commonly detected. Over the course of 2024, they significantly strengthened their position, accounting for 16.49% of all riskware 
        detections, up 11.68 pp. from 2023. At the same time, the share of programs modified using the NP Manager tool and detected with another virus record, 
        &lt;b&gt;Tool.NPMod.2&lt;/b&gt;, was 7.92%. As a result, members of this family were responsible for almost a quarter of potentially dangerous software detections.
    &lt;/p&gt;
    &lt;p&gt;
        Programs protected by the &lt;a href="https://vms.drweb.com/search/?q=Tool.Packer&amp;lng=en"&gt;&lt;b&gt;Tool.Packer&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt; packer were also among the leaders. They were detected in 13.17% of cases, up 12.38 pp. 
        from the year before. Moreover, the number of &lt;a href="https://vms.drweb.com/search/?q=Tool.Androlua&amp;lng=en"&gt;&lt;b&gt;Tool.Androlua&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt; detections increased from 3.10% to 3.93%. This is a framework that 
        makes it possible to modify Android apps and run Lua scripts that can potentially be malicious.
    &lt;/p&gt;
    &lt;p&gt;
        At the same time, one 2023 leader, the &lt;a href="https://vms.drweb.com/search/?q=Tool.LuckyPatcher&amp;lng=en"&gt;&lt;b&gt;Tool.LuckyPatcher&lt;/b&gt;&lt;/a&gt; family of utilities, was, on the contrary, less active—down from 14.02% to 8.16%. 
        These tools allow Android programs to be modified and scripts downloaded from the Internet to be added to them. Also less frequently encountered were 
        programs protected by the obfuscating utility &lt;a href="https://vms.drweb.com/search/?q=Tool.Obfuscapk&amp;lng=en"&gt;&lt;b&gt;Tool.Obfuscapk&lt;/b&gt;&lt;/a&gt; (down from 3.22% to 1.05%) and by the packer &lt;a href="https://vms.drweb.com/search/?q=Tool.ApkProtector&amp;lng=en"&gt;&lt;b&gt;Tool.ApkProtector&lt;/b&gt;&lt;/a&gt; 
        (down from 10.14% to 3.39%).
    &lt;/p&gt;
    &lt;p&gt;The ten most widespread riskware apps detected on protected Android devices in 2024:&lt;/p&gt;

    &lt;div class="column_grid_review column_grid_review--o"&gt;
        &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/08_top_riskware_2024_en.png" class="preview"&gt;
          &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/08_top_riskware_2024_en.png" alt="Most_Common_Riskware_2024"&gt;
        &lt;/a&gt;
    &lt;/div&gt;

    &lt;dl class="dlList"&gt;
        &lt;dt&gt;&lt;b&gt;Tool.NPMod.1&lt;/b&gt;&lt;/dt&gt;
        &lt;dt&gt;&lt;b&gt;Tool.NPMod.2&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for Android programs that have been modified using the NP Manager utility. A special module is embedded in such apps, and it allows them to bypass digital signature verification once they have been modified.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.17.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.14.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.6.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;Riskware platforms that allow applications to launch APK files without installing them. They create a virtual runtime environment in the context of the apps in which they are integrated. The APK files, launched with the help of these platforms, can operate as if they are part of such programs and can also obtain the same permissions.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.Packer&amp;lng=en"&gt;&lt;b&gt;Tool.Packer&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;A packer tool designed to protect Android applications from unauthorized modification and reverse engineering. This tool is not malicious in itself, but it can be used to protect both harmless and malicious software.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.LuckyPatcher&amp;lng=en"&gt;&lt;b&gt;Tool.LuckyPatcher&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;A tool that allows apps installed on Android devices to be modified (i.e., by creating patches for them) in order to change the logic of their work or to bypass certain restrictions. For instance, users can apply it to disable root-access verification in banking software or to obtain unlimited resources in games. To add patches, this utility downloads from the Internet specially prepared scripts, which can be crafted and added to the common database by any third party. The functionality of such scripts can prove to be malicious; thus, patches made with this tool can pose a potential threat.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.Androlua&amp;lng=en"&gt;&lt;b&gt;Tool.Androlua&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for some potentially dangerous versions of a specialized framework for developing Android software in the Lua scripting language. The main logic of Lua-based apps resides in the corresponding scripts that are encrypted and decrypted by the interpreter upon execution. By default, this framework often requests access to a large number of system permissions in order to operate. As a result, the Lua scripts that it executes can potentially perform various malicious actions in accordance with the acquired permissions.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.Packer&amp;lng=en"&gt;&lt;b&gt;Tool.Packer&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for Android programs whose code is encoded and obfuscated by the NP Manager tool.&lt;/dd&gt;
    &lt;/dl&gt;

    &lt;h3&gt;Adware&lt;/h3&gt;
    &lt;p&gt;
        The most common adware in 2024 was the new &lt;a href="https://vms.drweb.com/search/?q=Adware.ModAd&amp;lng=en"&gt;&lt;b&gt;Adware.ModAd&lt;/b&gt;&lt;/a&gt; family, which accounted for 47.45% of detections. 
        The previous year’s leaders, members of the &lt;a href="https://vms.drweb.com/search/?q=Adware.Adpush&amp;lng=en"&gt;&lt;b&gt;Adware.Adpush&lt;/b&gt;&lt;/a&gt; family, dropped to second place with a share of 14.76% 
        (a 21.06 pp. decrease in the number of detections). Third place, with a share of 8.68%, was occupied by another new adware family, &lt;b&gt;Adware.Basement&lt;/b&gt;.
    &lt;/p&gt;
    &lt;p&gt;
        Also commonly encountered were families like &lt;a href="https://vms.drweb.com/search/?q=Adware.Airpush&amp;lng=en"&gt;&lt;b&gt;Adware.Airpush&lt;/b&gt;&lt;/a&gt; (their share decreased from 8.59% to 4.35%), &lt;a href="https://vms.drweb.com/search/?q=Adware.Fictus&amp;lng=en"&gt;&lt;b&gt;Adware.Fictus&lt;/b&gt;&lt;/a&gt; (down from 4.41% to 3.29%), 
        &lt;a href="https://vms.drweb.com/search/?q=Adware.Leadbolt&amp;lng=en"&gt;&lt;b&gt;Adware.Leadbolt&lt;/b&gt;&lt;/a&gt; (down from 4.37% to 2.26%), and &lt;a href="https://vms.drweb.com/search/?q=Adware.ShareInstall&amp;lng=en"&gt;&lt;b&gt;Adware.ShareInstall&lt;/b&gt;&lt;/a&gt; (down from 5.04% to 1.71%). Unwanted ad-displaying &lt;a href="https://vms.drweb.com/search/?q=Adware.MagicPush&amp;lng=en"&gt;&lt;b&gt;Adware.MagicPush&lt;/b&gt;&lt;/a&gt; 
        programs, which ranked second in 2023, significantly curtailed their activity and did not even make it into the top 10; they moved straight to eleventh place with a share 
        of 1.19% (a 8.39 pp. decrease).
    &lt;/p&gt;
    &lt;p&gt;The ten most widespread adware apps detected on protected Android devices in 2024:&lt;/p&gt;

    &lt;div class="column_grid_review column_grid_review--o"&gt;
        &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/09_top_adware_2024_en.png" class="preview"&gt;
          &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/09_top_adware_2024_en.png" alt="Most_Common_Adware_2024"&gt;
        &lt;/a&gt;
    &lt;/div&gt;

    &lt;dl class="dlList"&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.ModAd&amp;lng=en"&gt;&lt;b&gt;Adware.ModAd&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for some modified versions (mods) of the WhatsApp messenger, whose functions have been injected with a specific code. This code is responsible for loading target URLs by displaying web content (via the Android WebView component) when the messenger is in operation. Such web addresses perform redirects to advertised sites, including online casino, bookmaker, and adult sites.&lt;/dd&gt;
        &lt;dt&gt;&lt;b&gt;Adware.Basement.1&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;These are apps that display unwanted ads which often lead to malicious and fraudulent websites. They share a common code base with the &lt;a href="https://vms.drweb.com/search/?q=Program.FakeMoney&amp;lng=en"&gt;&lt;b&gt;Program.FakeMoney&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.11&lt;/b&gt; unwanted applications.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.Fictus&amp;lng=en"&gt;&lt;b&gt;Adware.Fictus&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.Fictus&amp;lng=en"&gt;&lt;b&gt;Adware.Fictus&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;An adware module that malicious actors embed into cloned versions of popular Android games and applications. Its incorporation is facilitated by a specialized net2share packer. Copies of software created this way are then distributed through various software catalogs. When installed on Android devices, such apps and games display obnoxious ads.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.Adpush&amp;lng=en"&gt;&lt;b&gt;Adware.Adpush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.21846&lt;/b&gt;&lt;/dt&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.AdPush&amp;lng=en"&gt;&lt;b&gt;Adware.AdPush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.39.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;Adware modules that can be built into Android apps. They display notifications containing ads that mislead users. For example, such notifications can look like messages from the operating system. In addition, these modules collect a variety of confidential data and are able to download other apps and initiate their installation.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.Airpush&amp;lng=en"&gt;&lt;b&gt;Adware.Airpush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;Adware modules that can be built into Android apps and display various ads. Depending on the modules’ version and modification, these can be notifications containing ads, pop-up windows or banners. Malicious actors often use these modules to distribute malware by offering their potential victims diverse software for installation. Moreover, such modules collect personal information and send it to a remote server.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.ShareInstall&amp;lng=en"&gt;&lt;b&gt;Adware.ShareInstall&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;An adware module that can be built into Android applications. It displays notifications containing ads on the Android OS lock screen.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.Youmi&amp;lng=en"&gt;&lt;b&gt;Adware.Youmi&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.4&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for an unwanted adware module that adds advertizing shortcuts onto the Android OS home screen.&lt;/dd&gt;
        &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.Inmobi&amp;lng=en"&gt;&lt;b&gt;Adware.Inmobi&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
        &lt;dd&gt;The detection name for some versions of the Inmobi adware SDK. These are capable of making phone calls and adding event entries into an Android device’s calendar.&lt;/dd&gt;
    &lt;/dl&gt;
&lt;/section&gt;

&lt;section class="margTM margBM" id="gplay"&gt;
    &lt;h2 class="alignCenter"&gt;Threats on Google Play&lt;/h2&gt;
    &lt;p&gt;
        In 2024, Doctor Web’s virus analysts discovered over 200 threats with more than 26.7 million combined downloads. 
        In addition to &lt;a href="https://vms.drweb.com/search/?q=Android.Click.414.origin&amp;lng=en"&gt;&lt;b&gt;Android.Click.414.origin&lt;/b&gt;&lt;/a&gt;, these included many other threats, such as ad-displaying &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; 
        trojans. They were distributed under the guise of all kinds of software: image-editing programs, QR code scanners, image collection apps, 
        and even an “anti-theft” alarm for protecting smartphones from falling into the wrong hands. Such trojans conceal their icons after 
        installation and proceed to display aggressive ads that overlap the interface of the operating system and other programs and prevent the 
        device from being used normally.
    &lt;/p&gt;

    &lt;div class="flex fxCenter"&gt;
        &lt;div class="margRM"&gt;
              &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/10_Android.HiddenAds.4013_2024.png" class="preview"&gt;
                  &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/10_Android.HiddenAds.4013_2024.png" alt="Android.HiddenAds_2024" style="max-width: 350px;"&gt;
              &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
              &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/11_Android.HiddenAds.4034_2024.png" class="preview"&gt;
                  &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/11_Android.HiddenAds.4034_2024.png" alt="Android.HiddenAds_2024" style="max-width: 350px;"&gt;
              &lt;/a&gt;
        &lt;/div&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
        &lt;div class="margRM"&gt;
            &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/12_Android.HiddenAds.4025_2024.png" class="preview"&gt;
                  &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/12_Android.HiddenAds.4025_2024.png" alt="Android.HiddenAds_2024" style="max-width: 350px;"&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
            &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/13_Android.HiddenAds.656.origin_2024.png" class="preview"&gt;
                  &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/13_Android.HiddenAds.656.origin_2024.png" alt="Android.HiddenAds_2024" style="max-width: 350px;"&gt;
            &lt;/a&gt;
        &lt;/div&gt;
    &lt;/div&gt;
    &lt;p class="noMargT alignCenter"&gt;&lt;em&gt;
        Examples of adware trojans discovered on Google Play in 2024. &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.4013&lt;/b&gt; was hiding in the photo editor “Cool Fix Photo Enhancer”, 
        &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.4034&lt;/b&gt; was in the  “Cool Darkness Wallpaper” image-collection app, &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.4025&lt;/b&gt; was in the QR scanning program “QR Code Assistant”, and 
        &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.656.origin&lt;/b&gt; was in the “anti-theft” alarm program “Warning Sound GBD”
    &lt;/em&gt;&lt;/p&gt;

    &lt;p&gt;
        Our experts also discovered various trojans that threat actors were protecting with a complicated software packer.
    &lt;/p&gt;

    &lt;div class="flex fxCenter"&gt;
        &lt;div class="margRM"&gt;
            &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/14_Android.Packed.57156_2024.0.png" class="preview"&gt;
                  &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/14_Android.Packed.57156_2024.1.png" alt="Android.Packed_2024"&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
            &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/15_Android.Packed.57159_2024.0.png" class="preview"&gt;
                  &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/15_Android.Packed.57159_2024.1.png" alt="Android.Packed_2024"&gt;
            &lt;/a&gt;
        &lt;/div&gt;
    &lt;/div&gt;
    &lt;p class="noMargT alignCenter"&gt;&lt;em&gt;
        The “Lie Detector Fun Prank” program was the &lt;a href="https://vms.drweb.com/search/?q=Android.Packed&amp;lng=en"&gt;&lt;b&gt;Android.Packed&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.57156&lt;/b&gt; 
        trojan, and the “Speaker Dust and Water Cleaner” app was the &lt;a href="https://vms.drweb.com/search/?q=Android.Packed&amp;lng=en"&gt;&lt;b&gt;Android.Packed&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.57159&lt;/b&gt; trojan; both were protected with a software packer
    &lt;/em&gt;&lt;/p&gt;

    &lt;p&gt;
        Other malware we found were members of the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; family, which are used in various fraudulent schemes. The main task of most of 
        these trojans is to open a target URL, while some of them, under certain conditions, can also operate as the software they are disguised as. Many of 
        them were distributed as different apps, including financial programs, like teaching aids and reference books, profit calculators, apps for accessing 
        trading, and instruments for home bookkeeping. Others were disguised as notepads and diaries, software for participating in quiz games, surveys, etc. 
        They also loaded fraudulent investment sites.
    &lt;/p&gt;

    &lt;div class="flex fxCenter"&gt;
        &lt;div class="margRM"&gt;
            &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/16_Android.FakeApp.1674_2024.png" class="preview"&gt;
                  &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/16_Android.FakeApp.1674_2024.1.png" alt="Android.FakeApp_2024"&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
            &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/17_Android.FakeApp.1708_2024.png" class="preview"&gt;
                  &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/17_Android.FakeApp.1708_2024.1.png" alt="Android.FakeApp_2024"&gt;
            &lt;/a&gt;
        &lt;/div&gt;
    &lt;/div&gt;
    &lt;p class="noMargT alignCenter"&gt;&lt;em&gt;
        Examples of &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; 
        trojans that opened links to fraudulent websites: &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1681&lt;/b&gt; (disguised as the “SenseStrategy” app), &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1708&lt;/b&gt; 
        (disguised as the “QuntFinanzas” app)
    &lt;/em&gt;&lt;/p&gt;

    &lt;p&gt;
        Some &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; fake programs were distributed as a variety of games. Many of them could actually provide the declared functionality, 
        but their main task was to load online casino and bookmaker sites.
    &lt;/p&gt;

    &lt;div class="flex fxCenter"&gt;
        &lt;div class="margRM"&gt;
            &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/18_Android.FakeApp.1622_2024.png" class="preview"&gt;
                  &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/18_Android.FakeApp.1622_2024.1.png" alt="Android.FakeApp_2024"&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
            &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/19_Android.FakeApp.1630_2024.png" class="preview"&gt;
                  &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/19_Android.FakeApp.1630_2024.1.png" alt="Android.FakeApp_2024"&gt;
            &lt;/a&gt;
        &lt;/div&gt;
    &lt;/div&gt;
    &lt;p class="noMargT alignCenter"&gt;&lt;em&gt;
        Examples of &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; trojans that were disguised as games and loaded bookmaker and online casino websites: 
        &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1622&lt;/b&gt; (“3D Card Merge Game”) and &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1630&lt;/b&gt; (“Crazy Lucky Candy”)
    &lt;/em&gt;&lt;/p&gt;

    &lt;p&gt;
        Some trojans from this family were once again camouflaged as job-search programs. Such scam apps load fake vacancy listings and offer 
        users the opportunity to create a resume by providing personal information. In other cases, the trojans can ask potential victims to 
        contact “the employer” via a messenger. In reality, they will actually be writing to the scammers, who will try to lure them into one 
        or another fraudulent scheme.
    &lt;/p&gt;

    &lt;div class="flex fxCenter"&gt;
        &lt;div class="margRM"&gt;
            &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/20_Android.FakeApp.1627_2024.png" class="preview"&gt;
                  &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/20_Android.FakeApp.1627_2024.1.png" alt="Android.FakeApp_2024"&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
            &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/21_Android.FakeApp.1703_2024.png" class="preview"&gt;
                  &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/21_Android.FakeApp.1703_2024.1.png" alt="Android.FakeApp_2024"&gt;
            &lt;/a&gt;
        &lt;/div&gt;
    &lt;/div&gt;
    &lt;p class="noMargT alignCenter"&gt;&lt;em&gt;
        Examples of the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; trojans that scammers passed off as job-search apps: &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1627&lt;/b&gt; (the “Aimer” app) and  
        &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1703&lt;/b&gt; (the “FreeEarn” app)
    &lt;/em&gt;&lt;/p&gt;

    &lt;p&gt;
        In addition, more trojans that subscribe users to paid services were uncovered on Google Play. 
        One of them was &lt;a href="https://vms.drweb.com/search/?q=Android.Subscription&amp;lng=en"&gt;&lt;b&gt;Android.Subscription&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.22&lt;/b&gt;, which was being distributed as the “InstaPhoto Editor” photo-editing program.
    &lt;/p&gt;

    &lt;div class="column_grid_review column_grid_review--o"&gt;
        &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/22_Android.Subscription.22_2024.png" class="preview"&gt;
          &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/22_Android.Subscription.22_2024.png" alt="Android.Subscriptin_2024"&gt;
        &lt;/a&gt;
    &lt;/div&gt;
    &lt;p class="noMargT alignCenter"&gt;&lt;em&gt;
        The &lt;a href="https://vms.drweb.com/search/?q=Android.Subscription&amp;lng=en"&gt;&lt;b&gt;Android.Subscription&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.22&lt;/b&gt; trojan is designed to subscribe users to paid services
    &lt;/em&gt;&lt;/p&gt;

    &lt;p&gt;
        Other such trojans were members of the related &lt;a href="https://vms.drweb.com/search/?q=Android.Joker&amp;lng=en"&gt;&lt;b&gt;Android.Joker&lt;/b&gt;&lt;/a&gt; and &lt;a href="https://vms.drweb.com/search/?q=Android.Harly&amp;lng=en"&gt;&lt;b&gt;Android.Harly&lt;/b&gt;&lt;/a&gt; families, which have a modular architecture. 
        The former can download additional components from the Internet, while the latter are distinguished by the fact that they typically store the modules 
        they need in encrypted form in their file resources.
    &lt;/p&gt;

    &lt;div class="flex fxCenter"&gt;
        &lt;div class="margRM"&gt;
            &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/23_Android.Joker.2280_2024.png" class="preview"&gt;
                 &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/23_Android.Joker.2280_2024.1.png" alt="Android.Joker_2024"&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
            &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/24_Android.Harly.82_2024.png" class="preview"&gt;
                 &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/24_Android.Harly.82_2024.1.png" alt="Android.Harly_2024"&gt;
            &lt;/a&gt;
        &lt;/div&gt;
    &lt;/div&gt;

    &lt;p class="noMargT alignCenter"&gt;&lt;em&gt;
        Examples of apps that subscribed victims to paid services. The &lt;a href="https://vms.drweb.com/search/?q=Android.Joker&amp;lng=en"&gt;&lt;b&gt;Android.Joker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.2280&lt;/b&gt; 
        was hiding in the horoscope program “My Horoscope”, and the &lt;a href="https://vms.drweb.com/search/?q=Android.Harly&amp;lng=en"&gt;&lt;b&gt;Android.Harly&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.87&lt;/b&gt; was hiding in the game “BlockBuster”
    &lt;/em&gt;&lt;/p&gt;

    &lt;p&gt;
        In addition to malware, Doctor Web’s specialists discovered new unwanted software on Google Play, which included different 
        modifications of &lt;a href="https://vms.drweb.com/search/?q=Program.FakeMoney&amp;lng=en"&gt;&lt;b&gt;Program.FakeMoney&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.11&lt;/b&gt; and &lt;a href="https://vms.drweb.com/search/?q=Program.FakeMoney&amp;lng=en"&gt;&lt;b&gt;Program.FakeMoney&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.14&lt;/b&gt;. 
        These belong to a family of programs that offer users virtual rewards for completing various tasks (often this involves watching ads). 
        The rewards can allegedly be converted into real money or prizes, but to withdraw their “earned” reward, users must collect a certain sum. 
        However, even if they succeed in doing so, they will not get any real payments.
    &lt;/p&gt;

    &lt;div class="flex fxCenter"&gt;
        &lt;div class="margRM"&gt;
            &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/25_Program.FakeMoney.11_2024.png" class="preview"&gt;
                  &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/25_Program.FakeMoney.11_2024.1.png" alt="Program.FakeMoney_2024"&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
            &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/26_Program.FakeMoney.14_2024.png" class="preview"&gt;
                  &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/26_Program.FakeMoney.14_2024.1.png" alt="Program.FakeMoney_2024"&gt;
            &lt;/a&gt;
        &lt;/div&gt;
    &lt;/div&gt;
    &lt;p class="noMargT alignCenter"&gt;&lt;em&gt;
        One of the &lt;a href="https://vms.drweb.com/search/?q=Program.FakeMoney&amp;lng=en"&gt;&lt;b&gt;Program.FakeMoney&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.11&lt;/b&gt; 
        variants was distributed as the game “Copper Boom”, and &lt;a href="https://vms.drweb.com/search/?q=Program.FakeMoney&amp;lng=en"&gt;&lt;b&gt;Program.FakeMoney&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.14&lt;/b&gt; was disguised as the game “Merge Party”
    &lt;/em&gt;&lt;/p&gt;

    &lt;p&gt;
        In addition, throughout the year, our malware analysts discovered new adware programs. Among them were apps and games with the 
        built-in adware module &lt;a href="https://vms.drweb.com/search/?q=Adware.StrawAd&amp;lng=en"&gt;&lt;b&gt;Adware.StrawAd&lt;/b&gt;&lt;/a&gt;, which is capable of displaying ads from various advertising service providers.
    &lt;/p&gt;

    &lt;div class="flex fxCenter"&gt;
        &lt;div class="margRM"&gt;
            &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/27_Adware.StrawAd.1_2024.png" class="preview"&gt;
                  &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/27_Adware.StrawAd.1_2024.1.png" alt="Adware.StrawAd_2024"&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
            &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/28_Adware.StrawAd.3_2024.png" class="preview"&gt;
                  &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/28_Adware.StrawAd.3_2024.1.png" alt="Adware.StrawAd_2024"&gt;
            &lt;/a&gt;
        &lt;/div&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
        &lt;div class="margRM"&gt;
            &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/29_Adware.StrawAd.6_2024.png" class="preview"&gt;
                  &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/29_Adware.StrawAd.6_2024.1.png" alt="Adware.StrawAd_2024"&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
            &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/30_Adware.StrawAd.9_2024.png" class="preview"&gt;
                  &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/30_Adware.StrawAd.9_2024.1.png" alt="Adware.StrawAd_2024"&gt;
            &lt;/a&gt;
        &lt;/div&gt;
    &lt;/div&gt;
    &lt;p class="noMargT alignCenter"&gt;&lt;em&gt;
        Examples of games containing the adware module &lt;a href="https://vms.drweb.com/search/?q=Adware.StrawAd&amp;lng=en"&gt;&lt;b&gt;Adware.StrawAd&lt;/b&gt;&lt;/a&gt;: 
        “Crazy Sandwich Runner” (&lt;a href="https://vms.drweb.com/search/?q=Adware.StrawAd&amp;lng=en"&gt;&lt;b&gt;Adware.StrawAd&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;), 
        “Poppy Punch Playtime” (&lt;a href="https://vms.drweb.com/search/?q=Adware.StrawAd&amp;lng=en"&gt;&lt;b&gt;Adware.StrawAd&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3&lt;/b&gt;), 
        “Finger Heart Matching”  (&lt;a href="https://vms.drweb.com/search/?q=Adware.StrawAd&amp;lng=en"&gt;&lt;b&gt;Adware.StrawAd&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.6&lt;/b&gt;), 
        and “Toimon Battle Playground” (&lt;a href="https://vms.drweb.com/search/?q=Adware.StrawAd&amp;lng=en"&gt;&lt;b&gt;Adware.StrawAd&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.9&lt;/b&gt;)
    &lt;/em&gt;&lt;/p&gt;

    &lt;p&gt;
        &lt;b&gt;Adware.Basement&lt;/b&gt; adware programs were also distributed via Google Play. 
        Ads from these often lead to malicious and fraudulent websites. It is noteworthy that this family shares a code base with the unwanted &lt;a href="https://vms.drweb.com/search/?q=Program.FakeMoney&amp;lng=en"&gt;&lt;b&gt;Program.FakeMoney&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.11&lt;/b&gt; apps.
    &lt;/p&gt;

    &lt;div class="flex fxCenter"&gt;
        &lt;div class="margRM"&gt;
            &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/31_Adware.Basement.1_2024.png" class="preview"&gt;
                  &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/31_Adware.Basement.1_2024.1.png" alt="Adware.Basement_2024"&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
            &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/32_Adware.Basement.1_2024.png" class="preview"&gt;
                  &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/32_Adware.Basement.1_2024.1.png" alt="Adware.Basement_2024"&gt;
            &lt;/a&gt;
        &lt;/div&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
        &lt;div class="margRM"&gt;
            &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/33_Adware.Basement.1_2024.png" class="preview"&gt;
                  &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/33_Adware.Basement.1_2024.1.png" alt="Adware.Basement_2024"&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
            &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/34_Adware.Basement.2_2024.png" class="preview"&gt;
                  &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/34_Adware.Basement.2_2024.1.png" alt="Adware.Basement_2024"&gt;
            &lt;/a&gt;
        &lt;/div&gt;
    &lt;/div&gt;
    &lt;p class="noMargT alignCenter"&gt;&lt;em&gt;
        Examples of &lt;b&gt;Adware.Basement&lt;/b&gt; 
        unwanted adware programs: “Lie Detector: Lie Prank Test”, “TapAlarm:Don't touch my phone”, and “Magic Voice Changer” are examples for &lt;b&gt;Adware.Basement.1&lt;/b&gt;; 
        and “Auto Clicker:Tap Auto” for &lt;b&gt;Adware.Basement.2&lt;/b&gt;
    &lt;/em&gt;&lt;/p&gt;
&lt;/section&gt;

&lt;section class="margTM margBM" id="troj"&gt;
    &lt;h2 class="alignCenter"&gt;Banking trojans&lt;/h2&gt;
    &lt;p&gt;
        According to detection statistics provided by Dr.Web Security Space for mobile devices, in 2024, banking trojans represented 6.29% of the total number 
        of registered malicious apps, which is up 2.71 pp. from the previous year. Starting in January, their activity steadily declined, but from mid-spring 
        onwards, the number of attacks started to increase again. Their activity remained virtually unchanged during the third quarter, after which they continued 
        to be more active, reaching an annual maximum in November.
    &lt;/p&gt;

    &lt;div class="column_grid_review column_grid_review--o"&gt;
        &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/35.1_banker_2024_en.png" class="preview"&gt;
          &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/35.1_banker_2024_en.png" alt="Banker_Stat_2024"&gt;
        &lt;/a&gt;
    &lt;/div&gt;

    &lt;p&gt;
        In 2024, well-known banking trojan families became widespread again. 
        Among them were the malicious programs &lt;a href="https://vms.drweb.com/search/?q=Android.BankBot.Coper&amp;lng=en" target="_blank" rel="noopener noreferrer"&gt;Coper&lt;/a&gt;, 
        Hydra (&lt;a href="https://vms.drweb.com/search/?q=Android.BankBot&amp;lng=en"&gt;&lt;b&gt;Android.BankBot&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1048.origin&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.BankBot&amp;lng=en"&gt;&lt;b&gt;Android.BankBot&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.563.origin&lt;/b&gt;), 
        Ermac (&lt;a href="https://vms.drweb.com/search/?q=Android.BankBot&amp;lng=en"&gt;&lt;b&gt;Android.BankBot&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1015.origin&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.BankBot&amp;lng=en"&gt;&lt;b&gt;Android.BankBot&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.15017&lt;/b&gt;), 
        Alien (&lt;a href="https://vms.drweb.com/search/?q=Android.BankBot&amp;lng=en"&gt;&lt;b&gt;Android.BankBot&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.745.origin&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.BankBot&amp;lng=en"&gt;&lt;b&gt;Android.BankBot&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1078.origin&lt;/b&gt;), 
        Anubis (&lt;a href="https://vms.drweb.com/search/?q=Android.BankBot&amp;lng=en"&gt;&lt;b&gt;Android.BankBot&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.670.origin&lt;/b&gt;). 
        In addition, attacks using the following were observed: Cerberus (&lt;a href="https://vms.drweb.com/search/?q=Android.BankBot&amp;lng=en"&gt;&lt;b&gt;Android.BankBot&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.11404&lt;/b&gt;), 
        GodFather (&lt;a href="https://vms.drweb.com/search/?q=Android.BankBot&amp;lng=en"&gt;&lt;b&gt;Android.BankBot&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.GodFather.3&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.BankBot&amp;lng=en"&gt;&lt;b&gt;Android.BankBot&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.GodFather.14.origin&lt;/b&gt;), and Zanubis (&lt;a href="https://vms.drweb.com/search/?q=Android.BankBot&amp;lng=en"&gt;&lt;b&gt;Android.BankBot&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.Zanubis.7.origin&lt;/b&gt;).
    &lt;/p&gt;
    &lt;p&gt;
        Over the course of 2024, malicious actors actively distributed &lt;b&gt;Android.SpyMax&lt;/b&gt; spyware trojans, which have rich malicious functionality. 
        They are also widely used as banking trojans. This family originally included the multifunctional RAT trojan SpyNote (RAT — Remote Administration 
        Trojan or Remote Access Trojan). However, after its source code was leaked, many new modifications based on this code started to emerge, including 
        CraxsRAT and G700 RAT. Dr.Web Security Space detection statistics show that members of this family became more active in the second half of 2023; 
        since then, almost every month they have been detected in increasing numbers, and this trend continues.
    &lt;/p&gt;
    &lt;p&gt;
        &lt;b&gt;Android.SpyMax&lt;/b&gt; trojans target users all over the world. Last year, they were also found to be involved in numerous attacks on Russian users, 
        as 46.23% of the detections of this family were registered on devices belonging to this particular audience. These trojans were also most actively 
        distributed among Brazilian (35.46% of detections) and Turkish (5.80% of detections) Android device owners.
    &lt;/p&gt;
    &lt;p&gt;
        It is noteworthy that these malicious programs are mainly distributed in Russia not via spam or classic phishing, but during one stage of telephone fraud. 
        At the beginning of their call, threat actors traditionally try to convince their victims that they are employees of a bank or a law enforcement agency. 
        They inform them about a problem that has allegedly occurred, e.g., an attempt to steal money from the victim’s bank account or an unplanned loan; or, on 
        the contrary, they report “good news” about free money that is supposedly due their victims from the government. When the scammers realize that a user has 
        believed them, they encourage their victim to install an “anti-virus update”, a “banking program”, or some other similar app—for example, to “ensure a secure 
        transaction”. Such a program will, in fact, contain an &lt;b&gt;Android.SpyMax&lt;/b&gt; trojan.
    &lt;/p&gt;

    &lt;div class="column_grid_review column_grid_review--o"&gt;
        &lt;a href="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/36_Android.SpyMax_share_2024_en.png" class="preview"&gt;
          &lt;img src="https://st.drweb.com/static/new-www/news/2025/january/review_mobile/36_Android.SpyMax_share_2024_en.png" alt="Android.SpyMax_2024"&gt;
        &lt;/a&gt;
    &lt;/div&gt;

    &lt;p&gt;
        In 2024, Russian users also encountered the Falcon banking trojan family (&lt;a href="https://vms.drweb.com/search/?q=Android.BankBot&amp;lng=en"&gt;&lt;b&gt;Android.BankBot&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.988.origin&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.Banker&amp;lng=en"&gt;&lt;b&gt;Android.Banker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.5703&lt;/b&gt;) 
        and the Mamont family (&lt;a href="https://vms.drweb.com/search/?q=Android.Banker&amp;lng=en"&gt;&lt;b&gt;Android.Banker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.637.origin&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.Banker&amp;lng=en"&gt;&lt;b&gt;Android.Banker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.712.origin&lt;/b&gt;). In addition, attacks involving the banking trojans 
        &lt;a href="https://vms.drweb.com/search/?q=Android.Banker&amp;lng=en"&gt;&lt;b&gt;Android.Banker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.791.origin&lt;/b&gt; and &lt;a href="https://vms.drweb.com/search/?q=Android.Banker&amp;lng=en"&gt;&lt;b&gt;Android.Banker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.829.origin&lt;/b&gt; were observed. These targeted Android device owners from Russia and Uzbekistan. 
        Other attacks were perpetrated by &lt;a href="https://vms.drweb.com/search/?q=Android.Banker&amp;lng=en"&gt;&lt;b&gt;Android.Banker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.802.origin&lt;/b&gt; and affected Russian, Azerbaijani, and Uzbekistani users. 
        &lt;a href="https://vms.drweb.com/search/?q=Android.Banker&amp;lng=en"&gt;&lt;b&gt;Android.Banker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.757.origin&lt;/b&gt; targeted users from Russia, Uzbekistan, Tajikistan, and Kazakhstan.
    &lt;/p&gt;
    &lt;p&gt;
        Our experts once again detected attacks coming from the MoqHao trojans (&lt;a href="https://vms.drweb.com/search/?q=Android.Banker&amp;lng=en"&gt;&lt;b&gt;Android.Banker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.367.origin&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.Banker&amp;lng=en"&gt;&lt;b&gt;Android.Banker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.430.origin&lt;/b&gt;, 
        &lt;a href="https://vms.drweb.com/search/?q=Android.Banker&amp;lng=en"&gt;&lt;b&gt;Android.Banker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.470.origin&lt;/b&gt;, 
        &lt;a href="https://vms.drweb.com/search/?q=Android.Banker&amp;lng=en"&gt;&lt;b&gt;Android.Banker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.593.origin&lt;/b&gt;) 
        that were aimed at users from many countries, including Southeast Asian and Asia-Pacific countries. 
        The same audience was also targeted by other trojans. For example, South Korean Android device owners encountered families like Fakecalls 
        (&lt;a href="https://vms.drweb.com/search/?q=Android.BankBot&amp;lng=en"&gt;&lt;b&gt;Android.BankBot&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.919.origin&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.BankBot&amp;lng=en"&gt;&lt;b&gt;Android.BankBot&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.14423&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.Banker&amp;lng=en"&gt;&lt;b&gt;Android.Banker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.5297&lt;/b&gt;), 
        IOBot (&lt;a href="https://vms.drweb.com/search/?q=Android.BankBot&amp;lng=en"&gt;&lt;b&gt;Android.BankBot&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.IOBot.1.origin&lt;/b&gt;), and Wroba (&lt;a href="https://vms.drweb.com/search/?q=Android.Banker&amp;lng=en"&gt;&lt;b&gt;Android.Banker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.360.origin&lt;/b&gt;). Other Wroba modifications 
        (&lt;a href="https://vms.drweb.com/search/?q=Android.BankBot&amp;lng=en"&gt;&lt;b&gt;Android.BankBot&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.907.origin&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.BankBot&amp;lng=en"&gt;&lt;b&gt;Android.BankBot&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1128.origin&lt;/b&gt;) 
        attacked users from Japan.
    &lt;/p&gt;
    &lt;p&gt;
        Banking trojans that threatened Chinese users included, for instance, the &lt;a href="https://vms.drweb.com/search/?q=Android.Banker&amp;lng=en"&gt;&lt;b&gt;Android.Banker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.480.origin&lt;/b&gt; trojan, 
        and Vietnamese users were attacked by &lt;a href="https://vms.drweb.com/search/?q=Android.BankBot&amp;lng=en"&gt;&lt;b&gt;Android.BankBot&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1111.origin&lt;/b&gt;. 
        At the same time, cybercriminals used trojans like TgToxic (&lt;a href="https://vms.drweb.com/search/?q=Android.BankBot&amp;lng=en"&gt;&lt;b&gt;Android.BankBot&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.TgToxic.1&lt;/b&gt;) to attack bank customers from Indonesia, 
        Thailand, and Taiwan, and the GoldDigger trojan
        (&lt;a href="https://vms.drweb.com/search/?q=Android.BankBot&amp;lng=en"&gt;&lt;b&gt;Android.BankBot&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.GoldDigger.3&lt;/b&gt;) was used to target users from Thailand and Vietnam.
    &lt;/p&gt;
    &lt;p&gt;
        Attacks on Iranian users were again recorded. These users encountered such banking trojans as &lt;a href="https://vms.drweb.com/search/?q=Android.Banker&amp;lng=en"&gt;&lt;b&gt;Android.Banker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.709.origin&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.Banker&amp;lng=en"&gt;&lt;b&gt;Android.Banker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.5292&lt;/b&gt;, 
        &lt;a href="https://vms.drweb.com/search/?q=Android.Banker&amp;lng=en"&gt;&lt;b&gt;Android.Banker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.777.origin&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.BankBot&amp;lng=en"&gt;&lt;b&gt;Android.BankBot&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1106.origin&lt;/b&gt;, and some others. 
        And banking trojans that attacked Turkish bank customers included representatives of the Tambir family 
        (&lt;a href="https://vms.drweb.com/search/?q=Android.BankBot&amp;lng=en"&gt;&lt;b&gt;Android.BankBot&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1104.origin&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.BankBot&amp;lng=en"&gt;&lt;b&gt;Android.BankBot&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1099.origin&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.BankBot&amp;lng=en"&gt;&lt;b&gt;Android.BankBot&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1117.origin&lt;/b&gt;), along with some others.
    &lt;/p&gt;
    &lt;p&gt;
        Banking trojans like &lt;a href="https://vms.drweb.com/search/?q=Android.Banker&amp;lng=en"&gt;&lt;b&gt;Android.Banker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.797.origin&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.Banker&amp;lng=en"&gt;&lt;b&gt;Android.Banker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.817.origin&lt;/b&gt; 
        and &lt;a href="https://vms.drweb.com/search/?q=Android.Banker&amp;lng=en"&gt;&lt;b&gt;Android.Banker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.5435&lt;/b&gt; targeted Indian users.
        These trojans were camouflaged as software that was allegedly related to the credit institutions Airtel Payments Bank, PM KISAN, and IndusInd Bank. 
        In addition, Rewardsteal banking trojans (&lt;a href="https://vms.drweb.com/search/?q=Android.Banker&amp;lng=en"&gt;&lt;b&gt;Android.Banker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.719.origin&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.Banker&amp;lng=en"&gt;&lt;b&gt;Android.Banker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.5147&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.Banker&amp;lng=en"&gt;&lt;b&gt;Android.Banker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.5443&lt;/b&gt;) 
        remained active. These primarily targeted Indian customers of banks like Axis bank, HDFC Bank, SBI, ICICI Bank, RBL bank, and Citi bank.
    &lt;/p&gt;
    &lt;p&gt;
        In Latin American counties, PixPirate (&lt;a href="https://vms.drweb.com/search/?q=Android.BankBot&amp;lng=en"&gt;&lt;b&gt;Android.BankBot&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1026.origin&lt;/b&gt;) trojan activity was observed; these trojans target Brazilian bank customers.
    &lt;/p&gt;
    &lt;p&gt;
        Among the trojans targeting European users were Anatsa (&lt;a href="https://vms.drweb.com/search/?q=Android.BankBot&amp;lng=en"&gt;&lt;b&gt;Android.BankBot&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.Anatsa.1.origin&lt;/b&gt;) and Copybara (&lt;a href="https://vms.drweb.com/search/?q=Android.BankBot&amp;lng=en"&gt;&lt;b&gt;Android.BankBot&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.15140&lt;/b&gt; and 
        &lt;a href="https://vms.drweb.com/search/?q=Android.BankBot&amp;lng=en"&gt;&lt;b&gt;Android.BankBot&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1100.origin&lt;/b&gt;). The latter mainly targets users from Italy, the United Kingdom, and Spain.
    &lt;/p&gt;
    &lt;p&gt;
        During 2024, Doctor Web’s virus analysts observed an increase in the popularity of certain methods of protecting Android malware (primarily banking trojans) 
        from analysis and detection. In particular, attackers performed various manipulations with the ZIP format on which Android APK files are based. As a result, 
        many instruments of static analysis that use standard algorithms to work with ZIP archives are unable to correctly process such “damaged” files. At the same 
        time, the Android OS accepts such modified trojans as normal programs, allowing them to be installed and run.
    &lt;/p&gt;
    &lt;p&gt;
        One common technique is to manipulate the fields &lt;span class="string"&gt;compression method&lt;/span&gt; and &lt;span class="string"&gt;compressed size&lt;/span&gt; 
        in the local file header inside the APK. Threat actors intentionally specify the wrong values for the fields &lt;span class="string"&gt;compressed size&lt;/span&gt; 
        and &lt;span class="string"&gt;uncompressed size&lt;/span&gt; or write an incorrect or nonexistent compression method in the 
        &lt;span class="string"&gt;compression method&lt;/span&gt; field. Another option is to specify a method that does 
        not involve compression for the archive. The header fields &lt;span class="string"&gt;compressed size&lt;/span&gt; 
        and &lt;span class="string"&gt;uncompressed size&lt;/span&gt; will not match, although they should.
    &lt;/p&gt;
    &lt;p&gt;
        Another popular technique is to use incorrect information about the disk in the ECDR (End of Central Directory Record) and in the CD (Central Directory 
        that contains data about files and archive parameters). Both these parameters should match for a single archive. However, cybercriminals can specify 
        different values for these as if it were not a single archive, but a multi-archive.
    &lt;/p&gt;
    &lt;p&gt;
        Also widespread was a technique whereby a flag was set in the local file headers of some files in the archive, indicating that these files are encrypted. 
        In reality they are not encrypted but due to this, such an archive will be parsed incorrectly.
    &lt;/p&gt;
    &lt;p&gt;
        Along with manipulating the structure of APK files, malware creators also used other practices, such as modifying the 
        &lt;span class="string"&gt;AndroidManifest.xml&lt;/span&gt; configuration file of Android apps. In particular, they added garbage bytes &lt;span class="string"&gt;b'\x00'&lt;/span&gt; 
        to this file’s attribute structure, causing it to be read incorrectly.
    &lt;/p&gt;
&lt;/section&gt;

&lt;section class="margTM margBM" id="future"&gt;
    &lt;h2 class="alignCenter"&gt;Prospects and trends&lt;/h2&gt;
    &lt;p&gt;
        The past year has shown that cybercriminals are still actively enriching themselves at the expense of Android device owners. 
        Their main tools remain ad-displaying and banking trojans, malicious programs with spyware capabilities, and fraudulent software. 
        In this regard, we should expect the emergence of new threats of this type in 2025.
    &lt;/p&gt;
    &lt;p&gt;
        Despite the steps taken to improve the security of Google Play, this app catalog still remains an Android threat distribution source. 
        Therefore, new malicious and unwanted apps emerging in it should not be ruled out.
    &lt;/p&gt;
    &lt;p&gt;
        Another case of Android TV box sets being infected was detected last year, indicating that malware creators use different attack vectors. 
        It is quite possible that threat actors will not only turn their attention to such devices again, but will also continue to look for other 
        potential targets among the variety of Android gadgets.
    &lt;/p&gt;
    &lt;p&gt;
        It is possible that malware developers will continue to actively introduce new techniques that allow their malicious programs to bypass analysis and detection.
    &lt;/p&gt;
    &lt;p&gt;
        Doctor Web’s specialists continue to both monitor the evolution of mobile cyber threats and ensure that our users are protected. To improve your mobile device security, 
        install Dr.Web Security Space, which helps in the fight against malicious, unwanted, and other dangerous programs; fraudsters; and other threats.
    &lt;/p&gt;
&lt;/section&gt;

&lt;a href="https://github.com/DoctorWebLtd/malware-iocs/blob/master/2024 review of virus activity on mobile devices/README.adoc" target="_blank" rel="noopener noreferrer"&gt;Indicators of compromise&lt;/a&gt;

&lt;style&gt;
    .custom-color-link a {
        color: #73b320;
    }
&lt;/style&gt;

</description></item><item><guid>https://news.drweb.com/show/?i=14950&amp;lng=en</guid><title>Doctor Web’s Q4 2024 review of virus activity on mobile devices</title><link>https://news.drweb.com/show/?i=14950&amp;lng=en&amp;c=38</link><pubDate>Thu, 26 Dec 2024 10:00:00 GMT</pubDate><description>


&lt;p&gt;&lt;b&gt;December 26, 2024&lt;/b&gt;&lt;/p&gt;

&lt;section class="margTM margBM" id="main"&gt;
  &lt;p&gt;&lt;newslead&gt;According to detection statistics collected by Dr.Web Security Space for mobile devices, &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; ad-displaying trojans were the malware programs most frequently detected in the fourth quarter of 2024 (Q4). The second most common threats were &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; trojans, which are used in fraudulent schemes. Trojans from the &lt;b&gt;Android.Siggen&lt;/b&gt; family, capable of executing various malicious tasks, ranked third.&lt;/newslead&gt;&lt;/p&gt;
  &lt;p&gt;Over the course of Q4, Doctor Web’s malware analysts discovered many threats on Google Play. Among them were numerous &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; trojans and malware from the &lt;a href="https://vms.drweb.com/search/?q=Android.Subscription&amp;lng=en"&gt;&lt;b&gt;Android.Subscription&lt;/b&gt;&lt;/a&gt; and &lt;a href="https://vms.drweb.com/search/?q=Android.Joker&amp;lng=en"&gt;&lt;b&gt;Android.Joker&lt;/b&gt;&lt;/a&gt; families, which subscribe users to paid services. More &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; adware trojans were also detected. In addition, threat actors distributed malicious apps protected with a sophisticated software packer.&lt;/p&gt;
&lt;/section&gt;

&lt;section class="margTM margBM" id="stat"&gt;
  &lt;div class="paddXM paddYM bg_ocean_1 white custom-color-link"&gt;
    &lt;h4 class="white alignCenter"&gt;PRINCIPAL TRENDS OF Q4 2024&lt;/h4&gt;
    &lt;ul&gt;
      &lt;li&gt;High activity on the part of &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; adware trojans and &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; fraudulent apps&lt;/li&gt;
      &lt;li&gt;The distribution of many malicious programs through the Google Play catalog&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/div&gt;

  &lt;h2 class="alignCenter"&gt;According to statistics collected by Dr.Web Security Space for mobile devices&lt;/h2&gt;
  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2024/december/review_mobile/01_malware_q4_2024_en.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2024/december/review_mobile/01_malware_q4_2024_en.1.png" alt="According to statistics collected by Dr.Web Security Space for mobile devices"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

  &lt;dl class="dlList"&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1600&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;A trojan app that loads a website that is hardcoded into its settings. Known modifications of this malicious program load an online casino site.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.655.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.657.origin&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;Trojan apps designed to display intrusive ads. Members of the &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; family are often distributed as popular and harmless applications. In some cases, other malware can install them in the system directory. When these infect Android devices, they typically conceal their presence from the user. For example, they “hide” their icons from the home screen menu.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.Packed&amp;lng=en"&gt;&lt;b&gt;Android.Packed&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.57083&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;The detection name for malicious applications protected with an ApkProtector software packer. Among them are banking trojans, spyware, and other malicious software.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.Click.1751&amp;lng=en"&gt;&lt;b&gt;Android.Click.1751&lt;/b&gt;&lt;/a&gt;&lt;/dt&gt;
      &lt;dd&gt;This trojan is built into third-party WhatsApp messenger mods and camouflaged as Google library classes. While the host application is being used, &lt;a href="https://vms.drweb.com/search/?q=Android.Click.1751&amp;lng=en"&gt;&lt;b&gt;Android.Click.1751&lt;/b&gt;&lt;/a&gt; connects to one of the C&amp;C servers and receives two URLs from it. One of them is intended for Russian-speaking users, and the other is for everyone else. The trojan then displays a dialog box whose contents it has also received from a remote server. When a user clicks on the confirmation button, malware loads the corresponding link in the browser.&lt;/dd&gt;    
  &lt;/dl&gt;
  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2024/december/review_mobile/02_unwanted_q4_2024_en.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2024/december/review_mobile/02_unwanted_q4_2024_en.1.png" alt="According to statistics collected by Dr.Web Security Space for mobile devices"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

  &lt;dl class="dlList"&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.FakeMoney&amp;lng=en"&gt;&lt;b&gt;Program.FakeMoney&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.11&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;The detection name for Android applications that allegedly allow users to earn money by completing different tasks. These apps make it look as if rewards are accruing for each one that is completed. At the same time, users are told that they have to accumulate a certain sum to withdraw their “earnings”. Typically, such apps have a list of popular payment systems and banks that supposedly could be used to withdraw the rewards. But even if users succeed in accumulating the needed amount, in reality they cannot get any real payments. This virus record is also used to detect other unwanted software based on the source code of such apps.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.FakeAntiVirus&amp;lng=en"&gt;&lt;b&gt;Program.FakeAntiVirus&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;The detection name for adware programs that imitate anti-virus software. These apps inform users of nonexistent threats, mislead them, and demand that they purchase the software’s full version.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.CloudInject&amp;lng=en"&gt;&lt;b&gt;Program.CloudInject&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;The detection name for Android programs that have been modified using the CloudInject cloud service and the eponymous Android utility (the latter was added to the Dr.Web virus database as &lt;a href="https://vms.drweb.com/search/?q=Tool.CloudInject&amp;lng=en"&gt;&lt;b&gt;Tool.CloudInject&lt;/b&gt;&lt;/a&gt;). Such programs are modified on a remote server; meanwhile, the modders (users) who are interested in such modifications cannot control exactly what will be added to the apps. Moreover, these programs receive a number of dangerous system permissions. Once modification is complete, users can remotely manage these apps. They can block them, display custom dialogs, and track when other software is being installed or removed from a device, etc.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.TrackView&amp;lng=en"&gt;&lt;b&gt;Program.TrackView&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;The detection name for a program that allows users to be monitored via their Android devices. Malicious actors can utilize it to track a target device’s location, use the camera to record video and take photos, eavesdrop via the microphone, record audio, etc.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.SecretVideoRecorder&amp;lng=en"&gt;&lt;b&gt;Program.SecretVideoRecorder&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;The detection name for various modifications of an application that is designed to record videos and take photos in the background, using built-in Android device cameras. It can operate covertly by allowing notifications about ongoing recordings to be disabled. It also allows an app’s icon and name to be replaced with fake ones. This functionality makes this software potentially dangerous.&lt;/dd&gt;
  &lt;/dl&gt;
  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2024/december/review_mobile/03_riskware_q4_2024_en.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2024/december/review_mobile/03_riskware_q4_2024_en.1.png" alt="According to statistics collected by Dr.Web Security Space for mobile devices"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

  &lt;dl class="dlList"&gt;
    &lt;dt&gt;&lt;b&gt;Tool.NPMod.1&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;The detection name for Android programs that have been modified using the NP Manager utility. A special module is embedded in such apps, and it allows them to bypass digital signature verification once they have been modified.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.14.origin&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;A riskware platform that allows applications to launch APK files without installing them. It creates a virtual runtime environment in the context of the apps in which they are integrated. The APK files launched with the help of this platform can operate as if they are part of such programs and can also obtain the same permissions.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.LuckyPatcher&amp;lng=en"&gt;&lt;b&gt;Tool.LuckyPatcher&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;A tool that allows apps installed on Android devices to be modified (i.e., by creating patches for them) in order to change the logic of their work or to bypass certain restrictions. For instance, users can apply it to disable root-access verification in banking software or to obtain unlimited resources in games. To add patches, this utility downloads specially prepared scripts from the Internet, which can be crafted and added to the common database by any third party. The functionality of such scripts can prove to be malicious; thus, patches made with this tool can pose a potential threat.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.Packer&amp;lng=en"&gt;&lt;b&gt;Tool.Packer&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;A packer tool designed to protect Android applications from unauthorized modifications and reverse engineering. This tool is not malicious in itself, but it can be used to protect both harmless and malicious software.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.Androlua&amp;lng=en"&gt;&lt;b&gt;Tool.Androlua&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;The detection name for some potentially dangerous versions of a specialized framework for developing Android software based on the Lua scripting language. The main logic of Lua-based apps resides in the corresponding scripts that are encrypted and decrypted by the interpreter upon execution. By default, this framework often requests access to a large number of system permissions in order to operate. As a result, the Lua scripts that it executes can potentially perform various malicious actions in accordance with the acquired permissions. &lt;/dd&gt;
  &lt;/dl&gt;
  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2024/december/review_mobile/04_adware_q4_2024_en.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2024/december/review_mobile/04_adware_q4_2024_en.1.png" alt="According to statistics collected by Dr.Web Security Space for mobile devices"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

  &lt;dl class="dlList"&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.ModAd&amp;lng=en"&gt;&lt;b&gt;Adware.ModAd&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;The detection name for some modified versions (mods) of the WhatsApp messenger, whose functions have been injected with a specific code. This code is responsible for loading target URLs by displaying web content (via the Android WebView component) when the messenger is in operation. Such web addresses perform redirects to advertised sites, including online casino, bookmaker, and adult sites.&lt;/dd&gt;
    &lt;dt&gt;&lt;b&gt;Adware.Basement.1&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;These are apps that display unwanted ads which often lead to malicious and fraudulent websites. They share a common code base with the &lt;a href="https://vms.drweb.com/search/?q=Program.FakeMoney.11&amp;lng=en"&gt;&lt;b&gt;Program.FakeMoney.11&lt;/b&gt;&lt;/a&gt; unwanted applications.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.Fictus&amp;lng=en"&gt;&lt;b&gt;Adware.Fictus&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;An adware module that malicious actors embed into the cloned versions of popular Android games and applications. Its incorporation is facilitated by a specialized net2share packer. Copies of software created this way are then distributed through various software catalogs. When installed on Android devices, such apps and games display obnoxious ads.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.AdPush&amp;lng=en"&gt;&lt;b&gt;Adware.AdPush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.Adpush&amp;lng=en"&gt;&lt;b&gt;Adware.Adpush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.21846&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;Adware modules that can be built into Android apps. They display notifications containing ads that mislead users. For example, such notifications can look like messages from the operating system. In addition, these modules collect a variety of confidential data and are able to download other apps and initiate their installation.&lt;/dd&gt;
  &lt;/dl&gt;
&lt;/section&gt;


&lt;section class="margTM margBM" id="formobile"&gt;
  &lt;h2 class="alignCenter"&gt;Threats on Google Play&lt;/h2&gt;
  &lt;p&gt;In Q4 2024, Doctor Web’s malware analysts discovered over 60 malicious apps on Google Play, most of which were trojans from the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; family. Some of them were distributed as financial programs, teaching aids, reference books, and other software, including diaries, notepads, and so on. Their primary task was to load fraudulent websites.&lt;/p&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/december/review_mobile/05_Android.FakeApp.1708_q4_2024.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/december/review_mobile/05_Android.FakeApp.1708_q4_2024.1.png" alt="Android.FakeApp"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/december/review_mobile/06_Android.FakeApp.1729_q4_2024.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/december/review_mobile/06_Android.FakeApp.1729_q4_2024.1.png" alt="Android.FakeApp"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;
  &lt;p class="noMargY alignCenter"&gt;&lt;em&gt;The “QuntFinanzas” and “Trading News” apps, which, among other numerous Android.FakeApp trojans, loaded fraudulent sites&lt;/em&gt;&lt;/p&gt;

  &lt;p&gt;Malicious actors disguised other &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; trojans as games. These could load online casino and bookmaker websites.&lt;/p&gt;
  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/december/review_mobile/07_Android.FakeApp.1719_q4_2024.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/december/review_mobile/07_Android.FakeApp.1719_q4_2024.1.png" alt="Android.FakeApp"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/december/review_mobile/08_Android.FakeApp.1733_q4_2024.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/december/review_mobile/08_Android.FakeApp.1733_q4_2024.1.png" alt="Android.FakeApp"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;
  &lt;p class="noMargY alignCenter"&gt;&lt;em&gt;“Bowl Water” and “Playful Petal Pursuit” are examples of games with trojan functionality&lt;/em&gt;&lt;/p&gt;

  &lt;p&gt;Our experts also &lt;a href="https://news.drweb.com/show/?i=14935&amp;lng=en" target="_blank" rel="noopener noreferrer"&gt;uncovered&lt;/a&gt; new variants of the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp.1669&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp.1669&lt;/b&gt;&lt;/a&gt; trojan that was hiding behind the mask of various programs and could also load online casino websites. &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp.1669&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp.1669&lt;/b&gt;&lt;/a&gt; is interesting in that it gets the target website URL from the malicious DNS server’s TXT file. At the same time, it only manifests itself when connected to the Internet through certain providers.&lt;/p&gt;
  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/december/review_mobile/09_Android.FakeApp.1669_q4_2024.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/december/review_mobile/09_Android.FakeApp.1669_q4_2024.1.png" alt="Android.FakeApp"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/december/review_mobile/10_Android.FakeApp.1669_q4_2024.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/december/review_mobile/10_Android.FakeApp.1669_q4_2024.1.png" alt="Android.FakeApp"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;
  &lt;p class="noMargY alignCenter"&gt;&lt;em&gt;Examples of new Android.FakeApp.1669 trojan modifications. The “WordCount” app was disguised as a text tool, and the “Split it: Checks and Tips” app was supposed to help café- and restaurant-goers pay their bills and calculate tips.&lt;/em&gt;&lt;/p&gt;

  &lt;p&gt;Several new members of the &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; adware trojan family were among the threats detected on Google Play. They conceal their presence on infected devices.&lt;/p&gt;
  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2024/december/review_mobile/11_Android.HiddenAds.4013_q4_2024.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2024/december/review_mobile/11_Android.HiddenAds.4013_q4_2024.1.png" alt="Android.HiddenAds"&gt;
    &lt;/a&gt;
  &lt;/div&gt;
  &lt;p class="noMargY alignCenter"&gt;&lt;em&gt;This “Cool Fix Photo Enhancer” photo-editing software was hiding the Android.HiddenAds.4013 ad-displaying trojan&lt;/em&gt;&lt;/p&gt;

  &lt;p&gt;Moreover, trojans protected with a sophisticated software packer were also discovered: &lt;a href="https://vms.drweb.com/search/?q=Android.Packed&amp;lng=en"&gt;&lt;b&gt;Android.Packed&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.57156&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.Packed&amp;lng=en"&gt;&lt;b&gt;Android.Packed&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.57157&lt;/b&gt;, and &lt;a href="https://vms.drweb.com/search/?q=Android.Packed&amp;lng=en"&gt;&lt;b&gt;Android.Packed&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.57159&lt;/b&gt;, for example.&lt;/p&gt;
  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/december/review_mobile/12_Android.Packed.57156_q4_2024.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/december/review_mobile/12_Android.Packed.57156_q4_2024.1.png" alt="Android.Packed"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/december/review_mobile/13_Android.Packed.57159_q4_2024.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/december/review_mobile/13_Android.Packed.57159_q4_2024.1.png" alt="Android.Packed"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;
  &lt;p class="noMargY alignCenter"&gt;&lt;em&gt;The “Lie Detector Fun Prank” and “Speaker Dust and Water Cleaner” programs are trojans protected with a software packer&lt;/em&gt;&lt;/p&gt;

  &lt;p&gt;Our specialists also detected &lt;a href="https://vms.drweb.com/search/?q=Android.Subscription&amp;lng=en"&gt;&lt;b&gt;Android.Subscription&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.22&lt;/b&gt;, malware designed to subscribe users to paid services.&lt;/p&gt;
  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2024/december/review_mobile/14_Android.Subscription.22_q4_2024.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2024/december/review_mobile/14_Android.Subscription.22_q4_2024.1.png" alt="Android.Subscription"&gt;
    &lt;/a&gt;
  &lt;/div&gt;
  &lt;p class="noMargY alignCenter"&gt;&lt;em&gt;Instead of editing photos, the “InstaPhoto Editor” program subscribed users to a paid service &lt;/em&gt;&lt;/p&gt;

  &lt;p&gt;At the same time, cybercriminals again distributed trojans from the &lt;a href="https://vms.drweb.com/search/?q=Android.Joker&amp;lng=en"&gt;&lt;b&gt;Android.Joker&lt;/b&gt;&lt;/a&gt; family, which also subscribed victims to paid services.&lt;/p&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/december/review_mobile/15_Android.Joker.2281_q4_2024.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/december/review_mobile/15_Android.Joker.2281_q4_2024.1.png" alt="Android.Joker"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/december/review_mobile/16_Android.Joker_q4_2024.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/december/review_mobile/16_Android.Joker_q4_2024.1.png" alt="Android.Joker"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;
  &lt;p class="noMargY alignCenter"&gt;&lt;em&gt;The SMS messenger “Smart Messages” and the third-party keyboard “Cool Keyboard” tried to covertly subscribe victims to a paid service&lt;/em&gt;&lt;/p&gt;

  &lt;p&gt;To protect your Android device from malware and unwanted programs, we recommend installing Dr.Web anti-virus products for Android.&lt;/p&gt;
  &lt;p&gt;&lt;a href="https://github.com/DoctorWebLtd/malware-iocs/blob/master/Q4%202024%20review%20of%20virus%20activity%20on%20mobile%20devices/README.adoc" target="_blank" rel="noopener noreferrer"&gt;Indicators of compromise&lt;/a&gt;&lt;/p&gt;

&lt;/section&gt;

&lt;style&gt;
    .custom-color-link a {
        color: #73b320;
    }
&lt;/style&gt;


</description></item><item><guid>https://news.drweb.com/show/?i=14935&amp;lng=en</guid><title>Malicious apps on Google Play: how threat actors use the DNS protocol to covertly connect trojans to C&amp;C servers</title><link>https://news.drweb.com/show/?i=14935&amp;lng=en&amp;c=38</link><pubDate>Mon, 11 Nov 2024 13:44:17 GMT</pubDate><description>&lt;p&gt;&lt;b&gt;November 11, 2024&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;newslead&gt;Many Android.FakeApp trojans are tasked with opening links to various sites, and from a technical point of view, such malware programs are quite primitive. When launched, they receive a command to load a specific web address. As a result, the users who have installed them see the contents of some unwanted site on their screens instead of the program or game they are expecting. However, sometimes notable samples can emerge among such fake applications: Android.FakeApp.1669, for example. It differs from most of the threats that are similar to it in that it uses a modified dnsjava library to get the configuration from a malicious DNS server that contains the target link. At the same time, such a configuration is sent to the trojan only when it is connected to the Internet via certain service providers—mobile Internet providers, for example. In other cases, the trojan does not manifest itself in any way.&lt;/newslead&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp.1669&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp.1669&lt;/b&gt;&lt;/a&gt; is represented by a large number of modifications that are disguised as various programs on distribution sources that include Google Play. For instance, the currently known trojan variants have been downloaded from the official Android OS digital store at least 2,160,000 times.&lt;/p&gt;

&lt;div class="fx -part_2 fxItemsCenter"&gt;
  &lt;div class="paddXS paddYS noMarg cell"&gt;
      &lt;p class="alignCenter"&gt;
          &lt;a href="https://st.drweb.com/static/new-www/news/2024/november/01_fakeapp.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2024/november/01_fakeapp.1.png" alt="#drweb"&gt;&lt;/a&gt;
      &lt;/p&gt;
  &lt;/div&gt;
  &lt;div class="paddXS paddYS noMarg cell"&gt;
      &lt;p class="alignCenter"&gt;
          &lt;a href="https://st.drweb.com/static/new-www/news/2024/november/02_fakeapp.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2024/november/02_fakeapp.1.png" alt="#drweb"&gt;&lt;/a&gt;
      &lt;/p&gt;
  &lt;/div&gt;
&lt;/div&gt;
&lt;div class="fx -part_2 fxItemsCenter"&gt;
  &lt;div class="paddXS paddYS noMarg cell"&gt;
      &lt;p class="alignCenter"&gt;
          &lt;a href="https://st.drweb.com/static/new-www/news/2024/november/03_fakeapp.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2024/november/03_fakeapp.1.png" alt="#drweb"&gt;&lt;/a&gt;
      &lt;/p&gt;
  &lt;/div&gt;
  &lt;div class="paddXS paddYS noMarg cell"&gt;
      &lt;p class="alignCenter"&gt;
          &lt;a href="https://st.drweb.com/static/new-www/news/2024/november/04_fakeapp.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2024/november/04_fakeapp.1.png" alt="#drweb"&gt;&lt;/a&gt;
      &lt;/p&gt;
  &lt;/div&gt;
&lt;/div&gt;

&lt;p class="alignCenter"&gt;&lt;em&gt;Examples of the programs in which &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp.1669&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp.1669&lt;/b&gt;&lt;/a&gt; was hidden&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Below is the list of the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp.1669&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp.1669&lt;/b&gt;&lt;/a&gt; variants that Doctor Web’s malware analysts discovered on Google Play. Our experts detected more trojans, but some of them are no longer in this app store.&lt;/p&gt;

&lt;table class="Table" style="width: 60%;"&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;App name&lt;/th&gt;
      &lt;th&gt;Number of downloads&lt;/th&gt;
    &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;&lt;td&gt;Split it: Checks and Tips&lt;/td&gt;&lt;td&gt;1,000,000+&lt;/td&gt;&lt;/tr&gt;
    &lt;tr&gt;&lt;td&gt;FlashPage parser&lt;/td&gt;&lt;td&gt;500,000+&lt;/td&gt;&lt;/tr&gt;
    &lt;tr&gt;&lt;td&gt;BeYummy - your cookbook&lt;/td&gt;&lt;td&gt;100,000+&lt;/td&gt;&lt;/tr&gt;
    &lt;tr&gt;&lt;td&gt;Memogen&lt;/td&gt;&lt;td&gt;100,000+&lt;/td&gt;&lt;/tr&gt;
    &lt;tr&gt;&lt;td&gt;Display Moving Message&lt;/td&gt;&lt;td&gt;100,000+&lt;/td&gt;&lt;/tr&gt;
    &lt;tr&gt;&lt;td&gt;WordCount&lt;/td&gt;&lt;td&gt;100,000+&lt;/td&gt;&lt;/tr&gt;
    &lt;tr&gt;&lt;td&gt;Goal Achievement Planner&lt;/td&gt;&lt;td&gt;100,000+&lt;/td&gt;&lt;/tr&gt;
    &lt;tr&gt;&lt;td&gt;DualText Compare&lt;/td&gt;&lt;td&gt;100,000+&lt;/td&gt;&lt;/tr&gt;
    &lt;tr&gt;&lt;td&gt;Travel Memo&lt;/td&gt;&lt;td&gt;100,000+ (is deleted)&lt;/td&gt;&lt;/tr&gt;
    &lt;tr&gt;&lt;td&gt;DessertDreams Recipes&lt;/td&gt;&lt;td&gt;50,000+&lt;/td&gt;&lt;/tr&gt;
    &lt;tr&gt;&lt;td&gt;Score Time&lt;/td&gt;&lt;td&gt;10,000+&lt;/td&gt;&lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;When launched, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp.1669&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp.1669&lt;/b&gt;&lt;/a&gt; sends a DNS request to its C&amp;C server to receive the TXT record associated with the name of a target domain. In turn, the server gives this record to the trojan only if the infected device is connected to the Internet via target providers, which include mobile Internet providers. Such TXT records usually contain domain data and some additional technical information, but in the case of &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp.1669&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp.1669&lt;/b&gt;&lt;/a&gt;, the malware’s configuration is encoded into it.&lt;/p&gt;

&lt;blockquote&gt;
  &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp.1669&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp.1669&lt;/b&gt;&lt;/a&gt; uses modified code of the dnsjava Open Source library to send DNS requests.
&lt;/blockquote&gt;

&lt;p&gt;All trojan modifications are tied to specific domain names, which allows the DNS server to send each of them their own configuration. Moreover, the sub-domain names of these target domains are unique to each infected device. They contain encoded data about the device, including sensitive information:&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;device model and brand;&lt;/li&gt;
  &lt;li&gt;screen size;&lt;/li&gt;
  &lt;li&gt;ID (it consists of two numbers: the first is the malware’s installation time, and the second is a random number);&lt;/li&gt;
  &lt;li&gt;whether the device’s battery is charging and its current charge percentage;&lt;/li&gt;
  &lt;li&gt;whether the developer settings are enabled.  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For example, when analyzed, the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp.1669&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp.1669&lt;/b&gt;&lt;/a&gt; variant hidden in the &lt;em&gt;Goal Achievement Planner&lt;/em&gt; program requested the server to send it the TXT record for the domain &lt;span class="string"&gt;3gEBkayjVYcMiztlrcJXHFSABDgJaFNNLVM3MjFCL0RTU2Ftc3VuZyAg[.]simpalm[.]com.&lt;/span&gt;; the variant from the &lt;em&gt;Split it: Checks and Tips&lt;/em&gt; program requested the record for the domain &lt;span class="string"&gt;3gEBkayjVYcMiztlrcJXHFTABDgJaFNNLVM3MjFCL0RTU2Ftc3VuZyAg[.]revolt[.]digital.&lt;/span&gt;, and the variant from the &lt;em&gt;DessertDreams Recipes&lt;/em&gt; app requested the record for the domain &lt;span class="string"&gt;3gEBkayjVYcMiztlrcJXHFWABDgJaFNNLVM3MjFCL0RTU2Ftc3VuZyAg[.]outorigin[.]com.&lt;/span&gt;.&lt;/p&gt;

&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2024/november/05_c2_response.png" class="preview"&gt;
    &lt;img src="https://st.drweb.com/static/new-www/news/2024/november/05_c2_response.1.png" alt="#drweb"&gt;
  &lt;/a&gt;
&lt;/p&gt;
&lt;p class="alignCenter"&gt;&lt;em&gt;An example of a target domain’s TXT record, which was sent by the DNS server upon request via the Linux ‘dig’ tool when one of the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp.1669&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp.1669&lt;/b&gt;&lt;/a&gt; modifications was undergoing analysis&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;The contents of these TXT records can be decrypted by doing the following:&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;reversing the string;&lt;/li&gt;
  &lt;li&gt;decoding the Base64 data;&lt;/li&gt;
  &lt;li&gt;decompressing the gzip data;&lt;/li&gt;
  &lt;li&gt;splitting it into lines by the character &lt;span class="string"&gt;÷&lt;/span&gt;.  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The resulting data will look like this (the example below relates to the TXT record for the &lt;em&gt;Goal Achievement Planner&lt;/em&gt; app):&lt;/p&gt;

&lt;code&gt;&lt;pre&gt;
url
hxxps[:]//goalachievplan[.]pro
af_id
DF3DgrCPUNxkkx7eiStQ6E
os_id
f109ec36-c6a8-481c-a8ff-3ac6b6131954
&lt;/pre&gt;&lt;/code&gt;

&lt;p&gt;This data contains the link that the trojan loads in WebView inside its window over its main interface. This link leads to the website that starts a long chain of redirects, at the end of which is an online casino site. As a result, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp.1669&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp.1669&lt;/b&gt;&lt;/a&gt; literally transforms into a web application that displays the contents of the loaded website and not the functionality declared on the app’s page on Google Play.&lt;/p&gt;

&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2024/november/06_Android.FakeApp.1669_website.png" class="preview"&gt;
    &lt;img src="https://st.drweb.com/static/new-www/news/2024/november/06_Android.FakeApp.1669_website.1.png" alt="#drweb"&gt;
  &lt;/a&gt;
&lt;/p&gt;
&lt;p class="alignCenter"&gt;&lt;em&gt;Instead of providing the expected functionality, the malicious program displayed the contents of a loaded online casino website&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;At the same time, when the trojan has Internet access via non-targeted service providers (and also when offline), it operates as the advertized program—on condition that the creators of a particular malware modification provided some functionality for such a case.&lt;/p&gt;

&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2024/november/07_Android.FakeApp.1669_normal.png" class="preview"&gt;
    &lt;img src="https://st.drweb.com/static/new-www/news/2024/november/07_Android.FakeApp.1669_normal.1.png" alt="#drweb"&gt;
  &lt;/a&gt;
&lt;/p&gt;
&lt;p class="alignCenter"&gt;&lt;em&gt;The trojan did not receive a configuration from the C&amp;C server and launched as a normal app&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Dr.Web Security Space for mobile devices successfully detects and deletes all known &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp.1669&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp.1669&lt;/b&gt;&lt;/a&gt; modifications, so this trojan does not pose a threat to our users.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://github.com/DoctorWebLtd/malware-iocs/blob/master/Android.FakeApp.1669/README.adoc" target="_blank" rel="noopener noreferrer"&gt;Indicators of compromise&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;More details on &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp.1669&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp.1669&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><guid>https://news.drweb.com/show/?i=14912&amp;lng=en</guid><title>Doctor Web’s Q3 2024 review of virus activity on mobile devices</title><link>https://news.drweb.com/show/?i=14912&amp;lng=en&amp;c=38</link><pubDate>Tue, 01 Oct 2024 03:00:00 GMT</pubDate><description>


&lt;p&gt;&lt;b&gt;October 1, 2024&lt;/b&gt;&lt;/p&gt;

&lt;section class="margTM margBM" id="main"&gt;
  &lt;p&gt;&lt;newslead&gt;According to detection statistics collected by Dr.Web Security Space for mobile devices, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; trojan apps, used by threat actors in various fraudulent schemes, were the malicious programs most frequently detected on protected devices in the third quarter of 2024. Adware trojans from the &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; family ranked second. The third most commonly detected threats were &lt;b&gt;Android.Siggen&lt;/b&gt; trojans—programs that have different malicious functionality and that are difficult to classify into any particular family.&lt;/newslead&gt;&lt;/p&gt;
  &lt;p&gt;In August, Doctor Web’s experts discovered the &lt;a href="https://vms.drweb.com/search/?q=Android.Vo1d&amp;lng=en"&gt;&lt;b&gt;Android.Vo1d&lt;/b&gt;&lt;/a&gt; backdoor, which had infected nearly 1.3 million Android TV box sets belonging to users in 197 countries. This malicious app places its components into the system storage area of infected devices and, when commanded by threat actors, can covertly download and install various programs.&lt;/p&gt;

&lt;p class="alignCenter"&gt;
  &lt;a href="https://st.drweb.com/static/new-www/news/2024/september/02_Android.Vo1d_map_en.png" class="preview"&gt;
    &lt;img src="https://st.drweb.com/static/new-www/news/2024/september/02_Android.Vo1d_map_en.png" alt="Countries with the highest number of infected devices detected" style="width:75%;"&gt;
  &lt;/a&gt;
&lt;/p&gt;

  &lt;p&gt;In addition, banking trojans targeting Indonesian users were found. One of these, &lt;b&gt;Android.SmsSpy.888.origin&lt;/b&gt;, is protected with a software packer and detected as &lt;b&gt;Android.Siggen.Susp.9415&lt;/b&gt;. It was distributed under the guise of the BRI bank customer support app BRImo Support.&lt;/p&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2024/september/review_mobile/mob_review_1_en.jpg" class="preview alignCenter"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2024/september/review_mobile/mob_review_1_en.1.jpg" alt="#drweb"&gt;
    &lt;/a&gt;
  &lt;/div&gt;
  
  &lt;p&gt;When launched, the trojan loads the real bank website https://bri.co.id in WebView. At the same time, it uses a Telegram bot API to send technical information about the infected device into the Telegram chat created by the threat actors.&lt;/p&gt;
  &lt;p&gt;&lt;b&gt;Android.SmsSpy.888.origin&lt;/b&gt; intercepts incoming SMS and also sends them into this chat. When it receives messages like &lt;span class="string"&gt;55555, &amp;lt;number&amp;gt;, &amp;lt;text&amp;gt;&lt;/span&gt;, it interprets them as commands and sends corresponding messages containing the text &lt;span class="string"&gt;&amp;lt;text&amp;gt;&lt;/span&gt; to the number &lt;span class="string"&gt;&amp;lt;number&amp;gt;&lt;/span&gt;. This way, the malware can both send SMS spam and spread among users.&lt;/p&gt;
  &lt;p&gt;Another trojan that attacked Indonesian users was &lt;b&gt;Android.SmsSpy.11629&lt;/b&gt;. This malicious program is an SMS spy that is distributed under the guise of all kinds of apps. The variant in question was targeting Bank Mandiri Taspen customers and was passed off by the attackers as an official banking app—Movin by Bank Mandiri Taspen. The trojan displays instructions to potential victims and asks them to accept a user agreement. When a user accepts it, the trojan requests the permissions needed to work with SMS.&lt;/p&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/september/review_mobile/mob_review_2_en.jpg" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/september/review_mobile/mob_review_2_en.1.jpg" alt="spinok_ads_2023"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/september/review_mobile/mob_review_3_en.jpg" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/september/review_mobile/mob_review_3_en.1.jpg" alt="spinok_ads_2023"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/september/review_mobile/mob_review_4_en.jpg" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/september/review_mobile/mob_review_4_en.1.jpg" alt="spinok_ads_2023"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;  

  &lt;p&gt;Next, the malicious program loads a real page of the bank’s website https://mail.bankmantap.co.id/: in WebView:&lt;/p&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2024/september/review_mobile/mob_review_5_en.jpg" class="preview alignCenter"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2024/september/review_mobile/mob_review_5_en.1.jpg" alt="#drweb"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

  &lt;p&gt;&lt;b&gt;Android.SmsSpy.11629&lt;/b&gt; intercepts all incoming SMS. Next, it uses the Telegram bot API to send these messages into the attackers’ Telegram chat. It adds the text &lt;span class="string"&gt;developed by : @AbyssalArmy&lt;/span&gt; to all of the messages.&lt;/p&gt;
  &lt;p&gt;At the same time, our malware analysts again discovered threats on Google Play. Among them were many new fake apps and several ad-displaying trojans.&lt;/p&gt;
&lt;/section&gt;

&lt;section class="margTM margBM" id="stat"&gt;
  &lt;div class="paddXM paddYM bg_ocean_1 white custom-color-link"&gt;
    &lt;h4 class="white alignCenter"&gt;PRINCIPAL TRENDS OF Q3 2024&lt;/h4&gt;
    &lt;ul&gt;
      &lt;li&gt;The &lt;a href="https://vms.drweb.com/search/?q=Android.Vo1d&amp;lng=en"&gt;&lt;b&gt;Android.Vo1d&lt;/b&gt;&lt;/a&gt; backdoor infected over a million TV box sets&lt;/li&gt;
      &lt;li&gt;High activity on the part of &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; malicious apps, which are used to commit fraud&lt;/li&gt;
      &lt;li&gt;High activity on the part of &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; adware trojans &lt;/li&gt;
      &lt;li&gt;The emergence of new malware on Google Play      &lt;/li&gt;
    &lt;/ul&gt;
  &lt;/div&gt;

  &lt;h2 class="alignCenter"&gt;According to statistics collected by Dr.Web Security Space for mobile devices&lt;/h2&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2024/september/review_mobile/02_malware_q3_2024_en.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2024/september/review_mobile/02_malware_q3_2024_en.1.png" alt="According to statistics collected by Dr.Web Security Space for mobile devices"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

  &lt;dl class="dlList"&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1600&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;A trojan app that loads a website that is hardcoded into its settings. Known modifications of this malicious program load an online casino site.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3994&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;A trojan app designed to display intrusive ads. Members of the &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; family are often distributed as popular and harmless applications. In some cases, other malware can install them in the system directory. When these infect Android devices, they typically conceal their presence from the user. For example, they “hide” their icons from the home screen menu.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.MobiDash&amp;lng=en"&gt;&lt;b&gt;Android.MobiDash&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7815&lt;/b&gt;&lt;/dt&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.MobiDash&amp;lng=en"&gt;&lt;b&gt;Android.MobiDash&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7813&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;Trojans that display obnoxious ads. These are special software modules that developers incorporate into applications.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.Click.1751&amp;lng=en"&gt;&lt;b&gt;Android.Click.1751&lt;/b&gt;&lt;/a&gt;&lt;/dt&gt;
      &lt;dd&gt;This trojan is built into third-party WhatsApp messenger mods and camouflaged as Google library classes. While the host application is being used, &lt;a href="https://vms.drweb.com/search/?q=Android.Click.1751&amp;lng=en"&gt;&lt;b&gt;Android.Click.1751&lt;/b&gt;&lt;/a&gt; connects to one of the C&amp;C servers. It receives two URLs from it. One of them is intended for Russian-speaking users, and the other is for everyone else. The trojan then displays a dialog box whose contents it has also received from a remote server. When a user clicks on the confirmation button, malware loads the corresponding link in their browser.&lt;/dd&gt;
  &lt;/dl&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2024/september/review_mobile/03_unwanted_q3_2024_en.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2024/september/review_mobile/03_unwanted_q3_2024_en.1.png" alt="Статистика вредоносных программ в почтовом трафике"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

  &lt;dl class="dlList"&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.FakeMoney&amp;lng=en"&gt;&lt;b&gt;Program.FakeMoney&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.11&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;The detection name for Android applications that allegedly allow users to earn money by completing different tasks. These apps make it look as if rewards are accruing for each one that is completed. At the same time, users are told they have to accumulate a certain sum to withdraw their “earnings”. Typically, such apps have a list of popular payment systems and banks that supposedly could be used to withdraw the rewards. But even if users succeed in accumulating the needed amount, in reality they cannot get any real payments. This virus record is also used to detect other unwanted software based on the source code of such apps.&lt;/dd&gt;
    
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.CloudInject&amp;lng=en"&gt;&lt;b&gt;Program.CloudInject&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;The detection name for Android programs that have been modified using the CloudInject cloud service and the eponymous Android utility (the latter was added to the Dr.Web virus database as &lt;a href="https://vms.drweb.com/search/?q=Tool.CloudInject&amp;lng=en"&gt;&lt;b&gt;Tool.CloudInject&lt;/b&gt;&lt;/a&gt;). Such programs are modified on a remote server; meanwhile, the modders (users) who are interested in such modifications cannot control exactly what will be added to the apps. Moreover, these programs receive a number of dangerous system permissions. Once modification is complete, users can remotely manage these apps. They can block them, display custom dialogs, and track when other software is being installed or removed from a device, etc.&lt;/dd&gt;
    
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.FakeAntiVirus&amp;lng=en"&gt;&lt;b&gt;Program.FakeAntiVirus&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;The detection name for adware programs that imitate anti-virus software. These apps inform users of nonexistent threats, mislead them, and demand that they purchase the software’s full version.&lt;/dd&gt;
    
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.SecretVideoRecorder&amp;lng=en"&gt;&lt;b&gt;Program.SecretVideoRecorder&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;The detection name for various modifications of an application that is designed to record videos and take photos in the background, using built-in Android device cameras. It can operate covertly by allowing notifications about ongoing recordings to be disabled. It also allows an app’s icon and name to be replaced with fake ones. This functionality makes this software potentially dangerous.&lt;/dd&gt;
    
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.TrackView&amp;lng=en"&gt;&lt;b&gt;Program.TrackView&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;The detection name for a program that allows users to be monitored via their Android devices. Malicious actors can utilize it to track a target device’s location, use the camera to record video and take photos, eavesdrop via the microphone, record audio, etc.&lt;/dd&gt;
  &lt;/dl&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2024/september/review_mobile/04_riskware_q3_2024_en.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2024/september/review_mobile/04_riskware_q3_2024_en.1.png" alt="Статистика вредоносных программ в почтовом трафике"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

  &lt;dl class="dlList"&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.Packer&amp;lng=en"&gt;&lt;b&gt;Tool.Packer&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;A packer tool designed to protect Android applications from unauthorized modifications and reverse engineering. This tool is not malicious in itself, but it can be used to protect both harmless and malicious software.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.17.origin&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;A riskware platform that allows applications to launch APK files without installing them. It creates a virtual runtime environment in the context of the apps in which they are integrated. The APK files, launched with the help of this platform, can operate as if they are part of such programs and can also obtain the same permissions.&lt;/dd&gt;
    &lt;dt&gt;&lt;b&gt;Tool.NPMod.1&lt;/b&gt;&lt;/dt&gt;
    &lt;dt&gt;&lt;b&gt;Tool.NPMod.2&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;The detection name for Android programs that have been modified using the NP Manager utility. A special module is embedded in such apps, and it allows them to bypass digital signature verification once they have been modified.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.LuckyPatcher&amp;lng=en"&gt;&lt;b&gt;Tool.LuckyPatcher&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;A tool that allows apps installed on Android devices to be modified (i.e., by creating patches for them) in order to change the logic of their work or to bypass certain restrictions. For instance, users can apply it to disable root-access verification in banking software or to obtain unlimited resources in games. To add patches, this utility downloads specially prepared scripts from the Internet, which can be crafted and added to the common database by any third party. The functionality of such scripts can prove to be malicious; thus, patches made with this tool can pose a potential threat.&lt;/dd&gt;   
  &lt;/dl&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2024/september/review_mobile/05_adware_q3_2024_en.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2024/september/review_mobile/05_adware_q3_2024_en.1.png" alt="Статистика вредоносных программ в почтовом трафике"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

  &lt;dl class="dlList"&gt;
    &lt;dt&gt;&lt;b&gt;Adware.ModAd.1&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;The detection name for some modified versions (mods) of the WhatsApp messenger, whose functions have been injected with a specific code. This code is responsible for loading target URLs by displaying web content (via the Android WebView component) when the messenger is in operation. Such web addresses perform redirects to advertised sites, including online casino, bookmaker, and adult sites.&lt;/dd&gt;
    &lt;dt&gt;&lt;b&gt;Adware.Basement.1&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;These are apps that display unwanted ads which often lead to malicious and fraudulent websites. They share a common code base with the &lt;a href="https://vms.drweb.com/search/?q=Program.FakeMoney&amp;lng=en"&gt;&lt;b&gt;Program.FakeMoney&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.11&lt;/b&gt; unwanted applications.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.Fictus&amp;lng=en"&gt;&lt;b&gt;Adware.Fictus&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;An adware module that malicious actors embed into the cloned versions of popular Android games and applications. Its incorporation is facilitated by a specialized net2share packer. Copies of software created this way are then distributed through various software catalogs. When installed on Android devices, such apps and games display obnoxious ads.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.Adpush&amp;lng=en"&gt;&lt;b&gt;Adware.Adpush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.21846&lt;/b&gt;&lt;/dt&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.AdPush&amp;lng=en"&gt;&lt;b&gt;Adware.AdPush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.39.origin&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;Adware modules that can be built into Android apps. They display notifications containing ads that mislead users. For example, such notifications can look like messages from the operating system. In addition, these modules collect a variety of confidential data and are able to download other apps and initiate their installation.&lt;/dd&gt;  
  &lt;/dl&gt;

&lt;/section&gt;

&lt;section class="margTM margBM" id="formobile"&gt;
  &lt;h2 class="alignCenter"&gt;Threats on Google Play&lt;/h2&gt;

  &lt;p&gt;In Q3 2024, Doctor Web’s malware analysts continued uncovering threats on Google Play. Among these were many new &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; fake programs that were distributed under the guise of a variety of software. Malicious actors passed some of them off as finance-related programs, such as investing apps, financial reference books and teaching aids, different home bookkeeping tools, and so on. Quite a few of these did actually provide the stated functionality, but their primary task is to load fraudulent websites. Such sites promise potential victims quick and easy money through investments, trading natural resources, cryptocurrency, etc. To supposedly join the “service”, users are asked to register an account or to provide personal data by filling out an “application”.&lt;/p&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/september/review_mobile/06_Android.FakeApp.1643_q3_2024.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/september/review_mobile/06_Android.FakeApp.1643_q3_2024.1.png" alt="spinok_ads_2023"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/september/review_mobile/07_Android.FakeApp.1644_q3_2024.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/september/review_mobile/07_Android.FakeApp.1644_q3_2024.1.png" alt="spinok_ads_2023"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;p&gt;It is noteworthy that fraudsters disguised one of the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; trojans as an online dating and chat app. However, it also loaded a bogus “investing” site.&lt;/p&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2024/september/review_mobile/08_Android.FakeApp.1624_q3_2024.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2024/september/review_mobile/08_Android.FakeApp.1624_q3_2024.1.png" alt="Статистика вредоносных программ в почтовом трафике"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

  &lt;p&gt;Other &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; trojans were again distributed as games. Under certain conditions, they loaded online casino and bookmaker sites.&lt;/p&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/september/review_mobile/09_Android.FakeApp.1663_q3_2024.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/september/review_mobile/09_Android.FakeApp.1663_q3_2024.1.png" alt="spinok_ads_2023"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/september/review_mobile/10_Android.FakeApp.1649_q3_2024.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/september/review_mobile/10_Android.FakeApp.1649_q3_2024.1.png" alt="spinok_ads_2023"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;p&gt;Among these fake apps, our experts also detected new trojan variants that masquerade as job-search tools. Such malware loads fake job lists and suggests to users that they contact the applicable employer via a messenger (this “employer” is, in fact, a fraudster) or that they create a “resume” by providing personal data.&lt;/p&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/september/review_mobile/11_Android.FakeApp.1627_q3_2024.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/september/review_mobile/11_Android.FakeApp.1627_q3_2024.1.png" alt="spinok_ads_2023"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/september/review_mobile/12_Android.FakeApp.1661_q3_2024.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/september/review_mobile/12_Android.FakeApp.1661_q3_2024.1.png" alt="spinok_ads_2023"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;p&gt;Doctor Web’s virus analysts also discovered more &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; trojans on Google Play. These trojans conceal their icons from the home screen menu and start displaying intrusive ads. The detected malware was camouflaged as various apps, including image collections, photo-editing software, and barcode scanners.&lt;/p&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/september/review_mobile/13_Android.HiddenAds.4034_q3_2024.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/september/review_mobile/13_Android.HiddenAds.4034_q3_2024.1.png" alt="spinok_ads_2023"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/september/review_mobile/14_Android.HiddenAds.4100_q3_2024.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/september/review_mobile/14_Android.HiddenAds.4100_q3_2024.1.png" alt="spinok_ads_2023"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;p&gt;To protect your Android device from malware and unwanted programs, we recommend installing Dr.Web anti-virus products for Android.&lt;/p&gt;

  &lt;p&gt;&lt;a href="https://github.com/DoctorWebLtd/malware-iocs/blob/master/Q3%202024%20review%20of%20virus%20activity%20on%20mobile%20devices/README.adoc" target="_blank" rel="noopener noreferrer"&gt;Indicators of compromise&lt;/a&gt;&lt;/p&gt;

&lt;/section&gt;

&lt;style&gt;
    .custom-color-link a {
        color: #73b320;
    }
&lt;/style&gt;

</description></item><item><guid>https://news.drweb.com/show/?i=14868&amp;lng=en</guid><title>Doctor Web’s Q2 2024 review of virus activity on mobile devices</title><link>https://news.drweb.com/show/?i=14868&amp;lng=en&amp;c=38</link><pubDate>Mon, 01 Jul 2024 04:00:00 GMT</pubDate><description>


&lt;p&gt;&lt;b&gt;July 1, 2024&lt;/b&gt;&lt;/p&gt;

&lt;section class="margTM margBM" id="main"&gt;
&lt;p&gt;&lt;newslead&gt;According to detection statistics collected by the Dr.Web for Android anti-virus, in the second quarter of 2024, &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; adware-displaying trojans were most commonly detected on protected devices.&lt;/newslead&gt; The second most common malicious programs were trojans from the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; family. Cybercriminals use these to execute various fraudulent schemes. The most frequently detected representative of this family was &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1600&lt;/b&gt;, a trojan that our experts discovered in late May. It is distributed via malicious sites from which it is downloaded as a gaming app. However, when launched, this fake app loads the website specified in its settings. Known modifications of the program load an online casino site. Its visitors are offered the chance to play a “wheel of fortune” type of game, but when they try to do so, they are redirected to a registration page. The high detection rates of this malicious program can be explained by the fact that the people behind it are promoting it via in-app ads in other software, for example. When users tap on such an ad, they end up on a corresponding malicious website from which the trojan is downloaded. The third most widespread malicious programs were &lt;a href="https://vms.drweb.com/search/?q=Android.Spy&amp;lng=en"&gt;&lt;b&gt;Android.Spy&lt;/b&gt;&lt;/a&gt; trojans, which possess spyware functionality.&lt;/p&gt;
&lt;p&gt;At the same time, Doctor Web’s virus laboratory uncovered more threats on Google Play. Among them were various fake apps from the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; family and the unwanted &lt;a href="https://vms.drweb.com/search/?q=Program.FakeMoney&amp;lng=en"&gt;&lt;b&gt;Program.FakeMoney&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.11&lt;/b&gt; app, which supposedly allows virtual rewards to be converted into real money that can then be withdrawn. Moreover, threat actors again used Google Play to distribute a trojan that subscribes victims to paid services.&lt;/p&gt;

  &lt;div class="paddXM paddYM bg_ocean_1 white custom-color-link"&gt;
    &lt;h4 class="white alignCenter"&gt;PRINCIPAL TRENDS OF Q2 2024&lt;/h4&gt;
    &lt;ul&gt;
      &lt;li&gt;Android.HiddenAds ad-displaying trojans remain the most active Android threats&lt;/li&gt;
      &lt;li&gt;The emergence of more threats on Google Play&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/div&gt;
&lt;/section&gt;


&lt;section class="margTM margBM" id="stat"&gt;
  &lt;h2 class="alignCenter"&gt;According to statistics collected by Dr.Web for Android&lt;/h2&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2024/june/review_mobile/01_malware_q2_2024_en.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2024/june/review_mobile/01_malware_q2_2024_en.1.png" alt="According to statistics collected by Dr.Web for Android"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

  &lt;dl class="dlList"&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1600&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;A trojan app that loads a website that is hardcoded into its settings. Known modifications of this malicious program load an online casino site.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3956&lt;/b&gt;&lt;/dt&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3980&lt;/b&gt;&lt;/dt&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3989&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;Trojan apps designed to display intrusive ads. Trojans of this family are often distributed as popular and harmless applications. In some cases, other malware can install them in the system directory. When these infect Android devices, they typically conceal their presence from the user. For example, they “hide” their icons from the home screen menu.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.Spy.5106&amp;lng=en"&gt;&lt;b&gt;Android.Spy.5106&lt;/b&gt;&lt;/a&gt;&lt;/dt&gt;
      &lt;dd&gt;The detection name for a trojan that presents itself as modified versions of unofficial WhatsApp messenger mods. This malicious program can steal the contents of notifications and offer users other apps from unknown sources for installation. And when such a modified messenger is used, it can also display dialog boxes containing remotely configurable content.&lt;/dd&gt;
  &lt;/dl&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2024/june/review_mobile/02_program_q2_2024_en.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2024/june/review_mobile/02_program_q2_2024_en.1.png" alt="Статистика вредоносных программ в почтовом трафике"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

  &lt;dl class="dlList"&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.CloudInject&amp;lng=en"&gt;&lt;b&gt;Program.CloudInject&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;The detection name for Android programs that have been modified using the CloudInject cloud service and the eponymous Android utility (the latter was added to the Dr.Web virus database as &lt;a href="https://vms.drweb.com/search/?q=Tool.CloudInject&amp;lng=en"&gt;&lt;b&gt;Tool.CloudInject&lt;/b&gt;&lt;/a&gt;). Such programs are modified on a remote server; meanwhile, the modders (users) who are interested in such modifications cannot control exactly what will be added to the apps. Moreover, these programs receive a number of dangerous system permissions. Once modification is complete, users can remotely manage these apps. They can block them, display custom dialogs, and track when other software is being installed or removed from a device, etc.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.FakeMoney&amp;lng=en"&gt;&lt;b&gt;Program.FakeMoney&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.11&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;The detection name for Android applications that allegedly allow users to earn money by watching video clips and ads. These apps make it look as if rewards are accruing for completed tasks. To withdraw their “earnings”, users allegedly have to collect a certain sum. But even if they succeed, in reality they cannot get any real payments.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.FakeAntiVirus&amp;lng=en"&gt;&lt;b&gt;Program.FakeAntiVirus&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;The detection name for adware programs that imitate anti-virus software. These apps inform users of nonexistent threats, mislead them, and demand that they purchase the software’s full version.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.TrackView.&amp;lng=en"&gt;&lt;b&gt;Program.TrackView.&lt;/b&gt;&lt;/a&gt;&lt;b&gt;1.origin&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;The detection name for a program that allows users to be monitored via their Android devices. Malicious actors can utilize it to track a target device’s location, use the camera to record video and take photos, eavesdrop via the microphone, record audio, etc.&lt;/dd&gt; 
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.SecretVideoRecorder&amp;lng=en"&gt;&lt;b&gt;Program.SecretVideoRecorder&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;The detection name for various modifications of an application that is designed to record videos and take photos in the background using built-in Android device cameras. It can operate covertly by allowing notifications about ongoing recordings to be disabled. It also allows an app’s icon and name to be replaced with fake ones. This functionality makes this software potentially dangerous.&lt;/dd&gt;

  &lt;/dl&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2024/june/review_mobile/03_riskware_q2_2024_en.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2024/june/review_mobile/03_riskware_q2_2024_en.1.png" alt="Статистика вредоносных программ в почтовом трафике"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

  &lt;dl class="dlList"&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.17.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.14.origin&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;Riskware platforms that allow applications to launch APK files without installing them. They create a virtual runtime environment in the context of the apps in which they are integrated. The APK files, launched with the help of these platforms, can operate as if they are part of such programs and can also obtain the same permissions.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.Packer&amp;lng=en"&gt;&lt;b&gt;Tool.Packer&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;A packer tool designed to protect Android applications from unauthorized modifications and reverse engineering. This tool is not malicious in itself, but it can be used to protect both harmless and malicious software.&lt;/dd&gt;
    &lt;dt&gt;&lt;b&gt;Tool.NPMod.1&lt;/b&gt;&lt;/dt&gt;
    &lt;dt&gt;&lt;b&gt;Tool.NPMod.2&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;The detection name for Android programs that have been modified using the NP Manager utility. A special module is embedded in such apps, and it allows them to bypass digital signature verification once they have been modified.&lt;/dd&gt;    
  &lt;/dl&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2024/june/review_mobile/04_adware_q2_2024_en.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2024/june/review_mobile/04_adware_q2_2024_en.1.png" alt="Статистика вредоносных программ в почтовом трафике"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

  &lt;dl class="dlList"&gt;
    &lt;dt&gt;&lt;b&gt;Adware.ModAd.1&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;The detection name for some modified versions (mods) of the WhatsApp messenger whose functions have been injected with a specific code. This code is responsible for loading target URLs by displaying web content (via the Android WebView component) during the messenger’s operation. Such web addresses perform redirects to advertised sites, including online casino, bookmaker, and adult sites.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.AdPush&amp;lng=en"&gt;&lt;b&gt;Adware.AdPush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.39.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.Adpush&amp;lng=en"&gt;&lt;b&gt;Adware.Adpush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.21846&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;Adware modules that can be built into Android apps. They display notifications containing ads that mislead users. For example, such notifications can look like messages from the operating system. In addition, these modules collect a variety of confidential data and are able to download other apps and initiate their installation.&lt;/dd&gt;
    &lt;dt&gt;&lt;b&gt;Adware.ShareInstall.1.origin&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;An adware module that can be built into Android applications. It displays notifications containing ads on the Android OS lock screen.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.Airpush&amp;lng=en"&gt;&lt;b&gt;Adware.Airpush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7.origin&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;A member of a family of adware modules that can be built into Android apps and display various ads. Depending on the modules’ version and modification, these can be notifications containing ads, pop-up windows or banners. Malicious actors often use these modules to distribute malware by offering their potential victims diverse software for installation. Moreover, such modules collect personal information and send it to a remote server.&lt;/dd&gt;   
  &lt;/dl&gt;

&lt;/section&gt;

&lt;section class="margTM margBM" id="formobile"&gt;
  &lt;h2 class="alignCenter"&gt;Threats on Google Play&lt;/h2&gt;
  &lt;p&gt;In Q2 2024, Doctor Web’s virus laboratory discovered more &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; trojans on Google Play. Some of them were being distributed under the guise of finance-themed software and apps for participating in surveys and quizzes:&lt;/p&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/june/review_mobile/05_Android.FakeApp.1498.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/june/review_mobile/05_Android.FakeApp.1498.png" alt="spinok_ads_2023"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/june/review_mobile/06_Android.FakeApp.1602.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/june/review_mobile/06_Android.FakeApp.1602.png" alt="spinok_ads_2023"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/june/review_mobile/07_Android.FakeApp.1604.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/june/review_mobile/07_Android.FakeApp.1604.png" alt="spinok_ads_2023"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;p&gt;They could load fraudulent sites on which potential victims, supposedly on behalf of famous credit organizations, as well as oil and gas companies, were offered the chance of getting a finance education or becoming investors. To access one or another “service”, users had to answer several questions and then provide personal data.&lt;/p&gt;
  &lt;p&gt;Other &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; trojans were hiding in different games. Under certain conditions, instead of the declared functionality, they would load bookmaker and online casino websites. &lt;/p&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/june/review_mobile/08_Android.FakeApp.1601.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/june/review_mobile/08_Android.FakeApp.1601.png" alt="spinok_ads_2023"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/june/review_mobile/09_Android.FakeApp.1608.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/june/review_mobile/09_Android.FakeApp.1608.png" alt="spinok_ads_2023"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;p&gt;Another trojan from this family, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1607&lt;/b&gt;, was disguised as an image collection app. It did provide the claimed functionality but could also load online casino websites instead.&lt;/p&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2024/june/review_mobile/10_Android.FakeApp.1607.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2024/june/review_mobile/10_Android.FakeApp.1607.png" alt="According to statistics collected by Dr.Web for Android"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

  &lt;p&gt;Threat actors passed off several &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; members as job-search programs:&lt;/p&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/june/review_mobile/11_Android.FakeApp.1605.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/june/review_mobile/11_Android.FakeApp.1605.png" alt="spinok_ads_2023"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/june/review_mobile/12_Android.FakeApp.1606.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/june/review_mobile/12_Android.FakeApp.1606.png" alt="spinok_ads_2023"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;p&gt;These trojans (&lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1605&lt;/b&gt; and &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1606&lt;/b&gt;) load fake vacancy lists where users are asked to contact “employers” via messengers (Telegram, for example) or to send out a “resume” by providing personal data. After attracting their potential victims’ attention, fraudsters can lure them to various dubious money-making schemes in an attempt to steal their money.&lt;/p&gt;

  &lt;p&gt;Our specialists also discovered another unwanted program from the &lt;a href="https://vms.drweb.com/search/?q=Program.FakeMoney&amp;lng=en"&gt;&lt;b&gt;Program.FakeMoney&lt;/b&gt;&lt;/a&gt; family. Such apps offer users various tasks to complete in order to receive virtual rewards. These rewards supposedly could then be withdrawn as real money. In fact, these programs mislead Android device owners as no real payouts are made. The purpose of such software is to encourage users to keep using it as long as possible so that the displayed ads bring a profit to the developers.&lt;/p&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2024/june/review_mobile/13_Program.FakeMoney.11.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2024/june/review_mobile/13_Program.FakeMoney.11.png" alt="According to statistics collected by Dr.Web for Android"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

  &lt;p&gt;One identified app (&lt;a href="https://vms.drweb.com/search/?q=Program.FakeMoney&amp;lng=en"&gt;&lt;b&gt;Program.FakeMoney&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.11&lt;/b&gt;) is a variation of the win-win “one-arm bandit” game. When users play it and also watch the in-app ads, they receive virtual rewards. When they try to withdraw their “earned” money, the program delays this process, putting more and more conditions on it. If users eventually “successfully” submit a withdrawal request, they will end up in some “under consideration” queue of up to several thousand other “applicants”.&lt;/p&gt;
  &lt;p&gt;In addition, another trojan from the &lt;a href="https://vms.drweb.com/search/?q=Android.Harly&amp;lng=en"&gt;&lt;b&gt;Android.Harly&lt;/b&gt;&lt;/a&gt; family (&lt;a href="https://vms.drweb.com/search/?q=Android.Harly&amp;lng=en"&gt;&lt;b&gt;Android.Harly&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.87&lt;/b&gt;) was distributed via Google Play. Malicious programs of this family subscribe victims to paid services.&lt;/p&gt;
  
  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2024/june/review_mobile/14_Android.Harly.82.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2024/june/review_mobile/14_Android.Harly.82.png" alt="According to statistics collected by Dr.Web for Android"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

  &lt;p&gt;To protect your Android device from malware and unwanted programs, we recommend installing Dr.Web anti-virus products for Android.&lt;/p&gt;

  &lt;p&gt;&lt;a href="https://github.com/DoctorWebLtd/malware-iocs/blob/master/Q2%202024%20review%20of%20virus%20activity%20on%20mobile%20devices/README.adoc" target="_blank" rel="noopener noreferrer"&gt;Indicators of compromise&lt;/a&gt;&lt;/p&gt;

&lt;/section&gt;

&lt;style&gt;
    .custom-color-link a {
        color: #73b320;
    }
&lt;/style&gt;

</description></item><item><guid>https://news.drweb.com/show/?i=14860&amp;lng=en</guid><title>Smart-sex-toy users targeted by clicker trojan</title><link>https://news.drweb.com/show/?i=14860&amp;lng=en&amp;c=38</link><pubDate>Sat, 04 May 2024 04:00:00 GMT</pubDate><description>&lt;p&gt;&lt;b&gt;4 may 2024&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;newslead&gt;Virus analysts at Doctor Web uncovered an Android application containing a clicker trojan that silently opens advertising sites and clicks on webpages. Such trojans can be used to stealthily display ads, generate click fraud, sign up unsuspecting victims for paid subscriptions or launch DDoS attacks.&lt;/newslead&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Origins Tracing™ technology, which detects threats based on behavioral analysis, has been used in the Dr.Web for Android antivirus for more than a decade. It was this component that prevented the infection of one of our user’s devices by detecting the presence of suspicious components in a Love Spouse app downloaded from the Google Play store. The application is used to control adult toys. It contained the &lt;a href="https://vms.drweb.com/search/?q=Android.Click.414.origin&amp;lng=en"&gt;&lt;b&gt;Android.Click.414.origin&lt;/b&gt;&lt;/a&gt; clicker trojan disguised as the com.android.logcatch library, a standard debugging component. In addition to the Love Spouse app, the same trojan has been detected in the QRunning physical activity tracking app. Both apps were developed by Chinese companies. The apps are quite popular, having been installed on over 1.5 million devices. Apparently, the malicious code was embedded recently, in the last few versions of the apps. It should be mentioned that the Love Spouse developer has since updated that application, and as of version 1.8.8, it no longer contains the trojan. However, no corrective updates have been released yet for QRunning.&lt;/p&gt;


  &lt;div class="margTM margBM flex center"&gt;
    &lt;div&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/may/01_android.click.410.origin.webp" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/may/01_android.click.410.origin.3.webp" alt="Android.Click.414.origin"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/may/02_android.click.410.origin.webp" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/may/02_android.click.410.origin.3.webp" alt="Android.Click.414.origin"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/may/03_android.click.410.origin.webp" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/may/03_android.click.410.origin.3.webp" alt="Android.Click.414.origin"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/may/04_android.click.410.origin.webp" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/may/04_android.click.410.origin.3.webp" alt="Android.Click.414.origin"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;p class="alignCenter fontXS"&gt;Screenshots of Love Spouse and QRunning apps&lt;/p&gt;

&lt;p&gt;This malware is a modification of the Android.Click.410.origin trojan that popped up on our radar last April. At that time, the virus lab received a ticket from our user whose antivirus had detected a new file on the system partition of their V88mini TV box. It was the downloader for Android.Click.410.origin. There is no reliable information on how exactly the infection occurred. However, we should note that the operating system installed on this device was not what it claimed to be. The product card claimed that the TV box was based on Android 12, and the system information page showed the same. However, the Build ID value, which is a unique identifier of the OS build, corresponds to Android 7. Unfortunately, this situation is quite typical for low-end TV boxes. And as if to prove this point, a similar ticket soon came in from another user. The same Android.Click.410.origin trojan and the same OS spoofing tactics were observed on a X96Q TV box. Only in this case the trojan was embedded in the Desk Clock application.&lt;/p&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--o"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/may/05_android.click.410.origin.webp" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/may/05_android.click.410.origin.webp" alt="Android.Click.414.origin"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/may/06_android.click.410.origin.webp" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/may/06_android.click.410.origin.webp" alt="Android.Click.414.origin"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

&lt;p class="alignCenter fontXS"&gt;Probable culprits. For more information on just how big of a threat these devices can be, see our &lt;a href="https://news.drweb.com/show/?i=14743&amp;lng=en" target="_blank" rel="noopener noreferrer"&gt;news story on Pandora trojans&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Detailed analysis revealed that the trojan has a modular design. One of the modules is used to gather information about the device, while the other two modules stealthily download webpages, display advertisements and perform clicks. The trojan can also detect that its host application is running in a controlled environment. If it detects signs of emulation, it tells its control server not to send advertising tasks. It is also worth noting that the trojan is selective and will not even run on devices where the interface language is set to Chinese.&lt;/p&gt;
&lt;p&gt;If successfully launched, the trojan sends fairly detailed device information (brand, model, OS version, IP address, region selected in the settings, carrier code, and others) to its control server and then activates one of its two built-in strategies. As part of these tasks, the trojan secretly loads websites using the WebView component included in the Android operating system. This component allows webpages to be loaded without launching a browser. The trojan can scroll webpages, enter text into forms, and mute audio if the websites it opens play audio or video. To perform these actions, the trojan executes JavaScript code received from its C2 server in the WebView where the target ad page is loaded. In addition, the trojan can take screenshots of the loaded page and send them to the server, analyze them pixel by pixel, and determine clickable areas. For some tasks, the trojan uses Bing, Yahoo, and Google search engines to provide advertising links based on keywords.&lt;/p&gt;
&lt;p&gt;Initially, this malware was detected in apps available on unofficial Android app sites, but in February 2024, this trojan infiltrated the official Google Play app store. The Love Spouse app was most likely compromised sometime after the release of version 1.8.1, which did not yet contain the trojan.&lt;/p&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--o"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/may/07_android.click.410.origin.webp" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/may/07_android.click.410.origin.webp" alt="Android.Click.414.origin"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

&lt;p class="alignCenter fontXS"&gt;The seller is surprised by the feedback from one of our users that there is a trojan in the Love Spouse app and recommends using “a reputable antivirus instead”.&lt;/p&gt;

&lt;p&gt;Doctor Web reminds users to be careful when installing software on their devices. Dr.Web Security Space for Android detects and neutralizes Android.Click trojans, protecting our users' devices from malware.&lt;/p&gt;

&lt;a href="https://github.com/DoctorWebLtd/malware-iocs/tree/master/Android.Click.414.origin" target="_blank" rel="noopener noreferrer"&gt;Indicators of compromise&lt;/a&gt;

&lt;style&gt;
.center {
 justify-content: center; 
 gap: 16px;
}
&lt;/style&gt;</description></item><item><guid>https://news.drweb.com/show/?i=14834&amp;lng=en</guid><title>Doctor Web’s February 2024 review of virus activity on mobile devices</title><link>https://news.drweb.com/show/?i=14834&amp;lng=en&amp;c=38</link><pubDate>Mon, 01 Apr 2024 05:00:00 GMT</pubDate><description>


&lt;p&gt;&lt;b&gt;April 1, 2024&lt;/b&gt;&lt;/p&gt;

&lt;section class="margTM margBM" id="main"&gt;
&lt;p&gt;&lt;newslead&gt;According to detection statistics collected by the Dr.Web for Android anti-virus, February 2024 saw a significant increase in &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; trojan family activity―it was up 73.26% from January. At the same time, users were 58.85% less likely to encounter the adware trojan family &lt;a href="https://vms.drweb.com/search/?q=Android.MobiDash&amp;lng=en"&gt;&lt;b&gt;Android.MobiDash&lt;/b&gt;&lt;/a&gt;.&lt;/newslead&gt;&lt;/p&gt;

&lt;p&gt;The activity of banking trojans from various families decreased by 18.77%, while &lt;a href="https://vms.drweb.com/search/?q=Android.Spy&amp;lng=en"&gt;&lt;b&gt;Android.Spy&lt;/b&gt;&lt;/a&gt; spyware trojan activity decreased by 27.33%. In contrast, the number of &lt;a href="https://vms.drweb.com/search/?q=Android.Locker&amp;lng=en"&gt;&lt;b&gt;Android.Locker&lt;/b&gt;&lt;/a&gt; ransomware trojan detections increased by 29.85%.&lt;/p&gt;

  &lt;div class="paddXM paddYM bg_ocean_1 white custom-color-link"&gt;
    &lt;h4 class="white alignCenter"&gt;PRINCIPAL TRENDS IN FEBRUARY&lt;/h4&gt;
    &lt;ul&gt;
      &lt;li&gt;A significant increase in activity on the part of advertising tojan programs from the &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; family&lt;/li&gt;
      &lt;li&gt;Fewer attacks carried out by banking trojans and malicious spyware &lt;/li&gt;
      &lt;li&gt;An increase in the number of malicious ransomware programs detected on protected devices&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/div&gt;
&lt;/section&gt;

&lt;section class="margTM margBM" id="stat"&gt;
  &lt;h2 class="alignCenter"&gt;According to statistics collected by Dr.Web for Android&lt;/h2&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2024/february/review_mobile/01_malware_february_2024_en.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2024/february/review_mobile/01_malware_february_2024_en.png" alt="malware_february_2024"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

&lt;dl class="dlList"&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3956&lt;/b&gt;&lt;/dt&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3851&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;Trojan apps designed to display intrusive ads. Trojans of this family are often distributed as popular and harmless applications. In some cases, other malware can install them in the system directory. When these infect Android devices, they typically conceal their presence from the user. For example, they “hide” their icons from the home screen menu.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.Spy.5106&amp;lng=en"&gt;&lt;b&gt;Android.Spy.5106&lt;/b&gt;&lt;/a&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for a trojan that presents itself as modified versions of unofficial WhatsApp messenger mods. This malicious program can steal the contents of notifications and offer users other apps from unknown sources for installation. And when such a modified messenger is used, it can also display dialog boxes containing remotely configurable content.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds.Aegis&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds.Aegis&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds.Aegis&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds.Aegis&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.4.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;These are the trojan apps that conceal their presence on Android devices and display intrusive ads. They have a number of characteristics that differentiate them from other members of the &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; family. For example, these trojans can run automatically after they are installed. Moreover, they implement a mechanism that allows their services to remain constantly running. And, in some cases, they can also use hidden Android operating system functions.&lt;/dd&gt;
&lt;/dl&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2024/february/review_mobile/02_unwanted_february_2024_en.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2024/february/review_mobile/02_unwanted_february_2024_en.png" alt="unwanted_february_2024"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

&lt;dl class="dlList"&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.CloudInject&amp;lng=en"&gt;&lt;b&gt;Program.CloudInject&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for Android programs that have been modified using the CloudInject cloud service and the eponymous Android utility (the latter was added to the Dr.Web virus database as &lt;a href="https://vms.drweb.com/search/?q=Tool.CloudInject&amp;lng=en"&gt;&lt;b&gt;Tool.CloudInject&lt;/b&gt;&lt;/a&gt;). Such programs are modified on a remote server; meanwhile, the modders (users) who are interested in such modifications cannot control exactly what will be added to the apps. Moreover, these programs receive a number of dangerous system permissions. Once modification is complete, users can remotely manage these apps. They can block them, display custom dialogs, and track when other software is being installed or removed from a device, etc.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.FakeAntiVirus&amp;lng=en"&gt;&lt;b&gt;Program.FakeAntiVirus&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for adware programs that imitate anti-virus software. These apps inform users of nonexistent threats, mislead them, and demand that they purchase the software’s full version.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.wSpy&amp;lng=en"&gt;&lt;b&gt;Program.wSpy&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;A commercial spyware app designed to covertly monitor Android device user activity. It allows intruders to read SMS and chats in popular messaging software, listen to the surroundings, track device location and browser history, gain access to the phonebook and contacts, photos and videos, and take screenshots and pictures through a device’s built-in camera. It also has keylogger functionality.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.TrackView&amp;lng=en"&gt;&lt;b&gt;Program.TrackView&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for a program that allows users to be monitored via their Android devices. Malicious actors can utilize it to track a target device’s location, use the camera to record video and take photos, eavesdrop via the microphone, record audio, etc.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.SecretVideoRecorder&amp;lng=en"&gt;&lt;b&gt;Program.SecretVideoRecorder&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt; The detection name for various modifications of an application that is designed to record videos and take photos in the background using built-in Android device cameras. It can operate covertly by allowing notifications about ongoing recordings to be disabled. It also allows an app’s icon and name to be replaced with fake ones. This functionality makes this software potentially dangerous.&lt;/dd&gt;
&lt;/dl&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2024/february/review_mobile/03_riskware_february_2024_en.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2024/february/review_mobile/03_riskware_february_2024_en.png" alt="riskware_february_2024"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

&lt;dl class="dlList"&gt;
    &lt;dt&gt;&lt;b&gt;Tool.NPMod.1&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for Android programs that have been modified using the NP Manager utility. A special module is embedded in such apps, and it allows them to bypass digital signature verification once they have been modified.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.14.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.6.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;Riskware platforms that allow applications to launch APK files without installing them. They create a virtual runtime environment in the context of the apps in which they are integrated. The APK files, launched with the help of these platforms, can operate as if they are part of such programs and can also obtain the same permissions.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.LuckyPatcher&amp;lng=en"&gt;&lt;b&gt;Tool.LuckyPatcher&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;A tool that allows apps installed on Android devices to be modified (i.e., by creating patches for them) in order to change the logic of their work or to bypass certain restrictions. For instance, users can apply it to disable root-access verification in banking software or to obtain unlimited resources in games. To add patches, this utility downloads specially prepared scripts from the Internet, which can be crafted and added to the common database by any third party. The functionality of such scripts can prove to be malicious; thus, patches made with this tool can pose a potential threat.&lt;/dd&gt;
&lt;/dl&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2024/february/review_mobile/04_adware_february_2024_en.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2024/february/review_mobile/04_adware_february_2024_en.png" alt="adware_february_2024"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

&lt;dl class="dlList"&gt;
    &lt;dt&gt;&lt;b&gt;Adware.ModAd.1&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for some modified versions (mods) of the WhatsApp messenger whose functions have been injected with a specific code. This code is responsible for loading target URLs by displaying web content (via the Android WebView component) during the messenger’s operation. Such web addresses perform redirects to advertised sites, including online casino, bookmaker, and adult sites.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.Adpush&amp;lng=en"&gt;&lt;b&gt;Adware.Adpush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.21846&lt;/b&gt;&lt;/dt&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.AdPush&amp;lng=en"&gt;&lt;b&gt;Adware.AdPush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.39.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;Adware modules that can be built into Android apps. They display notifications containing ads that mislead users. For example, such notifications can look like messages from the operating system. In addition, these modules collect a variety of confidential data and are able to download other apps and initiate their installation.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.Airpush&amp;lng=en"&gt;&lt;b&gt;Adware.Airpush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;A member of a family of adware modules that can be built into Android apps and display various ads. Depending on the modules’ version and modification, these can be notifications containing ads, pop-up windows or banners. Malicious actors often use these modules to distribute malware by offering their potential victims diverse software for installation. Moreover, such modules collect personal information and send it to a remote server.&lt;/dd&gt;
    &lt;dt&gt;&lt;b&gt;Adware.ShareInstall.1.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;An adware module that can be built into Android applications. It displays notifications containing ads on the Android OS lock screen.&lt;/dd&gt;
&lt;/dl&gt;

&lt;p&gt;To protect your Android device from malware and unwanted programs, we recommend installing Dr.Web anti-virus products for Android.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://github.com/DoctorWebLtd/malware-iocs/blob/master/February%202024%20review%20of%20virus%20activity%20on%20mobile%20devices/README.adoc" target="_blank" rel="noopener noreferrer"&gt;Indicators of compromise&lt;/a&gt;&lt;/p&gt;

&lt;/section&gt;

&lt;style&gt;
    .custom-color-link a {
        color: #73b320;
    }
&lt;/style&gt;

</description></item><item><guid>https://news.drweb.com/show/?i=14833&amp;lng=en</guid><title>Doctor Web’s January 2024 review of virus activity on mobile devices</title><link>https://news.drweb.com/show/?i=14833&amp;lng=en&amp;c=38</link><pubDate>Fri, 29 Mar 2024 03:00:00 GMT</pubDate><description>


&lt;p&gt;&lt;b&gt;March 29, 2024&lt;/b&gt;&lt;/p&gt;

&lt;section class="margTM margBM" id="main"&gt;
&lt;p&gt;&lt;newslead&gt; According to detection statistics collected by the Dr.Web for Android anti-virus, in January 2024, users were most likely to encounter &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; trojan applications; these were detected on protected devices 54.45% more often than in December 2023. At the same time, the activity of another adware trojan family, &lt;a href="https://vms.drweb.com/search/?q=Android.MobiDash&amp;lng=en"&gt;&lt;b&gt;Android.MobiDash&lt;/b&gt;&lt;/a&gt;, remained virtually unchanged, increasing by only 0.90%.&lt;/newslead&gt;&lt;/p&gt;
&lt;p&gt; The number of attacks carried out by various banking trojan families increased by 17.04%, &lt;a href="https://vms.drweb.com/search/?q=Android.Spy&amp;lng=en"&gt;&lt;b&gt;Android.Spy&lt;/b&gt;&lt;/a&gt; spyware trojan attacks increased by 11.16%, and &lt;a href="https://vms.drweb.com/search/?q=Android.Locker&amp;lng=en"&gt;&lt;b&gt;Android.Locker&lt;/b&gt;&lt;/a&gt; ransomware attacks increased by an insignificant 0.92%.&lt;/p&gt;
&lt;p&gt;At the same time, our specialists uncovered more threats on Google Play, including a new family of unwanted adware modules dubbed &lt;a href="https://vms.drweb.com/search/?q=Adware.StrawAd&amp;lng=en"&gt;&lt;b&gt;Adware.StrawAd&lt;/b&gt;&lt;/a&gt; and new trojans from the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; family. Malicious actors use the latter to execute various fraudulent schemes.&lt;/p&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/01_Adware.StrawAd_dev_1.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/01_Adware.StrawAd_dev_1.png" alt="Adware.StrawAd"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/02_Adware.StrawAd_dev_2.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/02_Adware.StrawAd_dev_2.png" alt="Adware.StrawAd"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

  &lt;div class="paddXM paddYM bg_ocean_1 white custom-color-link"&gt;
    &lt;h4 class="white alignCenter"&gt;PRINCIPAL TRENDS IN JANUARY&lt;/h4&gt;
    &lt;ul&gt;
      &lt;li&gt;Adware trojans from the &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; family maintained their lead in terms of the number of times they were detected on protected devices&lt;/li&gt;
      &lt;li&gt;Many Android malware families became more active&lt;/li&gt;
      &lt;li&gt;More threats were discovered on Google Play&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/div&gt;
&lt;/section&gt;


&lt;section class="margTM margBM" id="stat"&gt;
  &lt;h2 class="alignCenter"&gt;According to statistics collected by Dr.Web for Android&lt;/h2&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/03_malware_january_2024_en.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/03_malware_january_2024_en.png" alt="malware_january_2024"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

&lt;dl class="dlList"&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3851&lt;/b&gt;&lt;/dt&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3831&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;Trojan apps designed to display intrusive ads. Trojans of this family are often distributed as popular and harmless applications. In some cases, other malware can install them in the system directory. When these infect Android devices, they typically conceal their presence from the user. For example, they “hide” their icons from the home screen menu.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.Spy.5106&amp;lng=en"&gt;&lt;b&gt;Android.Spy.5106&lt;/b&gt;&lt;/a&gt;&lt;/dt&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.Spy.4498&amp;lng=en"&gt;&lt;b&gt;Android.Spy.4498&lt;/b&gt;&lt;/a&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for a trojan that presents itself as modified versions of unofficial WhatsApp messenger mods. This malicious program can steal the contents of notifications and offer users other apps from unknown sources for installation. And when such a modified messenger is used, it can also display dialog boxes containing remotely configurable content.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.MobiDash&amp;lng=en"&gt;&lt;b&gt;Android.MobiDash&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7805&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;A trojan that displays obnoxious ads. It is a special software module that developers incorporate into applications.&lt;/dd&gt;
&lt;/dl&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/04_unwanted_january_2024_en.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/04_unwanted_january_2024_en.png" alt="unwanted_january_2024"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

&lt;dl class="dlList"&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.CloudInject&amp;lng=en"&gt;&lt;b&gt;Program.CloudInject&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for Android programs that have been modified using the CloudInject cloud service and the eponymous Android utility (the latter was added to the Dr.Web virus database as &lt;a href="https://vms.drweb.com/search/?q=Tool.CloudInject&amp;lng=en"&gt;&lt;b&gt;Tool.CloudInject&lt;/b&gt;&lt;/a&gt;). Such programs are modified on a remote server; meanwhile, the modders (users) who are interested in such modifications cannot control exactly what will be added to the apps. Moreover, these programs receive a number of dangerous system permissions. Once modification is complete, users can remotely manage these apps. They can block them, display custom dialogs, and track when other software is being installed or removed from a device, etc.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.FakeAntiVirus&amp;lng=en"&gt;&lt;b&gt;Program.FakeAntiVirus&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for adware programs that imitate anti-virus software. These apps inform users of nonexistent threats, mislead them, and demand that they purchase the software’s full version.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.wSpy&amp;lng=en"&gt;&lt;b&gt;Program.wSpy&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;A commercial spyware app designed to covertly monitor Android device user activity. It allows intruders to read SMS and chats in popular messaging software, listen to the surroundings, track device location and browser history, gain access to the phonebook and contacts, photos and videos, and take screenshots and pictures through a device’s built-in camera. It also has keylogger functionality.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.FakeMoney&amp;lng=en"&gt;&lt;b&gt;Program.FakeMoney&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for Android applications that allegedly allow users to earn money by watching video clips and ads. These apps make it look as if rewards are accruing for completed tasks. To withdraw their “earnings”, users allegedly have to collect a certain sum. But even if they succeed, in reality they cannot get any real payments.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.TrackView&amp;lng=en"&gt;&lt;b&gt;Program.TrackView&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for a program that allows users to be monitored via their Android devices. Malicious actors can utilize it to track a target device’s location, use the camera to record video and take photos, eavesdrop via the microphone, record audio, etc.&lt;/dd&gt;
&lt;/dl&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/05_riskware_january_2024_en.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/05_riskware_january_2024_en.png" alt="riskware_january_2024"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

&lt;dl class="dlList"&gt;
    &lt;dt&gt;&lt;b&gt;Tool.NPMod.1&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for Android programs that have been modified using the NP Manager utility. A special module is embedded in such apps, and it allows them to bypass digital signature verification once they have been modified.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.14.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.6.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;Riskware platforms that allow applications to launch APK files without installing them. They create a virtual runtime environment in the context of the apps in which they are integrated. The APK files, launched with the help of these platforms, can operate as if they are part of such programs and can also obtain the same permissions.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.LuckyPatcher&amp;lng=en"&gt;&lt;b&gt;Tool.LuckyPatcher&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;A tool that allows apps installed on Android devices to be modified (i.e., by creating patches for them) in order to change the logic of their work or to bypass certain restrictions. For instance, users can apply it to disable root-access verification in banking software or to obtain unlimited resources in games. To add patches, this utility downloads specially prepared scripts from the Internet, which can be crafted and added to the common database by any third party. The functionality of such scripts can prove to be malicious; thus, patches made with this tool can pose a potential threat.&lt;/dd&gt;
&lt;/dl&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/06_adware_january_2024_en.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/06_adware_january_2024_en.png" alt="adware_january_2024"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

&lt;dl class="dlList"&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.StrawAd&amp;lng=en"&gt;&lt;b&gt;Adware.StrawAd&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for Android programs containing the built-in &lt;a href="https://vms.drweb.com/search/?q=Adware.StrawAd&amp;lng=en"&gt;&lt;b&gt;Adware.StrawAd&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt; unwanted adware module. This module displays ads from various advertising service providers when Android device screens are unlocked.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.AdPush&amp;lng=en"&gt;&lt;b&gt;Adware.AdPush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.39.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.Adpush&amp;lng=en"&gt;&lt;b&gt;Adware.Adpush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.21846&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;Adware modules that can be built into Android apps. They display notifications containing ads that mislead users. For example, such notifications can look like messages from the operating system. In addition, these modules collect a variety of confidential data and are able to download other apps and initiate their installation.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.Airpush&amp;lng=en"&gt;&lt;b&gt;Adware.Airpush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;A member of a family of adware modules that can be built into Android apps and display various ads. Depending on the modules’ version and modification, these can be notifications containing ads, pop-up windows or banners. Malicious actors often use these modules to distribute malware by offering their potential victims diverse software for installation. Moreover, such modules collect personal information and send it to a remote server.&lt;/dd&gt;
    &lt;dt&gt;&lt;b&gt;Adware.ShareInstall.1.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;An adware module that can be built into Android applications. It displays notifications containing ads on the Android OS lock screen.&lt;/dd&gt;
&lt;/dl&gt;
&lt;/section&gt;

&lt;section class="margTM margBM" id="googleplay"&gt;
  &lt;h2 class="alignCenter"&gt;Threats on Google Play&lt;/h2&gt;
  &lt;p&gt;At the beginning of January 2024, Doctor Web’s virus laboratory tracked down a number of games on Google Play containing the built-in &lt;a href="https://vms.drweb.com/search/?q=Adware.StrawAd&amp;lng=en"&gt;&lt;b&gt;Adware.StrawAd&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt; unwanted adware platform:&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;Crazy Sandwich Runner&lt;/li&gt;
  &lt;li&gt;Purple Shaker Master&lt;/li&gt;
  &lt;li&gt;Poppy Punch Playtime, Meme Cat Killer&lt;/li&gt;
  &lt;li&gt;Toiletmon Camera Playtime&lt;/li&gt;
  &lt;li&gt;Finger Heart Matching&lt;/li&gt;
  &lt;li&gt;Toilet Monster Defense&lt;/li&gt;
  &lt;li&gt;Toilet Camera Battle&lt;/li&gt;
  &lt;li&gt;Toimon Battle Playground&lt;/li&gt;
&lt;/ul&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/07_Adware.StrawAd.1.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/07_Adware.StrawAd.1.png" alt="Adware.StrawAd.1"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/08_Adware.StrawAd.3.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/08_Adware.StrawAd.3.png" alt="Adware.StrawAd.3"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/09_Adware.StrawAd.5.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/09_Adware.StrawAd.5.png" alt="Adware.StrawAd.5"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/10_Adware.StrawAd.6.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/10_Adware.StrawAd.6.png" alt="Adware.StrawAd.6"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/11_Adware.StrawAd.7.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/11_Adware.StrawAd.7.png" alt="Adware.StrawAd.7"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/12_Adware.StrawAd.9.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/12_Adware.StrawAd.9.png" alt="Adware.StrawAd.9"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

&lt;p&gt;This platform is a specialized encrypted software module that is stored in the resource directory of the host applications. When an Android device’s screen is unlocked, it can display ads coming from a variety of advertising service providers. Dr.Web anti-virus detects apps containing &lt;a href="https://vms.drweb.com/search/?q=Adware.StrawAd&amp;lng=en"&gt;&lt;b&gt;Adware.StrawAd&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt; as members of the &lt;a href="https://vms.drweb.com/search/?q=Adware.StrawAd&amp;lng=en"&gt;&lt;b&gt;Adware.StrawAd&lt;/b&gt;&lt;/a&gt; family.&lt;/p&gt;

&lt;p&gt;During January, our specialists also discovered a number of malicious fake programs from the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; family. For example, the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1579&lt;/b&gt; trojan was concealed in the Pleasant Collection app, which masqueraded as a program that lets users read comics.&lt;/p&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/13_Android.FakeApp.1579.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/13_Android.FakeApp.1579.png" alt="Android.FakeApp.1579"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

&lt;p&gt;However, its only task was to load fraudulent websites, which could include sites through which users could allegedly access certain games, including adult ones. Below is an example of one such site.&lt;/p&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--v"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/14_Android.FakeApp.1579_site1.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/14_Android.FakeApp.1579_site1.png" alt="Android.FakeApp.1579"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/14_Android.FakeApp.1579_site2.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/14_Android.FakeApp.1579_site2.png" alt="Android.FakeApp.1579"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/14_Android.FakeApp.1579_site3.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/14_Android.FakeApp.1579_site3.png" alt="Android.FakeApp.1579"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

&lt;p&gt;In this case, before “starting” the game, the potential victim is asked to answer several questions and then provide their personal data, followed by their bank card data―supposedly to verify the user’s age.&lt;/p&gt;

&lt;p&gt;Some of the malicious &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; programs discovered were again disguised as games. They were added to the Dr.Web virus database as &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1573&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1574&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1575&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1577&lt;/b&gt;, and &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.32.origin&lt;/b&gt;.&lt;/p&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/15_Android.FakeApp.1573.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/15_Android.FakeApp.1573.png" alt="Android.FakeApp.1573"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/16_Android.FakeApp.1574.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/16_Android.FakeApp.1574.png" alt="Android.FakeApp.1574"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/17_Android.FakeApp.1575.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/17_Android.FakeApp.1575.png" alt="Android.FakeApp.1575"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/18_Android.FakeApp.32.origin_1.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/18_Android.FakeApp.32.origin_1.png" alt="Android.FakeApp.32.origin"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/18_Android.FakeApp.32.origin_2.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/18_Android.FakeApp.32.origin_2.png" alt="Android.FakeApp.32.origin"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

&lt;p&gt;Under certain conditions, such fakes could load online casino and bookmaker websites. Examples of how they operate as games:&lt;/p&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/19_Android.FakeApp.32.origin_game1.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/19_Android.FakeApp.32.origin_game1.png" alt="Android.FakeApp.32.origin"&gt;
      &lt;/a&gt;
    &lt;/div&gt;

    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/19_Android.FakeApp.32.origin_game2.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/19_Android.FakeApp.32.origin_game2.png" alt="Android.FakeApp.32.origin"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;


  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/20_Android.FakeApp_game_jan2024_1.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/20_Android.FakeApp_game_jan2024_1.png" alt="Android.FakeApp"&gt;
      &lt;/a&gt;
    &lt;/div&gt;

    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/20_Android.FakeApp_game_jan2024_2.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/20_Android.FakeApp_game_jan2024_2.png" alt="Android.FakeApp"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

&lt;p&gt;An example of one of the websites they loaded:&lt;/p&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--v"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/21_Android.FakeApp_site1.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/21_Android.FakeApp_site1.png" alt="Android.FakeApp"&gt;
      &lt;/a&gt;
    &lt;/div&gt;

    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/21_Android.FakeApp_site2.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/21_Android.FakeApp_site2.png" alt="Android.FakeApp"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

&lt;p&gt;Loading online casino and bookmaker websites was also the task assigned to few other trojans. For instance, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1576&lt;/b&gt; malware was concealed in the Contour Casino Glam makeup teaching app and in Fortune Meme Studio―a meme-creation tool. And the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1578&lt;/b&gt; trojan was in the Lucky Flash Casino Light flashlight program.&lt;/p&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/22_Android.FakeApp.1576_1.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/22_Android.FakeApp.1576_1.png" alt="Android.FakeApp.1576"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/22_Android.FakeApp.1576_2.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/22_Android.FakeApp.1576_2.png" alt="Android.FakeApp.1576"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/22_Android.FakeApp.1578_1.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/22_Android.FakeApp.1578_1.png" alt="Android.FakeApp.1578"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

&lt;p&gt;Once installed, they operated as harmless apps, but after a while they could start loading target websites.&lt;/p&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--v"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/23_Android.FakeApp.1576_meme1.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/23_Android.FakeApp.1576_meme1.png" alt="Android.FakeApp"&gt;
      &lt;/a&gt;
    &lt;/div&gt;

    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/24_Android.FakeApp.1576_meme2.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/24_Android.FakeApp.1576_meme2.png" alt="Android.FakeApp"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--v"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/25_Android.FakeApp.1578_flashlight1.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/25_Android.FakeApp.1578_flashlight1.png" alt="Android.FakeApp"&gt;
      &lt;/a&gt;
    &lt;/div&gt;

    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/25_Android.FakeApp.1578_fladhlight2.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/25_Android.FakeApp.1578_fladhlight2.png" alt="Android.FakeApp"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--v"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/26_Android.FakeApp.1576_makeup1.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/26_Android.FakeApp.1576_makeup1.png" alt="Android.FakeApp.1576"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/26_Android.FakeApp.1576_makeup2.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/26_Android.FakeApp.1576_makeup2.png" alt="Android.FakeApp.1576"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/26_Android.FakeApp.1576_makeup3.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/26_Android.FakeApp.1576_makeup3.png" alt="Android.FakeApp.1576"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

&lt;p&gt;In addition, malicious actors distributed different variants of the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1564&lt;/b&gt; and &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1580&lt;/b&gt; trojans, disguising them as financial apps, reference books and teaching aids, programs for participating in surveys, and other software.&lt;/p&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/27_Android.FakeApp.1580_1.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/27_Android.FakeApp.1580_1.png" alt="Android.FakeApp.1580"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/28_Android.FakeApp.1564_1.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/28_Android.FakeApp.1564_1.png" alt="Android.FakeApp.1564"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/29_Android.FakeApp.1564_1.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/29_Android.FakeApp.1564_1.png" alt="Android.FakeApp.1564"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/30_Android.FakeApp.1564_1.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/30_Android.FakeApp.1564_1.png" alt="Android.FakeApp.1564"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

&lt;p&gt;These fake apps loaded bogus financial websites where potential victims were offered various services allegedly on behalf of well-known companies. For example, users “could” become investors or improve their financial literacy. To “access” one or another service, users had to take a survey and register an account by providing their personal data.&lt;/p&gt;

&lt;p&gt;Examples of websites loaded:&lt;/p&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--v"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/31_Android.FakeApp_finance_site_jan2024_1.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/31_Android.FakeApp_finance_site_jan2024_1.png" alt="Android.FakeApp"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/31_Android.FakeApp_finance_site_jan2024_2.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/31_Android.FakeApp_finance_site_jan2024_2.png" alt="Android.FakeApp"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/31_Android.FakeApp_finance_site_jan2024_3.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/31_Android.FakeApp_finance_site_jan2024_3.png" alt="Android.FakeApp"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--v"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/32_Android.FakeApp_finance_site_jan2024_1.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/32_Android.FakeApp_finance_site_jan2024_1.png" alt="Android.FakeApp"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/32_Android.FakeApp_finance_site_jan2024_2.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/32_Android.FakeApp_finance_site_jan2024_2.png" alt="Android.FakeApp"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/32_Android.FakeApp_finance_site_jan2024_3.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2024/january/review_mobile/32_Android.FakeApp_finance_site_jan2024_3.png" alt="Android.FakeApp"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

&lt;p&gt;To protect your Android device from malware and unwanted programs, we recommend installing Dr.Web anti-virus products for Android.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://github.com/DoctorWebLtd/malware-iocs/blob/master/January%202024%20review%20of%20virus%20activity%20on%20mobile%20devices/README.adoc" target="_blank" rel="noopener noreferrer"&gt;Indicators of compromise&lt;/a&gt;&lt;/p&gt;

&lt;!-- ANDROID_PROTECT_BLOCK_NEW --&gt;
&lt;div class="CellBlock noPadd AndroidBlockNew"&gt;
    &lt;div class="container"&gt;
        &lt;div class="-Grid_1of6 -viewM-Grid_1of1"&gt;

            &lt;div class="DecorBg" style="background-color: #4788aa;"&gt;&lt;/div&gt;

            &lt;div class="Grid Grid_span2 alignMiddle alignCenter paddYM" style="background: url(https://st.drweb.com/static/new-www/img/bg_blue_geom.1.jpg); center; background-size: cover; background-color: #4788aa;"&gt;
                &lt;img src="https://st.drweb.com/static/new-www/img/drweb_ss_blue_noBg.png" alt="Dr.Web Mobile Security"&gt;
            &lt;/div&gt;&lt;!--
                
            --&gt;&lt;div class="Grid Grid_span4 alignMiddle _viewM_paddYM"&gt;
                &lt;div class="paddLL _viewS_noPaddL"&gt;
                    &lt;h2 class="noMargY white _viewM_alignCenter"&gt;Your Android needs protection.&lt;/h2&gt;
                    &lt;h2 class="margTC noMargB white _viewM_alignCenter"&gt;Use Dr.Web&lt;/h2&gt;
                    &lt;ul class="IconList white fontM margBS _viewM_fontS"&gt;
                        &lt;li class="icon" data-icon="#common-tick.main_green_4"&gt;The first Russian anti-virus for Android&lt;/li&gt;
                        &lt;li class="icon" data-icon="#common-tick.main_green_4"&gt;Over 140 million downloads—just from Google Play&lt;/li&gt;
                        &lt;li class="icon" data-icon="#common-tick.main_green_4"&gt;Available free of charge for users of Dr.Web home products&lt;/li&gt;
                    &lt;/ul&gt;
                    &lt;p class="noMargY _viewM_alignCenter"&gt;
                        &lt;a href="https://f2.drweb.com/lr/?to=https%3A%2F%2Fdownload.drweb.com%2Fandroid%2F%3Flng%3Den%26from%3DANDROID_PROTECT_BLOCK_NEW" class="Btn bg_main_green_5"&gt;
                            &lt;span class="Btn-body icon icon_right" data-icon="#common-arrowRight"&gt;
                                &lt;span class="Btn-text uppercase"&gt;Free download&lt;/span&gt;
                            &lt;/span&gt;
                        &lt;/a&gt;    
                    &lt;/p&gt;
                &lt;/div&gt;
            &lt;/div&gt;

        &lt;/div&gt;
    &lt;/div&gt;
&lt;/div&gt;
&lt;!-- ANDROID_PROTECT_BLOCK_NEW end --&gt;
&lt;/section&gt;

&lt;style&gt;
    .custom-color-link a {
        color: #73b320;
    }
&lt;/style&gt;
</description></item><item><guid>https://news.drweb.com/show/?i=14796&amp;lng=en</guid><title>Doctor Web’s December 2023 review of virus activity on mobile devices</title><link>https://news.drweb.com/show/?i=14796&amp;lng=en&amp;c=38</link><pubDate>Tue, 30 Jan 2024 03:00:00 GMT</pubDate><description>

&lt;p&gt;&lt;b&gt;January 30, 2023&lt;/b&gt;&lt;/p&gt;

&lt;section class="margTM margBM" id="main"&gt;
  &lt;p&gt;&lt;newslead&gt;According to detection statistics collected by the Dr.Web for Android anti-virus, in December 2023, adware trojans from the &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; family were again the most active malicious programs. However, users encountered them 53.89% less often, compared to the previous month. In addition, the number of banking malware and spyware trojan attacks also decreased—by 0.88% and 10.83%, respectively.&lt;/newslead&gt;&lt;/p&gt;
  &lt;p&gt;Over the course of the final month of 2023, Doctor Web’s virus analysts discovered other malicious fake apps from the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; family on Google Pay. These were used in a variety of fraudulent schemes. Moreover, our specialists found more websites through which malicious actors were distributing fake crypto-wallet software.&lt;/p&gt;  
  
  &lt;div class="margTM margBM column_grid_review column_grid_review--v"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/01_CoinSteal_site1.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/01_CoinSteal_site1.png" alt="CoinSteal"&gt;
      &lt;/a&gt;
    &lt;/div&gt;

    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/01_CoinSteal_site2.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/01_CoinSteal_site2.png" alt="CoinSteal"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;
  
  &lt;div class="paddXM paddYM bg_ocean_1 white"&gt;
    &lt;h4 class="white alignCenter"&gt;PRINCIPAL TRENDS IN DECEMBER&lt;/h4&gt;
    &lt;ul&gt;
      &lt;li&gt;Adware trojans from the Android.HiddenAds family were detected most often on protected devices&lt;/li&gt;
      &lt;li&gt;The activity of banking trojans and malicious spyware apps decreased&lt;/li&gt;
      &lt;li&gt;New malicious programs were discovered on Google Play&lt;/li&gt;
      &lt;li&gt;Our analysts identified more websites distributing fake crypto-wallet software for devices running the Android and iOS operating systems&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/div&gt;
&lt;/section&gt;

&lt;section class="margTM margBM" id="stat"&gt;
  &lt;h2 class="alignCenter"&gt;According to statistics collected by Dr.Web for Android&lt;/h2&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/02_malware_december_2023_en.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/02_malware_december_2023_en.png" alt="malware_december_2023"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

  &lt;dl class="dlList"&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.Spy.5106&amp;lng=en"&gt;&lt;b&gt;Android.Spy.5106&lt;/b&gt;&lt;/a&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for a trojan that presents itself as modified versions of unofficial WhatsApp messenger mods. This malicious program can steal the contents of notifications and offer users other apps from unknown sources for installation. And when such a modified messenger is used, it can also display dialog boxes containing remotely configurable content.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3831&lt;/b&gt;&lt;/dt&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3851&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;Trojan apps designed to display intrusive ads. Trojans of this family are often distributed as popular and harmless applications. In some cases, other malware can install them in the system directory. When these infect Android devices, they typically conceal their presence from the user. For example, they “hide” their icons from the home screen menu.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.MobiDash&amp;lng=en"&gt;&lt;b&gt;Android.MobiDash&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7805&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;A trojan that displays obnoxious ads. It is a special software module that developers incorporate into applications.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.Click.1751&amp;lng=en"&gt;&lt;b&gt;Android.Click.1751&lt;/b&gt;&lt;/a&gt;&lt;/dt&gt;
    &lt;dd&gt;This trojan is built into third-party WhatsApp messenger mods and camouflaged as Google library classes. While the host application is being used, &lt;a href="https://vms.drweb.com/search/?q=Android.Click.1751&amp;lng=en"&gt;&lt;b&gt;Android.Click.1751&lt;/b&gt;&lt;/a&gt; connects to one of the C&amp;C servers. It receives two URLs from it. One of them is intended for Russian-speaking users, and the other is for everyone else. The trojan then displays a dialog box with the contents it has also received from a remote server. When a user clicks on the confirmation button, malware loads the corresponding link in their browser.&lt;/dd&gt;
  &lt;/dl&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/03_unwanted_december_2023_en.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/03_unwanted_december_2023_en.png" alt="unwanted_december_2023"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

  &lt;dl class="dlList"&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.CloudInject&amp;lng=en"&gt;&lt;b&gt;Program.CloudInject&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for Android programs that have been modified using the CloudInject cloud service and the eponymous Android utility (the latter was added to the Dr.Web virus database as &lt;a href="https://vms.drweb.com/search/?q=Tool.CloudInject&amp;lng=en"&gt;&lt;b&gt;Tool.CloudInject&lt;/b&gt;&lt;/a&gt;). Such programs are modified on a remote server; meanwhile, the modders (users) who are interested in such modifications cannot control exactly what will be added to the apps. Moreover, these programs receive a number of dangerous system permissions. Once modification is complete, users can remotely manage these apps. They can block them, display custom dialogs, and track when other software is being installed or removed from a device, etc.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.FakeAntiVirus&amp;lng=en"&gt;&lt;b&gt;Program.FakeAntiVirus&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for adware programs that imitate anti-virus software. These apps inform users of nonexistent threats, mislead them, and demand that they purchase the software’s full version.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.wSpy&amp;lng=en"&gt;&lt;b&gt;Program.wSpy&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;A commercial spyware app designed to covertly monitor Android device user activity. It allows intruders to read SMS and chats in popular messaging software, listen to the surroundings, track device location and browser history, gain access to the phonebook and contacts, photos and videos, and take screenshots and pictures through a device’s built-in camera. It also has keylogger functionality.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.FakeMoney&amp;lng=en"&gt;&lt;b&gt;Program.FakeMoney&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for Android applications that allegedly allow users to earn money by watching video clips and ads. These apps make it look as if rewards are accruing for completed tasks. To withdraw their “earnings”, users allegedly have to collect a certain sum. But even if they succeed, in reality they cannot get any real payments.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.SecretVideoRecorder&amp;lng=en"&gt;&lt;b&gt;Program.SecretVideoRecorder&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for various modifications of an application that is designed to record videos and take photos in the background using built-in Android device cameras. It can operate covertly by allowing notifications about ongoing recordings to be disabled. It also allows an app’s icon and name to be replaced with fake ones. This functionality makes this software potentially dangerous.&lt;/dd&gt;
  &lt;/dl&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/04_riskware_december_2023_en.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/04_riskware_december_2023_en.png" alt="riskware_december_2023"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

  &lt;dl class="dlList"&gt;
    &lt;dt&gt;&lt;b&gt;Tool.NPMod.1&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for Android programs that have been modified using the NP Manager utility. A special module is embedded in such apps. It allows them to bypass digital signature verification once they have been modified.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.LuckyPatcher&amp;lng=en"&gt;&lt;b&gt;Tool.LuckyPatcher&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;A tool that allows apps installed on Android devices to be modified (i.e., by creating patches for them) in order to change the logic of their work or to bypass certain restrictions. For instance, users can apply it to disable root-access verification in banking software or to obtain unlimited resources in games. To add patches, this utility downloads specially prepared scripts from the Internet, which can be crafted and added to the common database by any third-party. The functionality of such scripts can prove to be malicious; thus, patches made with this tool can pose a potential threat.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.14.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;Riskware platforms that allow applications to launch APK files without installing them. They create a virtual runtime environment in the context of the apps in which they are integrated. The APK files, launched with the help of these platforms, can operate as if they are part of such programs and can also obtain the same permissions.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.ApkProtector&amp;lng=en"&gt;&lt;b&gt;Tool.ApkProtector&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.16.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for Android apps protected by the ApkProtector software packer. This packer is not malicious in itself, but cybercriminals can use it when creating malware and unwanted applications to make it more difficult for anti-virus software to detect them.&lt;/dd&gt;
  &lt;/dl&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/05_adware_december_2023_en.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/05_adware_december_2023_en.png" alt="adware_december_2023"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

  &lt;dl class="dlList"&gt;
    &lt;dt&gt;&lt;b&gt;Adware.ShareInstall.1.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;An adware module that can be built into Android applications. It displays notifications containing ads on the Android OS lock screen.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.Adpush&amp;lng=en"&gt;&lt;b&gt;Adware.Adpush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.21846&lt;/b&gt;&lt;/dt&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.AdPush&amp;lng=en"&gt;&lt;b&gt;Adware.AdPush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.39.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;Adware modules that can be built into Android apps. They display notifications containing ads that mislead users. For example, such notifications can look like messages from the operating system. In addition, these modules collect a variety of confidential data and are able to download other apps and initiate their installation.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.Airpush&amp;lng=en"&gt;&lt;b&gt;Adware.Airpush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;A member of a family of adware modules that can be built into Android apps and display various ads. Depending on the modules’ version and modification, these can be notifications containing ads, pop-up windows or banners. Malicious actors often use these modules to distribute malware by offering their potential victims diverse software for installation. Moreover, such modules collect personal information and send it to a remote server.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.Fictus&amp;lng=en"&gt;&lt;b&gt;Adware.Fictus&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;An adware module that malicious actors embed into cloned versions of popular Android games and applications. Its incorporation is facilitated by a specialized net2share packer. Copies of software created this way are then distributed through various software catalogs. When installed on Android devices, such apps and games display obnoxious ads.&lt;/dd&gt;
  &lt;/dl&gt;
&lt;/section&gt;

&lt;section class="margTM margBM" id="googleplay"&gt;
  &lt;h2 class="alignCenter"&gt;Threats on Google Play&lt;/h2&gt;
  &lt;p&gt;In December 2023, Doctor Web’s specialists discovered new trojan apps from the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; family on Google Play. For example, malicious actors disguised &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1564&lt;/b&gt; as a debt-tracking program. The &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1563&lt;/b&gt; trojan was hiding in survey software. And cybercriminals passed the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1569&lt;/b&gt; trojan off as an instrument that could help users increase their productivity and develop good habits.&lt;/p&gt;
  
  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/06_Android.FakeApp.1563.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/06_Android.FakeApp.1563.png" alt="Android.FakeApp.1563"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/07_Android.FakeApp.1564.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/07_Android.FakeApp.1564.png" alt="Android.FakeApp.1564"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/08_Android.FakeApp.1569.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/08_Android.FakeApp.1569.png" alt="Android.FakeApp.1569"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;p&gt;All these fake apps loaded fraudulent finance-related websites that copied the design of the genuine websites of banks, news agencies, and other well-known organizations. In addition, the corresponding companies’ names and logos were used in their design to further mislead potential victims. On such fraudulent websites, users were offered the chance to become investors, take financial literacy training, receive financial support, etc. At the same time, they were asked to provide personal data―allegedly to register an account and get access to the corresponding services.&lt;/p&gt;
  &lt;p&gt;Examples of websites loaded by these trojans:&lt;/p&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--v"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/09_Android.FakeApp_site1.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/09_Android.FakeApp_site1.png" alt="Android.FakeApp"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/09_Android.FakeApp_site2.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/09_Android.FakeApp_site2.png" alt="Android.FakeApp"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/09_Android.FakeApp_site3.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/09_Android.FakeApp_site3.png" alt="Android.FakeApp"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--v"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/10_Android.FakeApp_site1.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/10_Android.FakeApp_site1.png" alt="Android.FakeApp"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/10_Android.FakeApp_site2.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/10_Android.FakeApp_site2.png" alt="Android.FakeApp"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/10_Android.FakeApp_site3.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/10_Android.FakeApp_site3.png" alt="Android.FakeApp"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;p&gt;Other trojans, like &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1566&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1567&lt;/b&gt;, and &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1568&lt;/b&gt;, were distributed as games:&lt;/p&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/11_Android.FakeApp.1566.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/11_Android.FakeApp.1566.png" alt="Android.FakeApp.1566"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/12_Android.FakeApp.1567.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/12_Android.FakeApp.1567.png" alt="Android.FakeApp.1567"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/13_Android.FakeApp.1568.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/13_Android.FakeApp.1568.png" alt="Android.FakeApp.1568"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;p&gt;Instead of launching the actual games, they could load bookmaker and online casino websites, as shown in the example below.&lt;/p&gt;
  &lt;p&gt;One of these trojans operating in gaming mode:&lt;/p&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--v"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/14_Android.FakeApp_game1.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/14_Android.FakeApp_game1.png" alt="Android.FakeApp"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/14_Android.FakeApp_game2.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/14_Android.FakeApp_game2.png" alt="Android.FakeApp"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;p&gt;One of the websites it loaded:&lt;/p&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--v"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/15_Android.FakeApp_casino1.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/15_Android.FakeApp_casino1.png" alt="Android.FakeApp"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/15_Android.FakeApp_casino2.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/desember/review_mobile/15_Android.FakeApp_casino2.png" alt="Android.FakeApp"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;p&gt;To protect your Android device from malware and unwanted programs, we recommend installing Dr.Web anti-virus products for Android.&lt;/p&gt;

  &lt;p&gt;&lt;a href="https://github.com/DoctorWebLtd/malware-iocs/blob/master/December%202023%20review%20of%20virus%20activity%20on%20mobile%20devices/README.adoc" target="_blank" rel="noopener noreferrer"&gt;Indicators of compromise&lt;/a&gt;&lt;/p&gt;

  &lt;!-- ANDROID_PROTECT_BLOCK_NEW --&gt;
  &lt;div class="CellBlock noPadd AndroidBlockNew"&gt;
    &lt;div class="container"&gt;
        &lt;div class="-Grid_1of6 -viewM-Grid_1of1"&gt;

            &lt;div class="DecorBg" style="background-color: #4788aa;"&gt;&lt;/div&gt;

            &lt;div class="Grid Grid_span2 alignMiddle alignCenter paddYM" style="background: url(https://st.drweb.com/static/new-www/img/bg_blue_geom.1.jpg); center; background-size: cover; background-color: #4788aa;"&gt;
                &lt;img src="https://st.drweb.com/static/new-www/img/drweb_ss_blue_noBg.png" alt="Dr.Web Mobile Security"&gt;
            &lt;/div&gt;&lt;!--
                
            --&gt;&lt;div class="Grid Grid_span4 alignMiddle _viewM_paddYM"&gt;
                &lt;div class="paddLL _viewS_noPaddL"&gt;
                    &lt;h2 class="noMargY white _viewM_alignCenter"&gt;Your Android needs protection.&lt;/h2&gt;
                    &lt;h2 class="margTC noMargB white _viewM_alignCenter"&gt;Use Dr.Web&lt;/h2&gt;
                    &lt;ul class="IconList white fontM margBS _viewM_fontS"&gt;
                        &lt;li class="icon" data-icon="#common-tick.main_green_4"&gt;The first Russian anti-virus for Android&lt;/li&gt;
                        &lt;li class="icon" data-icon="#common-tick.main_green_4"&gt;Over 140 million downloads—just from Google Play&lt;/li&gt;
                        &lt;li class="icon" data-icon="#common-tick.main_green_4"&gt;Available free of charge for users of Dr.Web home products&lt;/li&gt;
                    &lt;/ul&gt;
                    &lt;p class="noMargY _viewM_alignCenter"&gt;
                        &lt;a href="https://f2.drweb.com/lr/?to=https%3A%2F%2Fdownload.drweb.com%2Fandroid%2F%3Flng%3Den%26from%3DANDROID_PROTECT_BLOCK_NEW" class="Btn bg_main_green_5"&gt;
                            &lt;span class="Btn-body icon icon_right" data-icon="#common-arrowRight"&gt;
                                &lt;span class="Btn-text uppercase"&gt;Free download&lt;/span&gt;
                            &lt;/span&gt;
                        &lt;/a&gt;    
                    &lt;/p&gt;
                &lt;/div&gt;
            &lt;/div&gt;

        &lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
  &lt;!-- ANDROID_PROTECT_BLOCK_NEW end --&gt;
&lt;/section&gt;

</description></item><item><guid>https://news.drweb.com/show/?i=14777&amp;lng=en</guid><title>Doctor Web’s November 2023 review of virus activity on mobile devices</title><link>https://news.drweb.com/show/?i=14777&amp;lng=en&amp;c=38</link><pubDate>Thu, 21 Dec 2023 13:06:22 GMT</pubDate><description>



&lt;p&gt;&lt;b&gt;December 21, 2023&lt;/b&gt;&lt;/p&gt;

&lt;section class="margTM margBM" id="main"&gt;
  &lt;p&gt;&lt;newslead&gt;According to the detection statistics collected by Dr.Web for Android, in November 2023, users were less likely to encounter adware trojans from the &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; and &lt;a href="https://vms.drweb.com/search/?q=Android.MobiDash&amp;lng=en"&gt;&lt;b&gt;Android.MobiDash&lt;/b&gt;&lt;/a&gt; families. The activity of the former decreased by a quarter (25.03%) and the latter—by more than a third (35.87%). Moreover, banking trojans and malicious spyware apps were detected less often—by 3.53% and 17.10%, respectively.&lt;/newslead&gt;&lt;/p&gt;
  &lt;p&gt;At the same time, malicious actors again distributed malware via Google Play. Our specialists uncovered over 20 trojan apps from the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; family that are used for fraudulent purposes. In addition, they found a trojan that subscribed Android device users to paid services.&lt;/p&gt;
  
  &lt;div class="paddXM paddYM bg_ocean_1 white"&gt;
    &lt;h4 class="white alignCenter"&gt;PRINCIPAL TRENDS IN NOVEMBER&lt;/h4&gt;
    &lt;ul&gt;
      &lt;li&gt;A decrease in adware trojan activity&lt;/li&gt;
      &lt;li&gt;A decrease in banking malware and spyware trojan activity&lt;/li&gt;
      &lt;li&gt;The distribution of new malicious apps via Google Play&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/div&gt;
&lt;/section&gt;


&lt;section class="margTM margBM" id="stat"&gt;
  &lt;h2 class="alignCenter"&gt;According to statistics collected by Dr.Web for Android&lt;/h2&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2023/november/01_malware_november_2023_en.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2023/november/01_malware_november_2023_en.1.png" alt="The most common malware"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

  &lt;dl class="dlList"&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3831&lt;/b&gt;&lt;/dt&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3697&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;Trojan apps designed to display intrusive ads. Trojans of this family are often distributed as popular and harmless applications. In some cases, other malware can install them in the system directory. When these infect Android devices, they typically conceal their presence from the user. For example, they “hide” their icons from the home screen menu.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.MobiDash&amp;lng=en"&gt;&lt;b&gt;Android.MobiDash&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7805&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;A trojan that displays obnoxious ads. It is a special software module that developers incorporate into applications.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.Spy.5106&amp;lng=en"&gt;&lt;b&gt;Android.Spy.5106&lt;/b&gt;&lt;/a&gt;&lt;/dt&gt;
      &lt;dd&gt;The detection name for a trojan that presents itself as modified versions of unofficial WhatsApp messenger mods. This malicious program can steal the contents of notifications and offer users other apps from unknown sources for installation. And when such a modified messenger is used, it can also display dialog boxes containing remotely configurable content.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.Spy.5864&amp;lng=en"&gt;&lt;b&gt;Android.Spy.5864&lt;/b&gt;&lt;/a&gt;&lt;/dt&gt;
      &lt;dd&gt;The Dr.Web anti-virus uses this virus record to detect a trojan hidden in some third-party modifications of the WhatsApp messenger. Threat actors use this malware to spy on users. For instance, they can search files on victims’ devices and upload them to a remote server, obtain information from the phonebook, collect data about the infected device, record audio to eavesdrop on the surroundings, etc.&lt;/dd&gt;
  &lt;/dl&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2023/november/02_unwanted_november_2023_en.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2023/november/02_unwanted_november_2023_en.1.png" alt="The most common unwanted software"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

  &lt;dl class="dlList"&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.CloudInject&amp;lng=en"&gt;&lt;b&gt;Program.CloudInject&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;The detection name for Android programs that have been modified using the CloudInject cloud service and the eponymous Android utility (the latter was added to the Dr.Web virus database as &lt;a href="https://vms.drweb.com/search/?q=Tool.CloudInject&amp;lng=en"&gt;&lt;b&gt;Tool.CloudInject&lt;/b&gt;&lt;/a&gt;). Such programs are modified on a remote server; meanwhile, the modders (users) who are interested in such modifications cannot control exactly what will be added to the apps. Moreover, these programs receive a number of dangerous system permissions. Once modification is complete, users can remotely manage these apps. They can block them, display custom dialogs, and track when other software is being installed or removed from a device, etc.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.FakeAntiVirus&amp;lng=en"&gt;&lt;b&gt;Program.FakeAntiVirus&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;The detection name for adware programs that imitate anti-virus software. These apps inform users of nonexistent threats, mislead them, and demand that they purchase the software’s full version.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.wSpy&amp;lng=en"&gt;&lt;b&gt;Program.wSpy&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3.origin&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;A commercial spyware app designed to covertly monitor Android device user activity. It allows intruders to read SMS and chats in popular messaging software, listen to the surroundings, track device location and browser history, gain access to the phonebook and contacts, photos and videos, and take screenshots and pictures through a device’s built-in camera. It also has keylogger functionality.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.FakeMoney&amp;lng=en"&gt;&lt;b&gt;Program.FakeMoney&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;The detection name for Android applications that allegedly allow users to earn money by watching video clips and ads. These apps make it look as if rewards are accruing for completed tasks. To withdraw their “earnings”, users allegedly have to collect a certain sum. But even if they succeed, in reality they cannot get any real payments.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.TrackView&amp;lng=en"&gt;&lt;b&gt;Program.TrackView&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;The detection name for a program that allows users to be monitored via their Android devices. Malicious actors can utilize it to track a target device’s location, use the camera to record video and take photos, eavesdrop via the microphone, record audio, etc.&lt;/dd&gt;
  &lt;/dl&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2023/november/03_riskware_november_2023_en.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2023/november/03_riskware_november_2023_en.1.png" alt="The most common riskware"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

  &lt;dl class="dlList"&gt;
    &lt;dt&gt;&lt;b&gt;Tool.NPMod.1&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;The detection name for Android programs that have been modified using the NP Manager utility. A special module is embedded in such apps. It allows them to bypass digital signature verification once they have been modified.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.14.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.6.origin&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;Riskware platforms that allow applications to launch APK files without installing them. They create a virtual runtime environment in the context of the apps in which they are integrated. The APK files, launched with the help of these platforms, can operate as if they are part of such programs and can also obtain the same permissions.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.LuckyPatcher&amp;lng=en"&gt;&lt;b&gt;Tool.LuckyPatcher&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;A tool that allows apps installed on Android devices to be modified (i.e., by creating patches for them) in order to change the logic of their work or to bypass certain restrictions. For instance, users can apply it to disable root-access verification in banking software or to obtain unlimited resources in games. To add patches, this utility downloads specially prepared scripts from the Internet, which can be crafted and added to the common database by any third-party. The functionality of such scripts can prove to be malicious; thus, patches made with this tool can pose a potential threat.&lt;/dd&gt;
  &lt;/dl&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2023/november/04_adware_november_2023_en.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2023/november/04_adware_november_2023_en.1.png" alt="The most common adware"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

  &lt;dl class="dlList"&gt;
    &lt;dt&gt;&lt;b&gt;Adware.ShareInstall.1.origin&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;An adware module that can be built into Android applications. It displays notifications containing ads on the Android OS lock screen.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.AdPush&amp;lng=en"&gt;&lt;b&gt;Adware.AdPush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.36.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.AdPush&amp;lng=en"&gt;&lt;b&gt;Adware.AdPush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.39.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.Adpush&amp;lng=en"&gt;&lt;b&gt;Adware.Adpush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.21846&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;Adware modules that can be built into Android apps. They display notifications containing ads that mislead users. For example, such notifications can look like messages from the operating system. In addition, these modules collect a variety of confidential data and are able to download other apps and initiate their installation.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.Airpush&amp;lng=en"&gt;&lt;b&gt;Adware.Airpush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7.origin&lt;/b&gt;&lt;/dt&gt;
      &lt;dd&gt;A member of a family of adware modules that can be built into Android apps and display various ads. Depending on the modules’ version and modification, these can be notifications containing ads, pop-up windows or banners. Malicious actors often use these modules to distribute malware by offering their potential victims diverse software for installation. Moreover, such modules collect personal information and send it to a remote server.&lt;/dd&gt;
  &lt;/dl&gt;
&lt;/section&gt;


&lt;section class="margTM margBM" id="googleplay"&gt;
  &lt;h2 class="alignCenter"&gt;Threats on Google Play&lt;/h2&gt;
  &lt;p&gt;In November, Doctor Web’s virus laboratory discovered more malicious programs from the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; family on Google Play. Some of them were distributed under the guise of financial apps, like home accounting solutions, reference books, directories and teaching aids, programs for accessing investment services, etc. Among these were &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1497&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1498&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1499&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1526&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1527&lt;/b&gt;, and &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1536&lt;/b&gt;. Their main task is to load fraudulent websites where users are invited to become investors. For this, they need to provide their personal information.&lt;/p&gt;
  
  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/november/05_Android.FakeApp.1497_finance_1.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/november/05_Android.FakeApp.1497_finance_1.1.png" alt="Android.Proxy.4gproxy.1"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/november/06_Android.FakeApp.1498_finance_2.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/november/06_Android.FakeApp.1498_finance_2.1.png" alt="Android.Proxy.4gproxy.1"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/november/07_Android.FakeApp.1536_finance_3.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/november/07_Android.FakeApp.1536_finance_3.1.png" alt="Android.Proxy.4gproxy.1"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/november/08_Android.FakeApp.1499_finance_4.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/november/08_Android.FakeApp.1499_finance_4.1.png" alt="Android.Proxy.4gproxy.1"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/november/09_Android.FakeApp.1526_finance_5.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/november/09_Android.FakeApp.1526_finance_5.1.png"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/november/10_Android.FakeApp.1527_finance_6.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/november/10_Android.FakeApp.1527_finance_6.1.png" alt="Android.Proxy.4gproxy.4"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;p&gt;Another fake app, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1496&lt;/b&gt;, was hiding in a directory program for accessing legal information. It could load a website that allegedly could help victims of investment scammers get back their lost money.&lt;/p&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2023/november/11_Android.FakeApp.1496.png" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2023/november/11_Android.FakeApp.1496.1.png" alt="Android.FakeApp"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

  &lt;p&gt;The website this trojan loaded is shown below. The visitor must answer several questions and then fill out a form to “get a free consultation with a lawyer”.&lt;/p&gt;


  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/november/12_Android.FakeApp.1496_site_1.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/november/12_Android.FakeApp.1496_site_1.1.png" alt="Android.FakeApp.1433"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/november/12_Android.FakeApp.1496_site_2.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/november/12_Android.FakeApp.1496_site_2.1.png" alt="Android.FakeApp.1450"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/november/12_Android.FakeApp.1496_site_3.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/november/12_Android.FakeApp.1496_site_3.1.png" alt="Android.FakeApp.1455"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;p&gt; Malicious actors passed off other fake apps as games. For example, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1494&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1503&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1504&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1533&lt;/b&gt;, and &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1534&lt;/b&gt;. In some cases, these actually can work as games, but their primary task is to load online casino and bookmaker websites.&lt;/p&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/november/13_Android.FakeApp.1494_game_1.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/november/13_Android.FakeApp.1494_game_1.1.png" alt="Android.FakeApp_game"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/november/14_Android.FakeApp.1503_game_2.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/november/14_Android.FakeApp.1503_game_2.1.png" alt="Android.FakeApp_game"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/november/14_Android.FakeApp.1533_game_3.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/november/14_Android.FakeApp.1533_game_3.1.png" alt="Android.FakeApp_game"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/november/15_Android.FakeApp.1534_game_4.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/november/15_Android.FakeApp.1534_game_4.1.png" alt="Android.FakeApp_game"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/november/16_Android.FakeApp.1534_game_5.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/november/16_Android.FakeApp.1534_game_5.1.png" alt="Android.FakeApp_game"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/november/17_Android.FakeApp.1504_game_6.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/november/17_Android.FakeApp.1504_game_6.1.png" alt="Android.FakeApp_game"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;p&gt;Examples of how these trojans operate as games:&lt;/p&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/november/18_Android.FakeApp_gamelaunch_1.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/november/18_Android.FakeApp_gamelaunch_1.1.png" alt="Android.FakeApp_gamelaunch"&gt;
      &lt;/a&gt;
    &lt;/div&gt;

    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/november/18_Android.FakeApp_gamelaunch_2.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/november/18_Android.FakeApp_gamelaunch_2.1.png" alt="Android.FakeApp_gamelaunch"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/november/18_Android.FakeApp_gamelaunch_3.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/november/18_Android.FakeApp_gamelaunch_3.1.png" alt="Android.FakeApp_gamelaunch"&gt;
      &lt;/a&gt;
    &lt;/div&gt;

    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/november/18_Android.FakeApp_gamelaunch_4.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/november/18_Android.FakeApp_gamelaunch_4.1.png" alt="Android.FakeApp_gamelaunch"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;p&gt;An example of a bookmaker site that one of these trojans loaded:&lt;/p&gt;

  &lt;div class="column_grid_review column_grid_review--v"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/november/19_Android.FakeApp_game_site_1.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/november/19_Android.FakeApp_game_site_1.1.png" alt="Android.FakeApp_siteload"&gt;
      &lt;/a&gt;
    &lt;/div&gt;

    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/november/19_Android.FakeApp_game_site_2.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/november/19_Android.FakeApp_game_site_2.1.png" alt="Android.FakeApp_siteload"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;p&gt;In addition, our specialists discovered another malicious program that subscribes users to paid services. Malicious actors distributed it under the guise of the Air Swipes, an app for controlling Android devices using gestures.&lt;/p&gt;
  
  &lt;div class="margTM margBM column_grid_review column_grid_review--o"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/november/20_Android.Subscription.21.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/november/20_Android.Subscription.21.1.png" alt="Android.FakeApp.1468"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;p&gt;Upon launching, this trojan loads the website of an affiliate service through which the subscription is made:&lt;/p&gt;


  &lt;div class="margTM margBM column_grid_review column_grid_review--v"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/november/21_Android.Subscription.21_site_1.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/november/21_Android.Subscription.21_site_1.1.png" alt="Android.Subscription"&gt;
      &lt;/a&gt;
    &lt;/div&gt;

    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/november/21_Android.Subscription.21_site_2.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/november/21_Android.Subscription.21_site_2.1.png" alt="Android.Subscription"&gt;
      &lt;/a&gt;
    &lt;/div&gt;

    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/november/21_Android.Subscription.21_site_3.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/november/21_Android.Subscription.21_site_3.1.png" alt="Android.Subscription"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;p&gt;If the victim launches the app when their Internet connection is disabled or if the target site is not available for loading, the trojan pretends to be the promised application. However, reporting that an error has occurred, it does not provide any useful functionality. The Dr.Web anti-virus detects this trojan application as &lt;a href="https://vms.drweb.com/search/?q=Android.Subscription&amp;lng=en"&gt;&lt;b&gt;Android.Subscription&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.21&lt;/b&gt;.&lt;/p&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--v"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/november/22_Android.Subscription.21_1.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/november/22_Android.Subscription.21_1.1.png" alt="Android.Subscription"&gt;
      &lt;/a&gt;
    &lt;/div&gt;

    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/november/22_Android.Subscription.21_2.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/november/22_Android.Subscription.21_2.1.png" alt="Android.Subscription"&gt;
      &lt;/a&gt;
    &lt;/div&gt;

    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/november/22_Android.Subscription.21_3.png" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/november/22_Android.Subscription.21_3.1.png" alt="Android.Subscription"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;  

  &lt;p&gt;To protect your Android device from malware and unwanted programs, we recommend installing Dr.Web anti-virus products for Android.&lt;/p&gt;

  &lt;p&gt;&lt;a href="https://github.com/DoctorWebLtd/malware-iocs/blob/master/November%202023%20review%20of%20virus%20activity%20on%20mobile%20devices/README.adoc" target="_blank" rel="noopener noreferrer"&gt;Indicators of compromise&lt;/a&gt;&lt;/p&gt;

  &lt;!-- ANDROID_PROTECT_BLOCK_NEW --&gt;
  &lt;div class="CellBlock noPadd AndroidBlockNew"&gt;
    &lt;div class="container"&gt;
        &lt;div class="-Grid_1of6 -viewM-Grid_1of1"&gt;

            &lt;div class="DecorBg" style="background-color: #4788aa;"&gt;&lt;/div&gt;

            &lt;div class="Grid Grid_span2 alignMiddle alignCenter paddYM" style="background: url(https://st.drweb.com/static/new-www/img/bg_blue_geom.1.jpg); center; background-size: cover; background-color: #4788aa;"&gt;
                &lt;img src="https://st.drweb.com/static/new-www/img/drweb_ss_blue_noBg.png" alt="Dr.Web Mobile Security"&gt;
            &lt;/div&gt;&lt;!--
                
            --&gt;&lt;div class="Grid Grid_span4 alignMiddle _viewM_paddYM"&gt;
                &lt;div class="paddLL _viewS_noPaddL"&gt;
                    &lt;h2 class="noMargY white _viewM_alignCenter"&gt;Your Android needs protection.&lt;/h2&gt;
                    &lt;h2 class="margTC noMargB white _viewM_alignCenter"&gt;Use Dr.Web&lt;/h2&gt;
                    &lt;ul class="IconList white fontM margBS _viewM_fontS"&gt;
                        &lt;li class="icon" data-icon="#common-tick.main_green_4"&gt;The first Russian anti-virus for Android&lt;/li&gt;
                        &lt;li class="icon" data-icon="#common-tick.main_green_4"&gt;Over 140 million downloads—just from Google Play&lt;/li&gt;
                        &lt;li class="icon" data-icon="#common-tick.main_green_4"&gt;Available free of charge for users of Dr.Web home products&lt;/li&gt;
                    &lt;/ul&gt;
                    &lt;p class="noMargY _viewM_alignCenter"&gt;
                        &lt;a href="https://f2.drweb.com/lr/?to=https%3A%2F%2Fdownload.drweb.com%2Fandroid%2F%3Flng%3Den%26from%3DANDROID_PROTECT_BLOCK_NEW" class="Btn bg_main_green_5"&gt;
                            &lt;span class="Btn-body icon icon_right" data-icon="#common-arrowRight"&gt;
                                &lt;span class="Btn-text uppercase"&gt;Free download&lt;/span&gt;
                            &lt;/span&gt;
                        &lt;/a&gt;    
                    &lt;/p&gt;
                &lt;/div&gt;
            &lt;/div&gt;

        &lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
  &lt;!-- ANDROID_PROTECT_BLOCK_NEW end --&gt;

&lt;/section&gt;

</description></item><item><guid>https://news.drweb.com/show/?i=14775&amp;lng=en</guid><title>Doctor Web’s October 2023 review of virus activity on mobile devices</title><link>https://news.drweb.com/show/?i=14775&amp;lng=en&amp;c=38</link><pubDate>Wed, 22 Nov 2023 10:32:06 GMT</pubDate><description>



&lt;p&gt;&lt;b&gt;November 22, 2023&lt;/b&gt;&lt;/p&gt;

&lt;section class="margTM margBM" id="main"&gt;
  &lt;p&gt;&lt;newslead&gt;According to detection statistics collected by Dr.Web for Android, in October 2023, adware trojans from the &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; family were most often detected. Their activity increased by 46.16%, compared to the previous month. The second most widespread adware trojans, which belong to the &lt;a href="https://vms.drweb.com/search/?q=Android.MobiDash&amp;lng=en"&gt;&lt;b&gt;Android.MobiDash&lt;/b&gt;&lt;/a&gt; family, also increased in number—by 7.07%. In addition, users encountered spyware trojans and banking malware more often—by 18.27% and 10.73%, respectively.&lt;/newslead&gt;&lt;/p&gt;
  &lt;p&gt;Over the course of October, Doctor Web’s specialists discovered more threats on Google Play. Among them were dozens of various fake apps from the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; family, which cybercriminals use for fraudulent purposes. Also uncovered were &lt;a href="https://vms.drweb.com/search/?q=Android.Proxy.4gproxy&amp;lng=en"&gt;&lt;b&gt;Android.Proxy.4gproxy&lt;/b&gt;&lt;/a&gt; trojans, which turn Android devices into proxy servers.&lt;/p&gt;
  
  &lt;div class="paddXM paddYM bg_ocean_1 white"&gt;
    &lt;h4 class="white alignCenter"&gt;PRINCIPAL TRENDS IN OCTOBER&lt;/h4&gt;
    &lt;ul&gt;
      &lt;li&gt;An increase in adware trojan activity&lt;/li&gt;
      &lt;li&gt;An increase in spyware trojan and banking malware activity&lt;/li&gt;
      &lt;li&gt;The emergence of many new malicious apps on Google Play&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/div&gt;
&lt;/section&gt;


&lt;section class="margTM margBM" id="stat"&gt;
  &lt;h2 class="alignCenter"&gt;According to statistics collected by Dr.Web for Android&lt;/h2&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/01_malware_october_2023_en.jpg" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/01_malware_october_2023_en.jpg" alt="The most common malware"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

  &lt;dl class="dlList"&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3831&lt;/b&gt;&lt;/dt&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3697&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;Trojan apps designed to display intrusive ads. Trojans of this family are often distributed as popular and harmless applications. In some cases, other malware can install them in the system directory. When these infect Android devices, they typically conceal their presence from the user. For example, they “hide” their icons from the home screen menu.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.Spy.4498&amp;lng=en"&gt;&lt;b&gt;Android.Spy.4498&lt;/b&gt;&lt;/a&gt;&lt;/dt&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.Spy.5106&amp;lng=en"&gt;&lt;b&gt;Android.Spy.5106&lt;/b&gt;&lt;/a&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for different variants of a trojan that presents itself as modified versions of unofficial WhatsApp messenger mods. This malicious program can steal the contents of notifications and offer users other apps from unknown sources for installation. And when such a modified messenger is used, it can also display dialog boxes containing remotely configurable content.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.MobiDash&amp;lng=en"&gt;&lt;b&gt;Android.MobiDash&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7804&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;A trojan that displays obnoxious ads. It is a special software module that developers incorporate into applications.&lt;/dd&gt;
  &lt;/dl&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/02_unwanted_october_2023_en.jpg" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/02_unwanted_october_2023_en.jpg" alt="The most common unwanted software"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

  &lt;dl class="dlList"&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.CloudInject&amp;lng=en"&gt;&lt;b&gt;Program.CloudInject&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt; The detection name for Android programs that have been modified using the CloudInject cloud service and the eponymous Android utility (the latter was added to the Dr.Web virus database as &lt;a href="https://vms.drweb.com/search/?q=Tool.CloudInject&amp;lng=en"&gt;&lt;b&gt;Tool.CloudInject&lt;/b&gt;&lt;/a&gt;). Such programs are modified on a remote server; meanwhile, the modders (users) who are interested in such modifications cannot control exactly what will be added to the apps. Moreover, these programs receive a number of dangerous system permissions. Once modification is complete, users can remotely manage these apps. They can block them, display custom dialogs, and track when other software is being installed or removed from a device, etc.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.FakeAntiVirus&amp;lng=en"&gt;&lt;b&gt;Program.FakeAntiVirus&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for adware programs that imitate anti-virus software. These apps inform users of nonexistent threats, mislead them, and demand that they purchase the software’s full version.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.FakeMoney&amp;lng=en"&gt;&lt;b&gt;Program.FakeMoney&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for Android applications that allegedly allow users to earn money by watching video clips and ads. These apps make it look as if rewards are accruing for completed tasks. To withdraw their “earnings”, users allegedly have to collect a certain sum. But even if they succeed, in reality they cannot get any real payments.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.wSpy&amp;lng=en"&gt;&lt;b&gt;Program.wSpy&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;A commercial spyware app designed to covertly monitor Android device user activity. It allows intruders to read SMS and chats in popular messaging software, listen to the surroundings, track device location and browser history, gain access to the phonebook and contacts, photos and videos, and take screenshots and pictures through a device’s built-in camera. In addition, it has keylogger functionality.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.SecretVideoRecorder&amp;lng=en"&gt;&lt;b&gt;Program.SecretVideoRecorder&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for various modifications of an application that is designed to record videos and take photos in the background using built-in Android device cameras. It can operate covertly by allowing notifications about ongoing recordings to be disabled. It also allows an app’s icon and name to be replaced with fake ones. This functionality makes this software potentially dangerous.&lt;/dd&gt;
  &lt;/dl&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/03_riskware_october_2023_en.jpg" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/03_riskware_october_2023_en.jpg" alt="The most common riskware"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

  &lt;dl class="dlList"&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.LuckyPatcher&amp;lng=en"&gt;&lt;b&gt;Tool.LuckyPatcher&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;A tool that allows apps installed on Android devices to be modified (i.e., by creating patches for them) in order to change the logic of their work or to bypass certain restrictions. For instance, users can apply it to disable root-access verification in banking software or to obtain unlimited resources in games. To add patches, this utility downloads specially prepared scripts from the Internet, which can be crafted and added to the common database by any third-party. The functionality of such scripts can prove to be malicious; thus, patches made with this tool can pose a potential threat.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.14.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.6.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;Riskware platforms that allow applications to launch APK files without installing them. They create a virtual runtime environment in the context of the apps in which they are integrated. The APK files, launched with the help of these platforms, can operate as if they are part of such programs and can also obtain the same permissions.&lt;/dd&gt;
    &lt;dt&gt;&lt;b&gt;Tool.WAppBomber.1.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;An Android utility for sending mass messages in the WhatsApp online messenger. To operate, it requires access to the contact list from the user’s phonebook.&lt;/dd&gt;
  &lt;/dl&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/04_adware_october_2023_en.jpg" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/04_adware_october_2023_en.jpg" alt="The most common adware"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

  &lt;dl class="dlList"&gt;
    &lt;dt&gt;&lt;b&gt;Adware.ShareInstall.1.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;An adware module that can be built into Android applications. It displays notifications containing ads on the Android OS lock screen.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.MagicPush&amp;lng=en"&gt;&lt;b&gt;Adware.MagicPush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt; An adware module embedded into Android applications. It displays pop-up banners over the OS user interface when such hosting apps are not in use. These banners contain misleading information. Most often, they inform users about suspicious files that have allegedly been discovered, or they offer to block spam for users or to optimize their device’s power consumption. To do this, they ask users to open the corresponding app containing such an adware module. Upon opening the app, users are shown an ad.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.AdPush&amp;lng=en"&gt;&lt;b&gt;Adware.AdPush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.39.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.AdPush&amp;lng=en"&gt;&lt;b&gt;Adware.AdPush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.36.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;Adware modules that can be built into Android apps. They display notifications containing ads that mislead users. For example, such notifications can look like messages from the operating system. In addition, these modules collect a variety of confidential data and are able to download other apps and initiate their installation.&lt;/dd&gt;
    &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.Airpush&amp;lng=en"&gt;&lt;b&gt;Adware.Airpush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;A member of a family of adware modules that can be built into Android apps and display various ads. Depending on the modules’ version and modification, these can be notifications containing ads, pop-up windows or banners. Malicious actors often use these modules to distribute malware by offering their potential victims diverse software for installation. Moreover, such modules collect personal information and send it to a remote server.&lt;/dd&gt;
  &lt;/dl&gt;
&lt;/section&gt;


&lt;section class="margTM margBM" id="googleplay"&gt;
  &lt;h2 class="alignCenter"&gt;Threats on Google Play&lt;/h2&gt;
  &lt;p&gt;In October, Doctor Web’s virus analysts discovered over 50 malicious apps on Google Play. Among them were the &lt;a href="https://vms.drweb.com/search/?q=Android.Proxy.4gproxy&amp;lng=en"&gt;&lt;b&gt;Android.Proxy.4gproxy&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.Proxy.4gproxy&amp;lng=en"&gt;&lt;b&gt;Android.Proxy.4gproxy&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.2&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.Proxy.4gproxy&amp;lng=en"&gt;&lt;b&gt;Android.Proxy.4gproxy&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3&lt;/b&gt;, and &lt;a href="https://vms.drweb.com/search/?q=Android.Proxy.4gproxy&amp;lng=en"&gt;&lt;b&gt;Android.Proxy.4gproxy&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.4&lt;/b&gt; trojans, which turned infected devices into proxy servers and covertly transmitted third-party traffic through them. Various modifications of the first trojan were disguised as a Photo Puzzle game, a Sleepify program designed to help users with insomnia, and a tool called Rizzo The AI chatbot, which provided the functionality needed to work with a chat bot. The second trojan was hidden in the Premium Weather Pro weather forecast app. The third trojan was built into the Turbo Notes notepad app. And the last one was distributed by malicious actors as a Draw E program for creating images with the help of a neural network.&lt;/p&gt;
  
  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/05_Android.Proxy.4gproxy.1_1.jpg" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/05_Android.Proxy.4gproxy.1_1.jpg" alt="Android.Proxy.4gproxy.1"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/05_Android.Proxy.4gproxy.1_2.jpg" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/05_Android.Proxy.4gproxy.1_2.jpg" alt="Android.Proxy.4gproxy.1"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/05_Android.Proxy.4gproxy.1_3.jpg" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/05_Android.Proxy.4gproxy.1_3.jpg" alt="Android.Proxy.4gproxy.1"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/06_Android.Proxy.4gproxy.2_1.jpg" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/06_Android.Proxy.4gproxy.2_1.jpg" alt="Android.Proxy.4gproxy.1"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/07_Android.Proxy.4gproxy.3_1.jpg" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/07_Android.Proxy.4gproxy.3_1.jpg"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/08_Android.Proxy.4gproxy.4_1.jpg" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/08_Android.Proxy.4gproxy.4_1.jpg" alt="Android.Proxy.4gproxy.4"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;p&gt;A special utility called 4gproxy (Dr.Web detects it as &lt;a href="https://vms.drweb.com/search/?q=Tool.4gproxy&amp;lng=en"&gt;&lt;b&gt;Tool.4gproxy&lt;/b&gt;&lt;/a&gt;) was built into these apps. This tool allows Android devices to be used as proxy servers. It is not malicious in itself and can be used for legitimate purposes. However, in the case of these newly discovered trojans, the proxy server functionality operates without users’ involvement and their explicit consent.&lt;/p&gt;
  &lt;p&gt;At the same time, our specialists uncovered dozens of new trojan apps from the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; family. Some of them again were distributed as financial apps (for example, trojans like &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1459&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1460&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1461&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1462&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1472&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1474&lt;/b&gt;, and &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1485&lt;/b&gt;). Their main task is to load fraudulent websites that invite potential victims to become investors. Malicious actors ask users to provide their personal information and invite them to invest their money in supposedly profitable financial projects or instruments.&lt;/p&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/09_Android.FakeApp.1459_1.jpg" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/09_Android.FakeApp.1459_1.jpg" alt="Android.FakeApp.1459"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/10_Android.FakeApp.1460_1.jpg" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/10_Android.FakeApp.1460_1.jpg" alt="Android.FakeApp.1460"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/11_Android.FakeApp.1461_1.jpg" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/11_Android.FakeApp.1461_1.jpg" alt="Android.FakeApp.1461"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/12_Android.FakeApp.1462_1.jpg" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/12_Android.FakeApp.1462_1.jpg" alt="Android.FakeApp.1462"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/13_Android.FakeApp.1472_1.jpg" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/13_Android.FakeApp.1472_1.jpg" alt="Android.FakeApp.1472"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/14_Android.FakeApp.1474_1.jpg" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/14_Android.FakeApp.1474_1.jpg" alt="Android.FakeApp.1474"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;p&gt;Other fake programs (like &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1433&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1444&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1450&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1451&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1455&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1457&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1476&lt;/b&gt;, and others) were again disguised as various games. Under certain conditions, instead of launching games, these loaded online casino or bookmaker websites.&lt;/p&gt;


  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/15_Android.FakeApp.1433_1.jpg" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/15_Android.FakeApp.1433_1.jpg" alt="Android.FakeApp.1433"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/16_Android.FakeApp.1450_1.jpg" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/16_Android.FakeApp.1450_1.jpg" alt="Android.FakeApp.1450"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/17_Android.FakeApp.1455_1.jpg" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/17_Android.FakeApp.1455_1.jpg" alt="Android.FakeApp.1455"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/18_Android.FakeApp.1476_1.jpg" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/18_Android.FakeApp.1476_1.jpg" alt="Android.FakeApp.1476"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/18_Android.FakeApp.1476_2.jpg" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/18_Android.FakeApp.1476_2.jpg" alt="Android.FakeApp.1476"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/19_Android.FakeApp.1457_1.jpg" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/19_Android.FakeApp.1457_1.jpg" alt="Android.FakeApp.1457"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;p&gt;Examples of how these trojan apps work as games:&lt;/p&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--v"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/20_Android.FakeApp_game_1.jpg" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/20_Android.FakeApp_game_1.jpg" alt="Android.FakeApp_game"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/20_Android.FakeApp_game_2.jpg" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/20_Android.FakeApp_game_2.jpg" alt="Android.FakeApp_game"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/20_Android.FakeApp_game_3.jpg" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/20_Android.FakeApp_game_3.jpg" alt="Android.FakeApp_game"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/20_Android.FakeApp_game_4.jpg" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/20_Android.FakeApp_game_4.jpg" alt="Android.FakeApp_game"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;p&gt;Examples of the online casino and bookmaker sites they load:&lt;/p&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--v"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/21_Android.FakeApp_siteload_1.jpg" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/21_Android.FakeApp_siteload_1.jpg" alt="Android.FakeApp_siteload"&gt;
      &lt;/a&gt;
    &lt;/div&gt;

    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/21_Android.FakeApp_siteload_2.jpg" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/21_Android.FakeApp_siteload_2.jpg" alt="Android.FakeApp_siteload"&gt;
      &lt;/a&gt;
    &lt;/div&gt;

    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/21_Android.FakeApp_siteload_3.jpg" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/21_Android.FakeApp_siteload_3.jpg" alt="Android.FakeApp_siteload"&gt;
      &lt;/a&gt;
    &lt;/div&gt;

    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/21_Android.FakeApp_siteload_4.jpg" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/21_Android.FakeApp_siteload_4.jpg" alt="Android.FakeApp_siteload"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;p&gt;Similar functionality was found in the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1478&lt;/b&gt; trojan, which was hiding in an app for accessing sports news and publications. It could load bookmaker sites.&lt;/p&gt;

  &lt;div class="column_grid_review column_grid_review--o"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/22_Android.FakeApp.1478_1.jpg" class="preview"&gt;
      &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/22_Android.FakeApp.1478_1.jpg"&gt;
    &lt;/a&gt;
  &lt;/div&gt;

  &lt;p&gt;In addition, new trojan apps were found that allegedly could help Android device owners search for a job. One was called Rixx (&lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1468&lt;/b&gt;), and the other—Catalogue (&lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1471&lt;/b&gt;). Upon launching, these malicious apps show a fake vacancy listing. When potential victims try to respond to one of the job offers, they are asked to enter their personal data into a special form, or to contact the “employer” via instant messengers, like WhatsApp or Telegram.&lt;/p&gt;

  &lt;div class="margTM margBM column_grid_review column_grid_review--h"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/23_Android.FakeApp.1468_1.jpg" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/23_Android.FakeApp.1468_1.jpg" alt="Android.FakeApp.1468"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/24_Android.FakeApp.1471_1.jpg" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/24_Android.FakeApp.1471_1.jpg" alt="Android.FakeApp.1471"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;p&gt;Below is an example of how one of these malicious apps works. The trojan displays a phishing form, disguised as a window for creating a resume, or asks the user to contact the “employer” via the messenger.&lt;/p&gt;


  &lt;div class="margTM margBM column_grid_review column_grid_review--v"&gt;
    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/25_Android.FakeApp_job_1.jpg" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/25_Android.FakeApp_job_1.jpg" alt="Android.FakeApp_job"&gt;
      &lt;/a&gt;
    &lt;/div&gt;

    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/25_Android.FakeApp_job_2.jpg" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/25_Android.FakeApp_job_2.jpg" alt="Android.FakeApp_job"&gt;
      &lt;/a&gt;
    &lt;/div&gt;

    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/25_Android.FakeApp_job_3.jpg" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/25_Android.FakeApp_job_3.jpg" alt="Android.FakeApp_job"&gt;
      &lt;/a&gt;
    &lt;/div&gt;

    &lt;div class="flex fxCenter"&gt;
      &lt;a href="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/25_Android.FakeApp_job_4.jpg" class="preview"&gt;
        &lt;img src="https://st.drweb.com/static/new-www/news/2023/october/review_mobile/25_Android.FakeApp_job_4.jpg" alt="Android.FakeApp_job"&gt;
      &lt;/a&gt;
    &lt;/div&gt;
  &lt;/div&gt;

  &lt;p&gt;To protect your Android device from malware and unwanted programs, we recommend installing Dr.Web anti-virus products for Android.&lt;/p&gt;

  &lt;p&gt;&lt;a href="https://github.com/DoctorWebLtd/malware-iocs/blob/master/October%202023%20review%20of%20virus%20activity%20on%20mobile%20devices/README.adoc" target="_blank" rel="noopener noreferrer"&gt;Indicators of compromise&lt;/a&gt;&lt;/p&gt;

  &lt;!-- ANDROID_PROTECT_BLOCK_NEW --&gt;
  &lt;div class="CellBlock noPadd AndroidBlockNew"&gt;
    &lt;div class="container"&gt;
        &lt;div class="-Grid_1of6 -viewM-Grid_1of1"&gt;

            &lt;div class="DecorBg" style="background-color: #4788aa;"&gt;&lt;/div&gt;

            &lt;div class="Grid Grid_span2 alignMiddle alignCenter paddYM" style="background: url(https://st.drweb.com/static/new-www/img/bg_blue_geom.1.jpg); center; background-size: cover; background-color: #4788aa;"&gt;
                &lt;img src="https://st.drweb.com/static/new-www/img/drweb_ss_blue_noBg.png" alt="Dr.Web Mobile Security"&gt;
            &lt;/div&gt;&lt;!--
                
            --&gt;&lt;div class="Grid Grid_span4 alignMiddle _viewM_paddYM"&gt;
                &lt;div class="paddLL _viewS_noPaddL"&gt;
                    &lt;h2 class="noMargY white _viewM_alignCenter"&gt;Your Android needs protection.&lt;/h2&gt;
                    &lt;h2 class="margTC noMargB white _viewM_alignCenter"&gt;Use Dr.Web&lt;/h2&gt;
                    &lt;ul class="IconList white fontM margBS _viewM_fontS"&gt;
                        &lt;li class="icon" data-icon="#common-tick.main_green_4"&gt;The first Russian anti-virus for Android&lt;/li&gt;
                        &lt;li class="icon" data-icon="#common-tick.main_green_4"&gt;Over 140 million downloads—just from Google Play&lt;/li&gt;
                        &lt;li class="icon" data-icon="#common-tick.main_green_4"&gt;Available free of charge for users of Dr.Web home products&lt;/li&gt;
                    &lt;/ul&gt;
                    &lt;p class="noMargY _viewM_alignCenter"&gt;
                        &lt;a href="https://f2.drweb.com/lr/?to=https%3A%2F%2Fdownload.drweb.com%2Fandroid%2F%3Flng%3Den%26from%3DANDROID_PROTECT_BLOCK_NEW" class="Btn bg_main_green_5"&gt;
                            &lt;span class="Btn-body icon icon_right" data-icon="#common-arrowRight"&gt;
                                &lt;span class="Btn-text uppercase"&gt;Free download&lt;/span&gt;
                            &lt;/span&gt;
                        &lt;/a&gt;    
                    &lt;/p&gt;
                &lt;/div&gt;
            &lt;/div&gt;

        &lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
  &lt;!-- ANDROID_PROTECT_BLOCK_NEW end --&gt;


&lt;/section&gt;

</description></item><item><guid>https://news.drweb.com/show/?i=14767&amp;lng=en</guid><title>Doctor Web’s September 2023 review of virus activity on mobile devices</title><link>https://news.drweb.com/show/?i=14767&amp;lng=en&amp;c=38</link><pubDate>Thu, 26 Oct 2023 01:00:00 GMT</pubDate><description>


&lt;p&gt;&lt;b&gt;October 26, 2023&lt;/b&gt;&lt;/p&gt;
&lt;p id="main"&gt;&lt;newslead&gt; In early September, Doctor Web &lt;a href="https://news.drweb.com/show/?lng=en&amp;i=14743" target="_blank" rel="noopener noreferrer"&gt;published&lt;/a&gt; a study of &lt;a href="https://vms.drweb.com/search/?q=Android.Pandora.2&amp;lng=en"&gt;&lt;b&gt;Android.Pandora.2&lt;/b&gt;&lt;/a&gt;, a backdoor that creates a botnet of infected devices and can carry out DDoS attacks at the command of threat actors. In the middle of the month, our specialists &lt;a href=" https://news.drweb.com/show/?lng=en&amp;i=14748" target="_blank" rel="noopener noreferrer"&gt;informed&lt;/a&gt; users about malicious programs from the &lt;a href="https://vms.drweb.com/search/?q=Android.Spy.Lydia&amp;lng=en"&gt;&lt;b&gt;Android.Spy.Lydia&lt;/b&gt;&lt;/a&gt; family. These multi-functional spyware trojans target Iranian users. Members of this family are camouflaged as a financial platform for online trading; they can perform various malicious actions at the command of attackers. This includes intercepting and sending SMS, collecting information about user phonebook contacts, hijacking clipboard contents, loading phishing websites, and so on. The &lt;a href="https://vms.drweb.com/search/?q=Android.Spy.Lydia&amp;lng=en"&gt;&lt;b&gt;Android.Spy.Lydia&lt;/b&gt;&lt;/a&gt; trojans can be used in a variety of fraudulent schemes and to steal personal data. Moreover, with their help, threat actors can steal their victims’ money.&lt;/newslead&gt;&lt;/p&gt;
&lt;p&gt;According to detection statistics collected by Dr.Web for Android, in September 2023, Android malware was less active, compared to the previous month. For instance, &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; and &lt;a href="https://vms.drweb.com/search/?q=Android.MobiDash&amp;lng=en"&gt;&lt;b&gt;Android.MobiDash&lt;/b&gt;&lt;/a&gt; adware trojans were detected 11.73% and 26.30% less often, respectively. The number of spyware trojan attacks decreased by 25.11%, &lt;a href="https://vms.drweb.com/search/?q=Android.Locker&amp;lng=en"&gt;&lt;b&gt;Android.Locker&lt;/b&gt;&lt;/a&gt; attacks by 10.52%, and banking malware by 4.51%. At the same time, Android device owners encountered unwanted adware programs 14.32% more often.&lt;/p&gt;
&lt;p&gt;Many new threats were uncovered on Google Play over the course of September. Among them were &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; trojan apps used in different fraudulent schemes, &lt;a href="https://vms.drweb.com/search/?q=Android.Joker&amp;lng=en"&gt;&lt;b&gt;Android.Joker&lt;/b&gt;&lt;/a&gt; trojans, which subscribe victims to paid services, and also &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; adware trojans.&lt;/p&gt;

&lt;div class="paddXM paddYM bg_ocean_1 white"&gt;
  &lt;h4 class="white alignCenter"&gt;PRINCIPAL TRENDS IN SEPTEMBER&lt;/h4&gt;
  &lt;ul&gt;
    &lt;li&gt;A decrease in Android malware activity&lt;/li&gt;
    &lt;li&gt;The emergence of new malicious apps on Google Play&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;h2 id="monthdanger"&gt;Mobile threat of the month&lt;/h2&gt;
&lt;p&gt;In September, Doctor Web &lt;a href="https://news.drweb.com/show/?i=14743&amp;lng=en" target="_blank" rel="noopener noreferrer"&gt;presented&lt;/a&gt; the details of its &lt;a href="https://vms.drweb.com/search/?q=Android.Pandora.2&amp;lng=en"&gt;&lt;b&gt;Android.Pandora.2&lt;/b&gt;&lt;/a&gt; malware analysis; this trojan primarily targets Spanish-speaking users. The first cases of attacks involving it were &lt;a href="https://news.drweb.com/show/review/?i=14695&amp;lng=en#month" target="_blank" rel="noopener noreferrer"&gt;recorded&lt;/a&gt; in March 2023.&lt;/p&gt;

&lt;p&gt;This malicious program infects Smart TVs and television boxes with the Android TV operating system via compromised firmware or when users install trojanized versions of software for illegally watching videos online. &lt;/p&gt;

&lt;p&gt;The main function of &lt;a href="https://vms.drweb.com/search/?q=Android.Pandora.2&amp;lng=en"&gt;&lt;b&gt;Android.Pandora.2&lt;/b&gt;&lt;/a&gt; is to perform various types of DDoS attacks at the command of cybercriminals. In addition, this trojan can perform a number of other actions, like installing its own updates and replacing the system hosts file.&lt;/p&gt;

&lt;p&gt;A study performed by Doctor Web’s malware analysts revealed that when creating this trojan, virus writers borrowed from the authors of &lt;a href="https://vms.drweb.com/search/?q=Linux.Mirai&amp;lng=en"&gt;&lt;b&gt;Linux.Mirai&lt;/b&gt;&lt;/a&gt;, taking part of its code and using it as the basis for their trojan. Since 2016, &lt;a href="https://vms.drweb.com/search/?q=Linux.Mirai&amp;lng=en"&gt;&lt;b&gt;Linux.Mirai&lt;/b&gt;&lt;/a&gt; has been widely used to infect IoT (the “Internet of things”) devices and to perform DDoS attacks on various websites.&lt;/p&gt;

&lt;h2 id="stat"&gt;According to statistics collected by Dr.Web for Android&lt;/h2&gt;
&lt;p class="alignCenter"&gt;
   &lt;a href="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/01_malware_september_2023_en.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/01_malware_september_2023_en.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
&lt;/p&gt;

&lt;dl class="dlList"&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3697&lt;/b&gt;&lt;/dt&gt; 
    &lt;dd&gt;A trojan app designed to display intrusive ads. Trojans of this family are often distributed as popular and harmless applications. In some cases, other malware can install them in the system directory. When these infect Android devices, they typically conceal their presence from the user. For example, they “hide” their icons from the home screen menu.&lt;/dd&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.Spy.5106&amp;lng=en"&gt;&lt;b&gt;Android.Spy.5106&lt;/b&gt;&lt;/a&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for a trojan that presents itself as modified versions of unofficial WhatsApp messenger mods. This malicious program can steal the contents of notifications and offer users other apps from unknown sources for installation. And when such a modified messenger is used, it can also display dialog boxes containing remotely configurable content.&lt;/dd&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.Packed&amp;lng=en"&gt;&lt;b&gt;Android.Packed&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.57083&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for malicious applications protected with an ApkProtector software packer. Among them are banking trojans, spyware, and other malicious software.&lt;/dd&gt;
  &lt;dt&gt;&lt;b&gt;Android.Pandora.17&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for malicious programs that download and install the &lt;a href="https://vms.drweb.com/search/?q=Android.Pandora.2&amp;lng=en"&gt;&lt;b&gt;Android.Pandora.2&lt;/b&gt;&lt;/a&gt; backdoor trojan. Threat actors often embed such downloaders in Smart TV software oriented toward Spanish-speaking users.&lt;/dd&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.MobiDash&amp;lng=en"&gt;&lt;b&gt;Android.MobiDash&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7804&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;A trojan that displays obnoxious ads. It is a special software module that developers incorporate into applications.&lt;/dd&gt;
&lt;/dl&gt;

&lt;p class="alignCenter"&gt;
   &lt;a href="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/02_unwanted_september_2023_en.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/02_unwanted_september_2023_en.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
&lt;/p&gt;

&lt;dl class="dlList"&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.FakeAntiVirus&amp;lng=en"&gt;&lt;b&gt;Program.FakeAntiVirus&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for adware programs that imitate anti-virus software. These apps inform users of nonexistent threats, mislead them, and demand that they purchase the software’s full version.&lt;/dd&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.FakeMoney&amp;lng=en"&gt;&lt;b&gt;Program.FakeMoney&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for Android applications that allegedly allow users to earn money by watching video clips and ads. These apps make it look as if rewards are accruing for completed tasks. To withdraw their “earnings”, users allegedly have to collect a certain sum. But even if they succeed, in reality they cannot get any real payments.&lt;/dd&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.CloudInject&amp;lng=en"&gt;&lt;b&gt;Program.CloudInject&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for Android programs that have been modified using the CloudInject cloud service and the eponymous Android utility (the latter was added to the Dr.Web virus database as &lt;a href="https://vms.drweb.com/search/?q=Tool.CloudInject&amp;lng=en"&gt;&lt;b&gt;Tool.CloudInject&lt;/b&gt;&lt;/a&gt;). Such programs are modified on a remote server; meanwhile, the modders (users) who are interested in such modifications cannot control exactly what will be added to the apps. Moreover, these programs receive a number of dangerous system permissions. Once modification is complete, users can remotely manage these apps. They can block them, display custom dialogs, and track when other software is being installed or removed from a device, etc.&lt;/dd&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.SecretVideoRecorder&amp;lng=en"&gt;&lt;b&gt;Program.SecretVideoRecorder&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for various modifications of an application that is designed to record videos and take photos in the background using built-in Android device cameras. It can operate covertly by allowing notifications about ongoing recordings to be disabled. It also allows an app’s icon and name to be replaced with fake ones. This functionality makes this software potentially dangerous.&lt;/dd&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.wSpy&amp;lng=en"&gt;&lt;b&gt;Program.wSpy&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;A commercial spyware app designed to covertly monitor Android device user activity. It allows intruders to read SMS and chats in popular messaging software, listen to the surroundings, track device location and browser history, gain access to the phonebook and contacts, photos and videos, and take screenshots and pictures through a device’s built-in camera. In addition, it has keylogger functionality.&lt;/dd&gt;
&lt;/dl&gt;

&lt;p class="alignCenter"&gt;
   &lt;a href="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/03_riskware_september_2023_en.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/03_riskware_september_2023_en.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
&lt;/p&gt;

&lt;dl class="dlList"&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.14.origin &lt;/b&gt;&lt;/dt&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;Riskware platforms that allow applications to launch APK files without installing them. They create a virtual runtime environment that does not affect the main operating system.&lt;/dd&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.LuckyPatcher&amp;lng=en"&gt;&lt;b&gt;Tool.LuckyPatcher&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;A tool that allows apps installed on Android devices to be modified (i.e., by creating patches for them) in order to change the logic of their work or to bypass certain restrictions. For instance, users can apply it to disable root-access verification in banking software or to obtain unlimited resources in games. To add patches, this utility downloads specially prepared scripts from the Internet, which can be crafted and added to the common database by any third-party. The functionality of such scripts can prove to be malicious; thus, patches made with this tool can pose a potential threat.&lt;/dd&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.Packer&amp;lng=en"&gt;&lt;b&gt;Tool.Packer&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for Android programs whose code is encoded and obfuscated by the NP Manager tool.&lt;/dd&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.ApkProtector&amp;lng=en"&gt;&lt;b&gt;Tool.ApkProtector&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.16.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for Android apps protected by the ApkProtector software packer. This packer is not malicious in itself, but cybercriminals can use it when creating malware and unwanted applications to make it more difficult for anti-virus software to detect them.&lt;/dd&gt;  
&lt;/dl&gt;

&lt;p class="alignCenter"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/04_adware_september_2023_en.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/04_adware_september_2023_en.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
&lt;/p&gt;

&lt;dl class="dlList"&gt;
  &lt;dt&gt;&lt;b&gt;Adware.ShareInstall.1.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;An adware module that can be built into Android applications. It displays notifications containing ads on the Android OS lock screen.&lt;/dd&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.MagicPush&amp;lng=en"&gt;&lt;b&gt;Adware.MagicPush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;An adware module embedded into Android applications. It displays pop-up banners over the OS user interface when such hosting apps are not in use. These banners contain misleading information. Most often, they inform users about suspicious files that have allegedly been discovered, or they offer to block spam for users or to optimize their device’s power consumption. To do this, they ask users to open the corresponding app containing such an adware module. Upon opening the app, users are shown an ad.&lt;/dd&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.AdPush&amp;lng=en"&gt;&lt;b&gt;Adware.AdPush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.39.origin&lt;/b&gt;&lt;/dt&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.AdPush&amp;lng=en"&gt;&lt;b&gt;Adware.AdPush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.36.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;Adware modules that can be built into Android apps. They display notifications containing ads that mislead users. For example, such notifications can look like messages from the operating system. In addition, these modules collect a variety of confidential data and are able to download other apps and initiate their installation.&lt;/dd&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.Airpush&amp;lng=en"&gt;&lt;b&gt;Adware.Airpush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;A member of a family of adware modules that can be built into Android apps and display various ads. Depending on the modules’ version and modification, these can be notifications containing ads, pop-up windows or banners. Malicious actors often use these modules to distribute malware by offering their potential victims diverse software for installation. Moreover, such modules collect personal information and send it to a remote server.&lt;/dd&gt;
&lt;/dl&gt;

&lt;h2 id="googleplay"&gt;Threats on Google Play&lt;/h2&gt;
&lt;p&gt;In September, Doctor Web’s malware analysts uncovered many new malicious apps on Google Play. Among them were trojans that displayed intrusive ads. Threat actors distributed them under the guise of such games as Agent Shooter (&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3781&lt;/b&gt;), Rainbow Stretch (&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3785&lt;/b&gt;), Rubber Punch 3D (&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3786&lt;/b&gt;), and Super Skibydi Killer (&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3787&lt;/b&gt;). Once these trojans were installed on Android devices, they tried to hide from users. For this, they replaced their icons, located on the home screen menu, with transparent versions and also changed their names so they were left blank. In addition, they could pretend to be a Google Chrome browser by replacing their own icons with the corresponding copy. When users tap on such an icon, these trojans launch the browser and continue to operate in the background. This allows them to become less noticeable and reduces the likelihood of their premature removal. Moreover, if these malicious programs stop working, users will restart them, thinking that they are launching a browser.&lt;/p&gt;

&lt;p class="fx fxCenter -paddXS -paddYS"&gt;
   &lt;a href="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/05_Android.HiddenAds.3781_1.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/05_Android.HiddenAds.3781_1.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
   &lt;a href="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/05_Android.HiddenAds.3785_1.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/05_Android.HiddenAds.3785_1.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
   &lt;a href="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/05_Android.HiddenAds.3786_1.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/05_Android.HiddenAds.3786_1.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
   &lt;a href="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/05_Android.HiddenAds.3787_1.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/05_Android.HiddenAds.3787_1.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;Our specialists also discovered other fake apps from the &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt; family. Some of them (like &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1429&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1430&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1432&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1434&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1435&lt;/b&gt;, and others) were distributed as financial software—for example, as apps for stock trading, guides and reference books, home accounting, and others. In reality, their primary objective was to load fraudulent sites where potential victims were encouraged to become “investors”.&lt;/p&gt;

&lt;p class="fx fxCenter -paddXS -paddYS"&gt;
   &lt;a href="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/06_Android.FakeApp.1429_1.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/06_Android.FakeApp.1429_1.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
   &lt;a href="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/06_Android.FakeApp.1430_2.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/06_Android.FakeApp.1430_2.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
   &lt;a href="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/06_Android.FakeApp.1432_3.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/06_Android.FakeApp.1432_3.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
   &lt;a href="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/06_Android.FakeApp.1432_4.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/06_Android.FakeApp.1432_4.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
   &lt;a href="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/06_Android.FakeApp.1430_5.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/06_Android.FakeApp.1430_5.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
   &lt;a href="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/06_Android.FakeApp.1435_6.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/06_Android.FakeApp.1435_6.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;Other fake programs (for example, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1433&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1436&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1437&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1438&lt;/b&gt;, &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1439&lt;/b&gt;, and &lt;a href="https://vms.drweb.com/search/?q=Android.FakeApp&amp;lng=en"&gt;&lt;b&gt;Android.FakeApp&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1440&lt;/b&gt;) were passed off by cybercriminals as different gaming apps. In some cases, these could actually operate as games, but their main functionality was to load online casino websites.&lt;/p&gt;

&lt;p class="fx fxCenter -paddXS -paddYS"&gt;
   &lt;a href="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/07_Android.FakeApp.1440_1.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/07_Android.FakeApp.1440_1.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
   &lt;a href="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/07_Android.FakeApp.1433_2.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/07_Android.FakeApp.1433_2.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
   &lt;a href="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/07_Android.FakeApp.1433_3.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/07_Android.FakeApp.1433_3.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
   &lt;a href="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/07_Android.FakeApp.1436_4.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/07_Android.FakeApp.1436_4.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
   &lt;a href="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/07_Android.FakeApp.1437_5.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/07_Android.FakeApp.1437_5.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
   &lt;a href="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/07_Android.FakeApp.1441_6.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/07_Android.FakeApp.1441_6.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;Examples of how these operate in game mode:&lt;/p&gt;

&lt;p class="fx fxCenter -paddXS -paddYS"&gt;
   &lt;a href="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/08_FakeApp_game_1.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/08_FakeApp_game_1.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
   &lt;a href="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/08_FakeApp_game_2.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/08_FakeApp_game_2.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
   &lt;a href="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/08_FakeApp_game_3.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/08_FakeApp_game_3.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
   &lt;a href="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/08_FakeApp_game_4.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/08_FakeApp_game_4.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
   &lt;a href="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/08_FakeApp_game_5.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/08_FakeApp_game_5.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
   &lt;a href="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/08_FakeApp_game_6.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/08_FakeApp_game_6.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;Examples of the online casino websites they load:&lt;/p&gt;

&lt;p class="fx fxCenter -paddXS -paddYS"&gt;
   &lt;a href="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/09_FakeApp_casino_1.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/09_FakeApp_casino_1.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
   &lt;a href="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/09_FakeApp_casino_2.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/09_FakeApp_casino_2.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
   &lt;a href="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/09_FakeApp_casino_3.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/09_FakeApp_casino_3.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
   &lt;a href="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/09_FakeApp_casino_4.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/09_FakeApp_casino_4.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;At the same time, other trojan apps from the &lt;a href="https://vms.drweb.com/search/?q=Android.Joker&amp;lng=en"&gt;&lt;b&gt;Android.Joker&lt;/b&gt;&lt;/a&gt; family were discovered on Google Play. These were subscribing victims to paid services. One of them, dubbed &lt;a href="https://vms.drweb.com/search/?q=Android.Joker&amp;lng=en"&gt;&lt;b&gt;Android.Joker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.2216&lt;/b&gt; in accordance with Doctor Web’s classification system, was disguised as an image collection app called Beauty Wallpaper HD. Another one was distributed as Love Emoji Messenger, an online messenger, and was added to the Dr.Web virus database as &lt;a href="https://vms.drweb.com/search/?q=Android.Joker&amp;lng=en"&gt;&lt;b&gt;Android.Joker&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.2217&lt;/b&gt;.&lt;/p&gt;

&lt;p class="fx fxCenter -paddXS -paddYS"&gt;
   &lt;a href="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/10_Android.Joker.2216_1.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/10_Android.Joker.2216_1.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
   &lt;a href="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/10_Android.Joker.2217_2.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/september/review_mobile/10_Android.Joker.2217_2.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
&lt;/p&gt;


&lt;p&gt;To protect your Android device from malware and unwanted programs, we recommend installing Dr.Web anti-virus products for Android.&lt;/p&gt;

&lt;a href="https://github.com/DoctorWebLtd/malware-iocs/blob/master/September%202023%20review%20of%20virus%20activity%20on%20mobile%20devices/README.adoc" target="_blank" rel="noopener noreferrer"&gt;Indicators of compromise&lt;/a&gt;

&lt;!-- ANDROID_PROTECT_BLOCK_NEW --&gt;
&lt;div class="CellBlock noPadd AndroidBlockNew"&gt;
    &lt;div class="container"&gt;
        &lt;div class="-Grid_1of6 -viewM-Grid_1of1"&gt;

            &lt;div class="DecorBg" style="background-color: #4788aa;"&gt;&lt;/div&gt;

            &lt;div class="Grid Grid_span2 alignMiddle alignCenter paddYM" style="background: url(https://st.drweb.com/static/new-www/img/bg_blue_geom.1.jpg); center; background-size: cover; background-color: #4788aa;"&gt;
                &lt;img src="https://st.drweb.com/static/new-www/img/drweb_ss_blue_noBg.png" alt="Dr.Web Mobile Security"&gt;
            &lt;/div&gt;&lt;!--
                
            --&gt;&lt;div class="Grid Grid_span4 alignMiddle _viewM_paddYM"&gt;
                &lt;div class="paddLL _viewS_noPaddL"&gt;
                    &lt;h2 class="noMargY white _viewM_alignCenter"&gt;Your Android needs protection.&lt;/h2&gt;
                    &lt;h2 class="margTC noMargB white _viewM_alignCenter"&gt;Use Dr.Web&lt;/h2&gt;
                    &lt;ul class="IconList white fontM margBS _viewM_fontS"&gt;
                        &lt;li class="icon" data-icon="#common-tick.main_green_4"&gt;The first Russian anti-virus for Android&lt;/li&gt;
                        &lt;li class="icon" data-icon="#common-tick.main_green_4"&gt;Over 140 million downloads—just from Google Play&lt;/li&gt;
                        &lt;li class="icon" data-icon="#common-tick.main_green_4"&gt;Available free of charge for users of Dr.Web home products&lt;/li&gt;
                    &lt;/ul&gt;
                    &lt;p class="noMargY _viewM_alignCenter"&gt;
                        &lt;a href="https://f2.drweb.com/lr/?to=https%3A%2F%2Fdownload.drweb.com%2Fandroid%2F%3Flng%3Den%26from%3DANDROID_PROTECT_BLOCK_NEW" class="Btn bg_main_green_5"&gt;
                            &lt;span class="Btn-body icon icon_right" data-icon="#common-arrowRight"&gt;
                                &lt;span class="Btn-text uppercase"&gt;Free download&lt;/span&gt;
                            &lt;/span&gt;
                        &lt;/a&gt;    
                    &lt;/p&gt;
                &lt;/div&gt;
            &lt;/div&gt;

        &lt;/div&gt;
    &lt;/div&gt;
&lt;/div&gt;
&lt;!-- ANDROID_PROTECT_BLOCK_NEW end --&gt;


</description></item><item><guid>https://news.drweb.com/show/?i=14751&amp;lng=en</guid><title>Doctor Web’s August 2023 review of virus activity on mobile devices</title><link>https://news.drweb.com/show/?i=14751&amp;lng=en&amp;c=38</link><pubDate>Wed, 27 Sep 2023 04:00:00 GMT</pubDate><description>


&lt;p&gt;&lt;b&gt;September 27, 2023&lt;/b&gt;&lt;/p&gt;
&lt;p id="main"&gt;&lt;newslead&gt;According to detection statistics collected by Dr.Web for Android, in August 2023, adware trojans from the &lt;a href="https://vms.drweb.com/search/?q=Android.MobiDash&amp;lng=en"&gt;&lt;b&gt;Android.MobiDash&lt;/b&gt;&lt;/a&gt; and &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; families were again among the most widespread Android malware. At the same time, the former were detected 72.23% more often, while the activity of the latter decreased by 8.87%, compared to the previous month.&lt;/newslead&gt;&lt;/p&gt;
&lt;p&gt;The number of spyware trojans and ransomware malware detected on protected devices decreased by 13.88% and 18.14%, respectively. In addition, users encountered banking trojans 2.13% more often than in July.&lt;/p&gt;
&lt;p&gt;In August, yet another malicious program was discovered on Google Play.&lt;/p&gt;

&lt;div class="paddXM paddYM bg_ocean_1 white custom-color-link"&gt;
  &lt;h4 class="white alignCenter"&gt;PRINCIPAL TRENDS IN AUGUST&lt;/h4&gt;
  &lt;ul&gt;
    &lt;li&gt;A significant increase in &lt;a href="https://vms.drweb.com/search/?q=Android.MobiDash&amp;lng=en"&gt;&lt;b&gt;Android.MobiDash&lt;/b&gt;&lt;/a&gt; adware trojan activity&lt;/li&gt;
    &lt;li&gt;A decrease in &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt; adware trojan activity&lt;/li&gt;
    &lt;li&gt;A decrease in spyware- and ransomware-trojan activity&lt;/li&gt;
    &lt;li&gt;An increase in the number of banking malware attacks&lt;/li&gt;
  &lt;/ul&gt;
&lt;/div&gt;

&lt;h2 id="stat"&gt;According to statistics collected by Dr.Web for Android&lt;/h2&gt;
&lt;p class="alignCenter"&gt;
   &lt;a href="https://st.drweb.com/static/new-www/news/2023/august/review_mobile/01_malware_august_2023_en.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/august/review_mobile/01_malware_august_2023_en.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
&lt;/p&gt;

&lt;dl class="dlList"&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3697&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;A trojan app designed to display intrusive ads. Trojans of this family are often distributed as popular and harmless applications. In some cases, other malware can install them in the system directory. When these infect Android devices, they typically conceal their presence from the user. For example, they “hide” their icons from the home screen menu.&lt;/dd&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.Spy.5106&amp;lng=en"&gt;&lt;b&gt;Android.Spy.5106&lt;/b&gt;&lt;/a&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for a trojan that presents itself as modified versions of unofficial WhatsApp messenger mods. This malicious program can steal the contents of notifications and offer users other apps from unknown sources for installation. And when such a modified messenger is used, it can also display dialog boxes containing remotely configurable content.&lt;/dd&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.MobiDash&amp;lng=en"&gt;&lt;b&gt;Android.MobiDash&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7802&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;A trojan that displays obnoxious ads. It is a special software module that developers incorporate into applications.&lt;/dd&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Android.Packed&amp;lng=en"&gt;&lt;b&gt;Android.Packed&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.57083&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for malicious applications protected with an ApkProtector software packer. Among them are banking trojans, spyware, and other malicious software.&lt;/dd&gt;
  &lt;dt&gt;&lt;b&gt;Android.Pandora.7&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for malicious programs that download and install the &lt;a href="https://vms.drweb.com/search/?q=Android.Pandora.2&amp;lng=en"&gt;&lt;b&gt;Android.Pandora.2&lt;/b&gt;&lt;/a&gt; backdoor trojan. Threat actors often embed such downloaders in Smart TV software oriented toward Spanish-speaking users.&lt;/dd&gt;
&lt;/dl&gt;

&lt;p class="alignCenter"&gt;
   &lt;a href="https://st.drweb.com/static/new-www/news/2023/august/review_mobile/02_unwanted_august_2023_en.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/august/review_mobile/02_unwanted_august_2023_en.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
&lt;/p&gt;

&lt;dl class="dlList"&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.FakeAntiVirus&amp;lng=en"&gt;&lt;b&gt;Program.FakeAntiVirus&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for adware programs that imitate anti-virus software. These apps inform users of nonexistent threats, mislead them, and demand that they purchase the software’s full version.&lt;/dd&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.FakeMoney&amp;lng=en"&gt;&lt;b&gt;Program.FakeMoney&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7&lt;/b&gt;&lt;/dt&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.FakeMoney&amp;lng=en"&gt;&lt;b&gt;Program.FakeMoney&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.8&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for Android applications that allegedly allow users to earn money by watching video clips and ads. These apps make it look as if rewards are accruing for completed tasks. To withdraw their “earnings”, users allegedly have to collect a certain sum. But even if they succeed, in reality they cannot get any real payments.&lt;/dd&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.SecretVideoRecorder&amp;lng=en"&gt;&lt;b&gt;Program.SecretVideoRecorder&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for various modifications of an application that is designed to record videos and take photos in the background using built-in Android device cameras. It can operate covertly by allowing notifications about ongoing recordings to be disabled. It also allows an app’s icon and name to be replaced with fake ones. This functionality makes this software potentially dangerous.&lt;/dd&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Program.wSpy&amp;lng=en"&gt;&lt;b&gt;Program.wSpy&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;A commercial spyware app designed to covertly monitor Android device user activity. It allows intruders to read SMS and chats in popular messaging software, listen to the surroundings, track device location and browser history, gain access to the phonebook and contacts, photos and videos, and take screenshots and pictures through a device’s built-in camera. In addition, it has keylogger functionality.&lt;/dd&gt;
&lt;/dl&gt;

&lt;p class="alignCenter"&gt;
   &lt;a href="https://st.drweb.com/static/new-www/news/2023/august/review_mobile/03_riskware_august_2023_en.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/august/review_mobile/03_riskware_august_2023_en.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
&lt;/p&gt;

&lt;dl class="dlList"&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.LuckyPatcher&amp;lng=en"&gt;&lt;b&gt;Tool.LuckyPatcher&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;A tool that allows apps installed on Android devices to be modified (i.e., by creating patches for them) in order to change the logic of their work or to bypass certain restrictions. For instance, users can apply it to disable root-access verification in banking software or to obtain unlimited resources in games. To add patches, this utility downloads specially prepared scripts from the Internet, which can be crafted and added to the common database by any third-party. The functionality of such scripts can prove to be malicious; thus, patches made with this tool can pose a potential threat.&lt;/dd&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.14.origin &lt;/b&gt;&lt;/dt&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7.origin&lt;/b&gt;&lt;/dt&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.SilentInstaller&amp;lng=en"&gt;&lt;b&gt;Tool.SilentInstaller&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.6.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;Riskware platforms that allow applications to launch APK files without installing them. They create a virtual runtime environment that does not affect the main operating system.&lt;/dd&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Tool.ApkProtector&amp;lng=en"&gt;&lt;b&gt;Tool.ApkProtector&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.16.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;The detection name for Android apps protected by the ApkProtector software packer. This packer is not malicious in itself, but cybercriminals can use it when creating malware and unwanted applications to make it more difficult for anti-virus software to detect them.&lt;/dd&gt;  
&lt;/dl&gt;

&lt;p class="alignCenter"&gt;
    &lt;a href="https://st.drweb.com/static/new-www/news/2023/august/review_mobile/04_adware_august_2023_en.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/august/review_mobile/04_adware_august_2023_en.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
&lt;/p&gt;

&lt;dl class="dlList"&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.AdPush&amp;lng=en"&gt;&lt;b&gt;Adware.AdPush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.39.origin&lt;/b&gt;&lt;/dt&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.AdPush&amp;lng=en"&gt;&lt;b&gt;Adware.AdPush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.36.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;Adware modules that can be built into Android apps. They display notifications containing ads that mislead users. For example, such notifications can look like messages from the operating system. In addition, these modules collect a variety of confidential data and are able to download other apps and initiate their installation.&lt;/dd&gt;
  &lt;dt&gt;&lt;b&gt;Adware.ShareInstall.1.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;An adware module that can be built into Android applications. It displays notifications containing ads on the Android OS lock screen.&lt;/dd&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.MagicPush&amp;lng=en"&gt;&lt;b&gt;Adware.MagicPush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.1&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;An adware module embedded into Android applications. It displays pop-up banners over the OS user interface when such hosting apps are not in use. These banners contain misleading information. Most often, they inform users about suspicious files that have allegedly been discovered, or they offer to block spam for users or to optimize their device’s power consumption. To do this, they ask users to open the corresponding app containing such an adware module. Upon opening the app, users are shown an ad.&lt;/dd&gt;
  &lt;dt&gt;&lt;a href="https://vms.drweb.com/search/?q=Adware.Airpush&amp;lng=en"&gt;&lt;b&gt;Adware.Airpush&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.7.origin&lt;/b&gt;&lt;/dt&gt;
    &lt;dd&gt;A member of a family of adware modules that can be built into Android apps and display various ads. Depending on the modules’ version and modification, these can be notifications containing ads, pop-up windows or banners. Malicious actors often use these modules to distribute malware by offering their potential victims diverse software for installation. Moreover, such modules collect personal information and send it to a remote server.&lt;/dd&gt;
&lt;/dl&gt;

&lt;h2 id="googleplay"&gt;Threats on Google Play&lt;/h2&gt;
&lt;p&gt;In August, the &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3766&lt;/b&gt; trojan application was detected on Google Play. It was distributed as image collection software called Exquisite Wallpaper Collection. However, its main functionality is to display unwanted ads. At the same time, &lt;a href="https://vms.drweb.com/search/?q=Android.HiddenAds&amp;lng=en"&gt;&lt;b&gt;Android.HiddenAds&lt;/b&gt;&lt;/a&gt;&lt;b&gt;.3766&lt;/b&gt; tries to hide from the user. To do so, the trojan replaces its icon located on the home screen with a transparent one and changes its name so that it is blank. In some cases, this malicious program may instead replace the icon with a copy of the Google Chrome browser icon. When the user taps on it, it will launch the browser itself instead of the trojan. &lt;/p&gt;

&lt;p class="alignCenter"&gt;
   &lt;a href="https://st.drweb.com/static/new-www/news/2023/august/review_mobile/05_android.hiddenads.3766.png" class="preview"&gt;&lt;img src="https://st.drweb.com/static/new-www/news/2023/august/review_mobile/05_android.hiddenads.3766.1.png" alt="According to statistics collected by Dr.Web for Android #drweb"&gt;&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;To protect your Android device from malware and unwanted programs, we recommend installing Dr.Web anti-virus products for Android.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://github.com/DoctorWebLtd/malware-iocs/blob/master/August%202023%20review%20of%20virus%20activity%20on%20mobile%20devices/README.adoc" target="_blank" rel="noopener noreferrer"&gt;Indicators of compromise&lt;/a&gt;&lt;/p&gt;

&lt;!-- ANDROID_PROTECT_BLOCK_NEW --&gt;
&lt;div class="CellBlock noPadd AndroidBlockNew"&gt;
    &lt;div class="container"&gt;
        &lt;div class="-Grid_1of6 -viewM-Grid_1of1"&gt;

            &lt;div class="DecorBg" style="background-color: #4788aa;"&gt;&lt;/div&gt;

            &lt;div class="Grid Grid_span2 alignMiddle alignCenter paddYM" style="background: url(https://st.drweb.com/static/new-www/img/bg_blue_geom.1.jpg); center; background-size: cover; background-color: #4788aa;"&gt;
                &lt;img src="https://st.drweb.com/static/new-www/img/drweb_ss_blue_noBg.png" alt="Dr.Web Mobile Security"&gt;
            &lt;/div&gt;&lt;!--
                
            --&gt;&lt;div class="Grid Grid_span4 alignMiddle _viewM_paddYM"&gt;
                &lt;div class="paddLL _viewS_noPaddL"&gt;
                    &lt;h2 class="noMargY white _viewM_alignCenter"&gt;Your Android needs protection.&lt;/h2&gt;
                    &lt;h2 class="margTC noMargB white _viewM_alignCenter"&gt;Use Dr.Web&lt;/h2&gt;
                    &lt;ul class="IconList white fontM margBS _viewM_fontS"&gt;
                        &lt;li class="icon" data-icon="#common-tick.main_green_4"&gt;The first Russian anti-virus for Android&lt;/li&gt;
                        &lt;li class="icon" data-icon="#common-tick.main_green_4"&gt;Over 140 million downloads—just from Google Play&lt;/li&gt;
                        &lt;li class="icon" data-icon="#common-tick.main_green_4"&gt;Available free of charge for users of Dr.Web home products&lt;/li&gt;
                    &lt;/ul&gt;
                    &lt;p class="noMargY _viewM_alignCenter"&gt;
                        &lt;a href="https://f2.drweb.com/lr/?to=https%3A%2F%2Fdownload.drweb.com%2Fandroid%2F%3Flng%3Den%26from%3DANDROID_PROTECT_BLOCK_NEW" class="Btn bg_main_green_5"&gt;
                            &lt;span class="Btn-body icon icon_right" data-icon="#common-arrowRight"&gt;
                                &lt;span class="Btn-text uppercase"&gt;Free download&lt;/span&gt;
                            &lt;/span&gt;
                        &lt;/a&gt;    
                    &lt;/p&gt;
                &lt;/div&gt;
            &lt;/div&gt;

        &lt;/div&gt;
    &lt;/div&gt;
&lt;/div&gt;
&lt;!-- ANDROID_PROTECT_BLOCK_NEW end --&gt;

&lt;style&gt;
    .custom-color-link a {
        color: #73b320;
    }
&lt;/style&gt;


</description></item></channel></rss>
