Threat Database Mac Malware CherryBlos Mobile Malware

CherryBlos Mobile Malware

A new Android malware family named 'CherryBlos' was discovered on Google Play, aiming to collect cryptocurrency credentials and funds or conduct schemes. The threatening applications carrying the threat use various distribution channels, including social media, phishing sites, and deceitful shopping apps on Google Play, Android's official app store. It should be noted that alongside CherryBlos, researchers uncovered another previously unknown mobile malware strain tracked as 'FakeTrade.'

CherryBlos Masquerades as AI Tools and Coin miners

The CherryBlos malware was distributed as an APK (Android package) file. This unsafe software was disguised as several fake AI tools or coin miners and promoted on popular platforms such as Telegram, Twitter and YouTube. The harmful APKs were given deceptive names like GPTalk, Happy Miner, Robot999, and SynthNet, and were made available for download on websites with domain names matching the respective fake application.

Furthermore, one of the harmful applications, named SynthNet, managed to infiltrate the Google Play store, resulting in approximately a thousand downloads before eventually being reported and removed.

The Main Goal of CherryBlos is to Collect Cryptocurrency Credentials

CherryBlos represents a threatening cryptocurrency collecting malware that capitalizes on Accessibility service permissions to obtain two configuration files from its Command and Control (C2) server. It goes a step further by automatically granting additional permissions and obstructing users from terminating the infected application.

This unsafe software adopts various tactics to pilfer cryptocurrency credentials and assets, with its primary approach involving the creation of counterfeit user interfaces that closely resemble legitimate applications, tricking users into revealing their credentials unknowingly.

The data collected by CherryBlos is then sent back to the attackers' servers at regular intervals.

An even more intriguing feature of CherryBlos comes into play when OCR (optical character recognition) is enabled. This allows the malware to extract text from images and photos stored on the compromised device, further augmenting its ability to steal sensitive information.

Additionally, the malware functions as a clipboard hijacker, specifically targeting the Binance app. location. It operates by surreptitiously altering the recipient's crypto address with one controlled by the attacker, all the while making the original address appear unaffected to the unsuspecting user. Doing so grants the threat actors the capability to reroute payments intended for users to their own wallets, resulting in the outright theft of the transferred funds.

Take Measures to Protect Your Mobile Devices from Malware Threats

Protecting your mobile devices from malware threats is essential to ensure the safety of your personal information and sensitive data. Here are some effective measures to safeguard your mobile devices:

  • Keep Software Updated: Regularly update your mobile operating system, apps, and security software. Updates z lot of times include bug fixes and security patches that help protect against known vulnerabilities.
  •  Download Applications from Trusted Sources: Stick to official stores like Google Play Store which sells apps for Android products and the Apple App Store for iOS devices. Avoid sideloading apps from unverified sources, as they may contain malware.
  •  Read App Permissions: Review the permissions an app requests before installation. If an app asks for excessive permissions that seem unrelated to its function, consider it a red flag and refrain from installing it.
  •  Use Mobile Security Software: Install a reputable mobile security app that includes anti-malware protection. These apps can help detect and remove threats before they cause harm.
  •  Set Strong Passwords/PINs: Use strong, unique passwords or PINs to secure your device and important apps. Avoid using easily guessable passwords or patterns.
  •  Be Cautious with Links and Attachments: Avoid accessing suspicious links and email attachments from unknown senders, as they could contain malware.
  •  Secure Your Wi-Fi Connections: Use encrypted Wi-Fi connections whenever possible. Avoid connecting to public Wi-Fi networks without using a Virtual Private Network (VPN) for more protection.
  •  Backup Your Data: Regularly back up your data to an external source or a cloud storage service. This ensures you can recover your important files in case of malware infection or device loss.
  •  Enable Find My Device: Activate the 'Find My Device' feature if your device supports it to remotely track, lock, or erase it if it gets lost or stolen.

By following these measures, you can significantly reduce the risk of falling victim to mobile malware and protect your personal information and privacy.

Trending

Most Viewed

Loading...