Skip to main content

Hackers Install Malware on Android Devices That Open Google Play Store to Provide 5* Ratings & Fake Reviews for Malicious Apps


fake reviews
fake reviews

Researchers discovered a new type of strange malware that targeting android device, and use the victim’s mobiles to provide fake ratings in Google play store apps for malicious apps.
You may have seen reviews in Google Play apps that seem to be talking about something unrelated to the apps. this malware named as Trojan-Dropper.AndroidOS.Shopper.a. give it five stars, while dozens of users rate it as 1 start.
Cybercriminals used this trojan to boosting malicious, fake and adware apps and increasing the number of installations.
Also, the Trojan will perform various malicious activities such as display advertising messages on the infected device, create shortcuts to ad sites, and perform other actions.

fake reviews

Apart from reviewing with fake comments, the malware evades the user’s detection, the installation window is concealed by the app’s “invisible” window.
Shopper.a also enables the AccessibilityService to install the new apps from the 3rd party services.
According to the Kaspersky report, “With permission to use it, the malware has almost limitless possibilities for interacting with the system interface and apps. For instance, it can intercept data displayed on the screen, click buttons, and emulate user gestures.”

Shopper.a Infection Process

Once the malware enters the device via a malicious app, it decrypts and downloads the payload once the victim unlocked the device.
Soon after it collects the device information country, network type, vendor, smartphone model, email address, IMEI, IMSI and forward it to the c2 server that controlled by the attacker.
In response, the malware receives the set of commands to start to perform a variety of the following operation:
  • Open links received from the remote server in an invisible window (whereby the malware verifies that the user is connected to a mobile network).
  • After a certain number of screen unlocks, hide itself from the apps menu.
  • Check the availability of AccessibilityService rights and, if not granted, periodically issue a phishing request to the user to provide them.
  • Disable Google Play Protect.
  • Create shortcuts to advertised sites in the apps menu.
  • Download apps from the third-party “market” Apkpure[.]com and install them.
  • Open advertised apps on Google Play and “click” to install them.
  • Replace shortcuts to installed apps with shortcuts to advertised sites.
  • Post fake reviews supposedly from the Google Play user.
  • Show ads when the screen is unlocked.
Shopper.a mostly widespread in Russia with (28.46%), Brazil (18.70%) and third to India (14.23%).

Comments

Popular posts from this blog

Pdf books of hacking

Like the page for regular updates 1.Ethical hacking http://festyy.com/qLwjMg 2.Hacking secret ciphers with python http://festyy.com/qLwlfW 3.Hacking for begginers http://festyy.com/qLwzXJ 4.Hyip hackers underground handbook http://festyy.com/qLwvKs 5. Black belt of hacking http://sh.st/v8YMr 6. Black book of viruses and hacking http://festyy.com/qLpyS6 7.Hackers underground handbook http://destyy.com/q140aO 8. Prophet Hacker https://drive.google.com/file/d/0ByOFjnK5DDf7YzY1Zy0xVVlvOGs/view?usp=drivesdk 9. Kali linux cookbook https://drive.google.com/file/d/0ByOFjnK5DDf7UmhYZkNfY3o1dlE/view?usp=drivesdk LIKE THE FACEBOOK PAGE FOR MORE TRICKS RELATED HACKING Click here

Create your Pendrive as hacking tool

Hellow friends myself Debabrato Das and I am going to teach you how you can create a penderive to ethical hacking tool. For it you just to follow steps Step 1 First of all, you will need to Download a software called Web Browser Pass views. The software is 100% virus Free and tested. You can download the software zip file from the below line. CIICK HERE TO DOWNLOAD Step 2 Insert your Pendrive to your Computer and then Quick Format It as NTFS. It is important to format the Pendrive as NTFS because that’s how it can interact as default windows drive.  Step 3 After formatting the Pendrive, Create a New Folder in your Pendrive and name the folder as “USB” and then Extract the Web Browser Passview zip file into the USB folder. Step 4:  Open a Notepad and then copy the codes written below and then Save the File As USB Driver.bat @echo off cls start \usb\WebBrowserPassView.exe /shtml 1.html Step 5:  Reopen a Notepad and then copy the code written below and this...

Top 7 types of hacking Facebook account

Hellow friends myself Debabrato Das and today I m going to discuss top 7 popular method of hacking facebook account lets start the topic. 1. GUESSING METHOD This is most commonly method used by general people not by hackers.In this method people guess several password related to victim's life. The statics tells that 50% of fb id have password as there phone number. By this static its clear if u have 2 or 3 number of a person u have 50% probability of hacking his or her id. 2.  SAVED PASSWORDS  People generally save there password during login in there personal computer but it is not safe if you share the by installation folder than the person can easily check which passwords were saved in your web browser by only following few simple steps or by seating in your Pc for 2 minutes. And a hacker can get your password by penetrating in your computer so be allert and don't save any kind of password. 3. SCREEN CAPTURE  This is a very simple method of hacking Facebo...