Android Malware Apps Evade Detection with Stealthy APK Compression

1 min read
Source: The Hacker News
Android Malware Apps Evade Detection with Stealthy APK Compression
Photo: The Hacker News
TL;DR Summary

Threat actors are using Android Package (APK) files with unsupported compression methods to evade malware analysis. Over 3,300 artifacts have been found using this technique, with 71 samples able to be loaded onto the operating system without issues. These apps were likely distributed through untrusted app stores or social engineering tactics. The use of unsupported compression methods limits decompilation and analysis, making it difficult to detect and analyze the malware. Additionally, malware authors are deliberately corrupting APK files to trigger crashes on analysis tools. This discovery follows Google's recent revelation about threat actors using versioning to bypass malware detection on the Play Store.

Share this article

Reading Insights

Total Reads

0

Unique Readers

1

Time Saved

1 min

vs 2 min read

Condensed

69%

335103 words

Want the full story? Read the original article

Read on The Hacker News