Beware: Android Dropper-as-a-Service Evades Google's Defenses

SecuriDropper, a new dropper-as-a-service (DaaS) for Android, has been discovered by cybersecurity researchers. This malware bypasses Google's new security restrictions and delivers the payload. SecuriDropper disguises itself as harmless apps and uses a different Android API to install the payload, mimicking the process used by marketplaces. It bypasses Google's Restricted Settings by requesting permissions to read and write data to external storage, as well as install and delete packages. Android banking trojans like SpyNote and ERMAC have been distributed via SecuriDropper on deceptive websites and third-party platforms. Another similar dropper service called Zombinder has also been observed offering a Restricted Settings bypass.
- SecuriDropper: New Android Dropper-as-a-Service Bypasses Google's Defenses The Hacker News
- Cybercrime service bypasses Android security to install malware BleepingComputer
- New Android malware dropper sneaks past Google — protect yourself now Tom's Guide
- Why users should avoid downloading APK files on Android devices The Hindu
Reading Insights
0
1
2 min
vs 3 min read
80%
521 → 102 words
Want the full story? Read the original article
Read on The Hacker News