Android Spyware gives attackers complete control of Your Phone: What to Do

Android Spyware gives attackers complete control of Your Phone: What to Do

A newly discovered strain of multi-step Android spyware has been lurking in the background since 2016, infecting tens of thousands of users, but will not launch itself unless the malware's operator decides the victim has enough money to steal

Named Mandrake by Bitdefender's discoverers, the malware can take "complete control of the device," stealing information and cryptocurrency, breaking into bank accounts, and even factory resetting infected phones to cover its tracks

Mandrake-infected apps have been removed from the Google Play Store, but are likely still lurking in "offloaded" app markets beyond Google's reach To avoid infection, make sure your phone's settings have not been changed to accept apps from "unknown sources" and install some of the best Android antivirus apps

The first stage of Mandrake, "droppers," come in the form of benign-looking apps that actually do what they promise: Bitdefender, CoinCast on Google Play, Currency XE Converter, Car News, Horoskope, SnapTune Vid, Abfix, and Office Scanner, to name a few of them

All have now been removed from Google Play, but Tom's Guide was able to confirm that Facebook and YouTube pages promoting some of them are still up

Installing these seemingly harmless apps collects information about your device and surroundings, but otherwise does nothing terrible

If an app does not work well for its advertised purpose and you complain about it on Google Play, the malware operators apologize and make improvements

"The number of victims from this wave is estimated to be in the tens of thousands, perhaps hundreds of thousands over the entire four-year period," Bitdefender wrote in its report

However, the first stage also tricks users into allowing the installation of apps from outside the Google Play store, then downloads and installs a second stage, a "loader"

The loader lurks in the background, collecting more information about you and sending it to the malware operator If so, the loader downloads the third stage, the core Mandrake malware

"Given the complexity of the spying platform, it is assumed that all attacks are individually targeted, executed with surgical precision, and performed manually rather than automatically," Bitdefender wrote

Mandrake tricks users by displaying fake overlays on their screens, such as end-user license agreements that require consent These are tailored to different phones, screen sizes, languages, and Android versions But if you click "OK" to agree, you are really giving them administrative privileges

Mandrake then forwards all your text messages to the attacker, forwards your phone calls to other numbers, blocks incoming calls, installs or removes apps, steals your contact list, hides notifications, records your screen activity, records your Facebook and online bank account passwords, create phishing pages that exploit Gmail and Amazon credentials, and track your location

The coup de grace is a command embedded in the malware called "seppuku," named after the Japanese practice of seppuku This command factory-wipes the device, erasing all traces of malware and all user data

Because Mandrake's administrative privileges were tricked, rebooting the device or uninstalling the first-stage apps does not remove the core malware

"The only way to remove Mandrake is to boot the device in safe mode, remove the device administrator's special permissions, and uninstall it manually," Bitdefender wrote

Such sophistication, and such targeted attacks, are usually a sure sign of state-controlled espionage However, Bitdefender researchers believe that even if the operators appear to be in Russia, this is purely a crime-driven, money-grubbing operation

Following the standard pattern of Russian malware, Mandrake does not infect Android users in Russia or former Soviet republics It also avoids all of Africa, Arabic-speaking countries, and many poor countries in other regions

It also avoids installation on phones with Verizon SIM cards and on SIM cards from major Chinese cell phone companies, although the reason is unclear

The main target is Australia, followed by North America, Western Europe (and Poland), and the affluent regions of South America

Categories