Android

How Android Fought the Chamois Botnet—and Won – WIRED

sophisticated botnet built on tainted apps that all worked together to power ad and SMS fraud. Dubbed Chamois, the malware family had already cropped up in 2016 and was being distributed both through Google Play and third-party app stores. So the Android team started aggressively flagging and helping to uninstall Chamois until they were sure…


sophisticated botnet built on tainted apps that all worked together to power ad and SMS fraud. Dubbed Chamois, the malware family had already cropped up in 2016 and was being distributed both through Google Play and third-party app stores. So the Android team started aggressively flagging and helping to uninstall Chamois until they were sure it was dead.

Eight months later, though, in November 2017, Chamois roared back into the Android ecosystem, more ferocious than before. By March 2018, a year after Google thought it had been vanquished, Chamois hit an all-time high, infecting 20.8 million devices. Now, a year after that zenith, the Android team has whittled that number back down to fewer than 2 million infections. And at the Kaspersky Security Analyst Summit in Singapore this week, Android security engineer Maddie Stone is presenting a full post-mortem on how Google fought back against Chamois—again—and how personal the rivalry became.

“I actually gave a talk at Black Hat last year on what’s called ‘stage three’ of Chamois,” Stone told WIRED ahead of her talk. “And within 72 hours of me giving that talk, they started trying to change the bytes and each of the indicators I talked about. We could see them manipulating it. The Chamois developers also fingerprinted our exact Android security analysis environment and built in protections for some of the customizations that we use.”

Back With a Vengeance

After the March 2018 infection peak, the Android security team started collaborating with other defenders across Google, like anti-abuse and ad security specialists and software engineers, to get a handle on the new version of Chamois. The first two variants the team tracked in 2016 and 2017 infected devices in four stages to organize and mask the attack. The 2018 version, though, contained six stages, antivirus testing engines, and even more sophisticated anti-analysis and anti-debugging shields to avoid discovery. Malware developers build these features into

Read More

Be the first to write a comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

Android

The Best Mobile Bitcoin Casinos for Gambling in 2025 (Android & iOS Tested)

The best Bitcoin mobile casinos in 2025 are TheHighRoller Casino, Lucky Block, Instant Casino, WSM Casino, Instaspin, Golden Panda, Mega Dice, CoinPoker, Wreckbet, BC.Game, Cloudbet, Shuffle, Fairspin, Stake, and Winz.io. The post The Best Mobile Bitcoin Casinos for Gambling in 2025 (Android & iOS Tested) appeared first on CryptoNinjas…

The best Bitcoin mobile casinos in 2025 are TheHighRoller Casino, Lucky Block, Instant Casino, WSM Casino, Instaspin, Golden Panda, Mega Dice, CoinPoker, Wreckbet, BC.Game, Cloudbet, Shuffle, Fairspin, Stake, and Winz.io.
The post The Best Mobile Bitcoin Casinos for Gambling in 2025 (Android & iOS Tested) appeared first on CryptoNinjas…
Read More

Continue Reading
Android

New Android malware uses OCR to steal crypto wallet keys from images

A sophisticated new strain of Android malware has emerged from Korea. It targets cryptocurrency wallets by exploiting users’ mnemonic keys. McAfee Labs researcher SangRyol Ryu came across the malware after tracing data stolen by malicious apps to rogue servers and gaining access.Read Entire Article…

A sophisticated new strain of Android malware has emerged from Korea. It targets cryptocurrency wallets by exploiting users’ mnemonic keys. McAfee Labs researcher SangRyol Ryu came across the malware after tracing data stolen by malicious apps to rogue servers and gaining access.Read Entire Article…
Read More

Continue Reading
Android

SpyAgent Android malware steals your crypto recovery phrases from images

A new Android malware named SpyAgent uses optical character recognition (OCR) technology to steal cryptocurrency wallet recovery phrases from screenshots stored on the mobile device. …

A new Android malware named SpyAgent uses optical character recognition (OCR) technology to steal cryptocurrency wallet recovery phrases from screenshots stored on the mobile device. …
Read More

Continue Reading
Android

Found: 280 Android apps that use OCR to steal cryptocurrency credentials

Optical Character Recognition converts passwords shown in images to machine-readable text…

Optical Character Recognition converts passwords shown in images to machine-readable text…
Read More

Continue Reading