Malware Operator Employs New Trick to Upload its Dropper into Google Play

Researchers at Check Point recently discovered that the operator of a malware tool that breaks into mobile users’ financial accounts was employing a novel new method to sneak its malware into Google’s official Android Play mobile app store. The method involved using Google’s own Firebase platform for command-and-control (C2) communications and using GitHub as a third-party hosting platform for downloading the main malware.

Read full article on Dark Reading

 


Date:

Categorie(s):