• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
AimactGrow
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
AimactGrow
No Result
View All Result

New Konfety Malware Variant Evades Detection by Manipulating APKs and Dynamic Code

Admin by Admin
July 16, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Cybersecurity researchers have found a brand new, subtle variant of a recognized Android malware known as Konfety that leverages the evil twin method to allow advert fraud.

The sneaky method primarily includes a state of affairs whereby two variants of an software share the identical bundle identify: A benign “decoy” app that is hosted on the Google Play Retailer and its evil twin, which is distributed through third-party sources.

It is price stating that the decoy apps do not need to be essentially printed by risk actors themselves and might be official. The one caveat is that the malicious apps share the very same bundle names as their actual counterparts already obtainable on the Play Retailer.

“The risk actors behind Konfety are extremely adaptable, constantly altering their focused advert networks and updating their strategies to evade detection,” Zimperium zLabs researcher Fernando Ortega stated. “This newest variant demonstrates their sophistication by particularly tampering with the APK’s ZIP construction.”

Cybersecurity

By utilizing malformed APKs, the tactic permits risk actors to sidestep detection and problem reverse engineering efforts. Moreover dynamically loading the primary DEX (Dalvik Executable) payload at runtime, the newly found variations allow the general-purpose bit flag by setting it to “Bit 0,” signaling to the system that the file is encrypted.

This conduct, in flip, triggers a false password immediate when trying to examine the Android bundle, thereby blocking entry and complicating makes an attempt to investigate its contents.

The second method entails falsely declaring the usage of BZIP compression methodology within the app’s manifest XML file (“AndroidManifest.xml”), inflicting evaluation instruments like APKTool and JADX to crash resulting from a parsing failure. An analogous compression-based protection evasion method was beforehand highlighted by Kaspersky in one other Android malware known as SoumniBot.

Using dynamic code loading to execute the first payload affords added stealth throughout preliminary scans or reverse engineering, Zimperium famous. Throughout execution, the DEX payload is decrypted and loaded straight into reminiscence with out attracting any purple flags.

“This multi-layered obfuscation method, combining encrypted property, runtime code injection, and misleading manifest declarations, demonstrates the evolving sophistication of the Konfety operation and its steady efforts to evade evaluation and bypass detection mechanisms,” Ortega stated.

Just like the earlier iteration reported by HUMAN final yr, Konfety abuses the CaramelAds software program growth equipment (SDK) to fetch adverts, ship payloads, and preserve communication with attacker-controlled servers.

It comes with capabilities to redirect customers to malicious web sites, immediate undesirable app installs, and set off persistent spam-like browser notifications. Moreover, the malware hides its app icon and makes use of geofencing to change its performance primarily based on the sufferer’s area.

The event comes as ANY.RUN detailed a Chinese language Android packer software generally known as Ducex that is primarily designed to hide embedded payloads like Triada inside faux Telegram apps.

“The packer employs critical obfuscation by way of perform encryption utilizing a modified RC4 algorithm with added shuffling,” ANY.RUN researcher Alina Markova stated. “Ducex creates main roadblocks for debugging. It performs APK signature verification, failing if the app is re-signed. It additionally employs self-debugging utilizing fork and ptrace to dam exterior tracing.”

On prime of that, Ducex is designed to detect the presence of well-liked evaluation instruments comparable to Frida, Xposed, and Substrate, and if current, terminate itself.

The findings additionally observe a brand new examine printed by a staff of researchers from TU Wien and the College of Bayreuth a couple of novel method dubbed TapTrap that may be weaponized by a malicious app to covertly bypass Android’s permission system and acquire entry to delicate information or execute harmful actions.

The assault, in a nutshell, hijacks consumer interactions on Android units by overlaying animations or video games on a consumer’s display, whereas surreptitiously launching consumer interface parts beneath that trick customers into performing undesirable actions, comparable to putting in malware or granting the app intrusive permissions.

Cybersecurity

“Usually, Android exhibits an animation when the display adjustments, comparable to the brand new display sliding or fading in,” researchers Philipp Beer, Marco Squarcina, Sebastian Roth, and Martina Lindorfer stated. “Nevertheless, the app can inform the system {that a} customized animation must be used as an alternative that’s long-running and makes the brand new display absolutely clear, maintaining it hidden from you.”

“Any faucets you make throughout this animation go to the hidden display, not the seen app. The app can then use this to lure you into tapping on particular areas of the display that correspond to delicate actions on the hidden display, permitting it to carry out actions with out your data.”

In a hypothetical assault state of affairs, a risk actor-released recreation put in by the sufferer can secretly open an online browser session and dupe them into granting digicam permissions to a malicious web site.

That stated, TapTrap’s affect extends past the Android ecosystem, opening the door to tapjacking and net clickjacking assaults. The problem has been addressed in GrapheneOS, Chrome 135 (CVE-2025-3067), and Firefox 136 (CVE-2025-1939). Android 16 continues to stay prone to the assault.

Discovered this text attention-grabbing? Comply with us on Twitter  and LinkedIn to learn extra unique content material we publish.



Tags: APKsCodeDetectionDynamicEvadesKonfetyMalwareManipulatingVariant
Admin

Admin

Next Post
Donkey Kong Nation evaluate: nonetheless robust as hell on Change 2

Donkey Kong Nation evaluate: nonetheless robust as hell on Change 2

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

Google On How To Use Nation & Language Parameters In Google Search

Google On How To Use Nation & Language Parameters In Google Search

May 12, 2025
What We Realized From Learning Our Personal “AI Proof” Key phrases

What We Realized From Learning Our Personal “AI Proof” Key phrases

July 23, 2025

Trending.

How you can open the Antechamber and all lever places in Blue Prince

How you can open the Antechamber and all lever places in Blue Prince

April 14, 2025
ManageEngine Trade Reporter Plus Vulnerability Allows Distant Code Execution

ManageEngine Trade Reporter Plus Vulnerability Allows Distant Code Execution

June 10, 2025
Expedition 33 Guides, Codex, and Construct Planner

Expedition 33 Guides, Codex, and Construct Planner

April 26, 2025
Important SAP Exploit, AI-Powered Phishing, Main Breaches, New CVEs & Extra

Important SAP Exploit, AI-Powered Phishing, Main Breaches, New CVEs & Extra

April 28, 2025
7 Finest EOR Platforms for Software program Firms in 2025

7 Finest EOR Platforms for Software program Firms in 2025

June 18, 2025

AimactGrow

Welcome to AimactGrow, your ultimate source for all things technology! Our mission is to provide insightful, up-to-date content on the latest advancements in technology, coding, gaming, digital marketing, SEO, cybersecurity, and artificial intelligence (AI).

Categories

  • AI
  • Coding
  • Cybersecurity
  • Digital marketing
  • Gaming
  • SEO
  • Technology

Recent News

TacticAI: an AI assistant for soccer techniques

TacticAI: an AI assistant for soccer techniques

August 3, 2025
The Obtain: How fertility tech is altering households, and Trump’s newest tariffs

The Obtain: How fertility tech is altering households, and Trump’s newest tariffs

August 3, 2025
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved