The new malware even bypasses the latest Android 13 security system

Apparently, a group of hackers who call themselves Hadoken have decided to design a malware that by default has the ability to bypass the security system of Android 13.

BingMag.com The new malware even bypasses the latest Android 13 security system

Apparently, a group of hackers who call themselves Hadoken have decided to design a malware that by default has the ability to bypass the security system of Android 13.

The battle between software companies and hackers is not over. This is a reality that we, as technology users, live in. Companies produce several applications every year, and hackers find a way to penetrate users' phones through it. Similar to what happened recently; With the difference that this time the hackers themselves have created an application that natively uses the ability to bypass the latest Android 13 security system. In this way, these apps will no longer have access to the accessibility section. This change was necessary because the API related to Google's accessibility would be easily available to hackers and they could get important information such as bank account numbers, etc.

According to the researchers of the company ThreatFabric, apparently a group of hackers calling themselves Hadoken, has designed an app that the aforementioned researchers have named BugDrop. This application, which is actually considered a malware, can easily bypass Android 13's strict system for sideloading apps and give them what hackers want. Apparently, this malware targets the app install API. The same API that allows apps like the Amazon store to be able to download and install apps on your phone.

BingMag.com The new malware even bypasses the latest Android 13 security system

According to ThreatFabric, this new malware is actually a special QR code reader app that, upon execution, quickly downloads and installs a payload. uses malicious codes and causes harm to the victim). Normally, this access should not be given to a third-party application, but because hackers have designed it in such a way that it can bypass this security feature of Android 13, it can easily download the desired payload and install it on your phone. In this way, the malware executes the payload without disturbing or resisting from the phone and using it, gets full access to the phone's access API.

Of course, as it seems, hackers are still developing BugDrop. and the process of making it is not finished yet. According to ThreatFabric, the app doesn't appear to issue the REQUEST_INSTALL_PACKAGES request yet. This is the request that must be agreed to in order for an app to install another app on your phone. So the development team, which is a group of hackers, is still working on it. It remains to be seen whether Google, now aware of the threat it is facing, will find a solution to this problem or not.

  • Chinese hackers use VLC media player for malicious cyber attacks

Leave a Reply

Your email address will not be published.