www.itfunk.orgwww.itfunk.orgwww.itfunk.org
  • Home
  • Tech News
    Tech NewsShow More
    Zero Trust: How a Security Idea Became a Blueprint
    41 Min Read
    Cybersecurity Law Expiration Could Unleash New Ransomware Surge – Former FBI Official Sounds the Alarm
    8 Min Read
    Under the Hood of Microsoft’s May 2025 Patch Tuesday: The CLFS and WinSock Problem Microsoft Can’t Seem to Fix
    7 Min Read
    The Hidden Sabotage: How Malicious Go Modules Quietly Crashed Linux Systems
    6 Min Read
    Agentic AI: The Next Frontier in Cybersecurity Defense and Risk​
    5 Min Read
  • Cyber Threats
    • Malware
    • Ransomware
    • Trojans
    • Adware
    • Browser Hijackers
    • Mac Malware
    • Android Threats
    • iPhone Threats
    • Potentially Unwanted Programs (PUPs)
    • Online Scams
    • Microsoft CVE Vulnerabilities
  • How To Guides
    How To GuidesShow More
    Tasksche.exe Malware
    Nviqri Someq Utils Unwanted Application
    4 Min Read
    How to Deal With Rbx.fund Scam
    4 Min Read
    How to Jailbreak DeepSeek: Unlocking AI Without Restrictions
    4 Min Read
    Why Streaming Services Geo-Restrict Content?
    10 Min Read
  • Product Reviews
    • Hardware
    • Software
  • IT/Cybersecurity Best Practices
    IT/Cybersecurity Best PracticesShow More
    Zero Trust: How a Security Idea Became a Blueprint
    41 Min Read
    Under the Hood of Microsoft’s May 2025 Patch Tuesday: The CLFS and WinSock Problem Microsoft Can’t Seem to Fix
    7 Min Read
    Affordable Endpoint Protection Platforms (EPP) for Small Businesses
    5 Min Read
    Outlaw Malware: A Persistent Threat Exploiting Linux Servers
    4 Min Read
    CVE-2024-48248: Critical NAKIVO Backup & Replication Flaw Actively Exploited—Patch Immediately
    6 Min Read
  • FREE SCAN
  • Cybersecurity for Business
Search
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
© 2023 ITFunk.org. All Rights Reserved.
Reading: SecuriDropper: Android’s New Threat Landscape
Share
Notification Show More
Font ResizerAa
www.itfunk.orgwww.itfunk.org
Font ResizerAa
  • Tech News
  • How To Guides
  • Cyber Threats
  • Product Reviews
  • Cybersecurity for Business
  • Free Scan
Search
  • Home
  • Tech News
  • Cyber Threats
    • Malware
    • Ransomware
    • Trojans
    • Adware
    • Browser Hijackers
    • Mac Malware
    • Android Threats
    • iPhone Threats
    • Potentially Unwanted Programs (PUPs)
    • Online Scams
  • How To Guides
  • Product Reviews
    • Hardware
    • Software
  • IT/Cybersecurity Best Practices
  • Cybersecurity for Business
  • FREE SCAN
Follow US
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
© 2023 ITFunk.org All Rights Reserved.
www.itfunk.org > Blog > Cyber Threats > Android Threats > SecuriDropper: Android’s New Threat Landscape
Android Threats

SecuriDropper: Android’s New Threat Landscape

ITFunk Research
Last updated: November 8, 2023 7:23 pm
ITFunk Research
Share
The Rise of SecuriDropper: Android's New Threat Landscape
SHARE

In the ever-evolving realm of cybersecurity, a novel and menacing player has emerged – SecuriDropper, a ‘Dropper-as-a-Service’ (DaaS) tailored for Android devices. Designed to bypass the latest security restrictions enforced by Google, SecuriDropper operates with a singular purpose: deploying malware onto unsuspecting Android devices. This pioneering service, while serving as a means to facilitate the installation of malicious software, has created a lucrative business model for cybercriminals, allowing them to market their capabilities to other nefarious organizations.

Contents
Unmasking the Dropper MenaceThe Anatomy of SecuriDropperThe Dangerous Ripple EffectRemoval Steps for SecuriDropper Malware on Android DevicesStep 1: Boot into Safe ModeStep 2: Uninstall Suspicious AppsStep 3: Find and Remove SecuriDropperStep 4: Revoke Device Administrator AccessStep 5: Clear Cache and DataStep 6: Reboot Your DeviceStep 7: Check for Lingering MalwareStep 8: Secure Your DeviceStep 9: Change PasswordsStep 10: Stay InformedConclusion

Unmasking the Dropper Menace

Dropper malware on Android devices acts as a gateway to introduce threatening software onto compromised devices, offering cybercriminals a profitable avenue for their malicious endeavors. It enables adversaries to segregate the development and execution of an attack from the actual installation of malware, fostering a dynamic landscape that adapts to counter-evolving security measures.

One of the significant challenges posed by Android’s evolving security is the introduction of “Restricted Settings” in Android 13. This feature is aimed at thwarting the acquisition of Accessibility and Notification Listener permissions, commonly exploited by banking Trojans. SecuriDropper, however, has skillfully maneuvered around this safeguard without raising suspicion. It often disguises itself as seemingly harmless applications, concealing its true intentions.

The Anatomy of SecuriDropper

What sets SecuriDropper apart is its unique approach to the installation process. Unlike its predecessors, this malware family employs an alternative Android API for installing the new payload, mimicking the processes used by legitimate application marketplaces. To achieve this, it seeks permissions to read and write data to external storage and to install and delete packages, all under the guise of legitimacy. The second stage of the attack involves prompting victims to click a “Reinstall” button within the app, seemingly addressing an installation error. In reality, this action facilitates the installation of the malicious payload.

The Dangerous Ripple Effect

Researchers have observed the distribution of Android banking Trojans, including SpyNote and ERMAC, through SecuriDropper on deceptive websites and third-party platforms like Discord. The emergence of this service amplifies the evolving threats posed by cybercriminals, underscoring the need for robust security measures and constant vigilance.

Moreover, another dropper service known as Zombinder has recently come to light, offering a similar bypass for the Restricted Settings feature. This raises questions about potential connections between these two tools. As Android continually raises the bar on security standards with each release, cybercriminals are quick to adapt, finding innovative solutions. Dropper-as-a-Service (DaaS) platforms have now emerged as potent instruments, providing cybercriminals with the means to breach devices and distribute spyware and banking Trojans.

Removal Steps for SecuriDropper Malware on Android Devices

Discovering SecuriDropper on your Android device can be concerning, but taking immediate action is crucial to mitigate the threat and protect your personal information. Follow these steps to remove SecuriDropper from your Android device:

Step 1: Boot into Safe Mode

  • Restart your Android device in Safe Mode to prevent SecuriDropper from running in the background.
  • The method to enter Safe Mode may vary depending on your device’s make and model. Typically, you can access it by holding down the power button and then tapping and holding “Power Off” on the screen. Confirm when prompted to boot into Safe Mode.

Step 2: Uninstall Suspicious Apps

  • Go to your device’s Settings.
  • Scroll down and select “Apps” or “Applications.”

Step 3: Find and Remove SecuriDropper

  • Look for any suspicious or unfamiliar apps in the list.
  • Tap on the suspicious app and select “Uninstall.”

Step 4: Revoke Device Administrator Access

  • In the Settings menu, go to “Security” or “Biometrics and Security,” depending on your device.
  • Select “Device Administrators” and check for any suspicious apps with administrator privileges.
  • Disable admin rights for these apps by unchecking the boxes next to them.

Step 5: Clear Cache and Data

  • While still in the app settings, tap on “Storage.”
  • Choose “Clear Cache” and “Clear Data” for the suspicious app.

Step 6: Reboot Your Device

  • Exit Safe Mode and restart your device normally.

Step 7: Check for Lingering Malware

  • It’s a good practice to run a reputable mobile security app or antivirus scan to ensure no remnants of SecuriDropper or other malware persist on your device.

Step 8: Secure Your Device

  • As an added precaution, review the security settings on your Android device. Ensure that “Install from Unknown Sources” is turned off to prevent future unauthorized installations.

Step 9: Change Passwords

  • Change passwords for any online accounts that may have been compromised while SecuriDropper was on your device.

Step 10: Stay Informed

  • Stay updated on the latest threats and security practices for your Android device. Regularly update your device’s operating system and security software to stay protected against evolving threats.

By following these removal steps and staying vigilant about your device’s security, you can effectively eliminate SecuriDropper from your Android device and reduce the risk of future infections.

Conclusion

The evolution of SecuriDropper and its counterparts underscores the dynamic nature of the cybersecurity landscape. To safeguard against these evolving threats, users must remain vigilant, employ robust security solutions, and stay informed about the latest developments in the world of cybercrime. In this ongoing battle, proactive security measures are our best defense against the relentless innovation of cybercriminals.

You Might Also Like

RatOn Android Malware
RedHook Banking Trojan
HOOK Android Malware
Antivirus By FSB Ransomware
SparkKitty Malware
TAGGED:Android ThreatsMalware

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Copy Link Print
Share
Previous Article Lookmovie.io: Unveiling the Dangers of Illegal Streaming and Deceptive Pop-Ups
Next Article Socks5Systemz Botnet: Thousands of Devices Infected
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Scan Your System for Malware

Don’t leave your system unprotected. Download SpyHunter today for free, and scan your device for malware, scams, or any other potential threats. Stay Protected!

Download SpyHunter 5
Download SpyHunter for Mac
✅ Free Scan Available • ⭐ Catches malware instantly
//

Check in Daily for the best technology and Cybersecurity based content on the internet.

Quick Link

  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US

Support

Sign Up for Our Newesletter

Subscribe to our newsletter to get our newest articles instantly!

 

www.itfunk.orgwww.itfunk.org
© 2023 www.itfunk.org. All Rights Reserved.
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?