Home > Cyber News > Matrix Alert: Agent Smith Malware Silently Infects 25M Android Devices
CYBER NEWS

Matrix Alert: Agent Smith Malware Silently Infects 25M Android Devices

Security researchers just came across a new type of mobile malware “that has quietly infected around 25 million devices” without users being aware of the infection.

The malware is targeting Android users and is called Agent Smith after the Matrix popular character, probably because of its silent and sneaky behavior. The infection stems from an unofficial Android app store. According to Check Point researcher, the Agent Smith malware is disguised as a Google related application, and its core part exploits a range of known Android security flaws.




The malware is even capable of automatically replacing installed apps with their malicious versions, without the user’s knowledge or interaction. The purpose of the Agent Smith malware is not surprising – it aims to push advertisements and hijack valid ad events.

The primary victims of the malicious campaign are Android users based in India, but other Asian countries such as Pakistan and Bangladesh are also impacted. Affected devices are also discovered in the UK, Australia and the US, the researchers said.

How does the Agent Smith malware infection happen?

There are three stages of the infection process. The first stage aims to trick the user to download a dropper application from an app store such as 9Apps. To successfully lure the user, these droppers are presented as useful or free applications. Free games or adult entertainment apps are also used.

The dropper application then checks if any popular applications, such apps include WhatsApp, MXplayer, ShareIt and more from the attacker’s pre-determined list, are installed on the device. If any targeted application is found, “Agent Smith” will then attack those innocent applications at a later stage, the report said.

The second infection phase involves the dropper automatically decrypting the malicious payload into its original form, which is an APK file. This file is the malware’s core part of the attack. This is also the time when the malware leverages the known Android vulnerabilities without the user’s interaction.

Related: [wplinkpreview url=”https://sensorstechforum.com/xloader-android-ios/”] Next-gen XLoader Android and iOS Spyware Is Being Spread Worldwide

During the third stage, the core part of Agent Smith malware will attack each installed application on the compromised Android device, according to its target list. “The core malware quietly extracts a given innocent application’s APK file, patches it with extra malicious modules and finally abuses a further set of system vulnerabilities to silently swap the innocent version with a malicious one”, the researchers said.

To remove bogus apps such as the ones involved in the Agent Smith malware campaign, you can follow these simple steps:

1. Go to Settings Menu
2. Click on Apps or Application Manager
3. Scroll to the suspected app and uninstall it.

If the app can’t be located, then simply remove all recently installed apps, as per the researchers’ advice.

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

More Posts

Follow Me:
Twitter

Leave a Comment

Your email address will not be published. Required fields are marked *

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree