{"id":17528,"date":"2023-11-08T22:09:24","date_gmt":"2023-11-08T22:09:24","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=17528"},"modified":"2023-11-08T22:54:29","modified_gmt":"2023-11-08T22:54:29","slug":"securidropper-android-google-play","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/securidropper-android-google-play\/","title":{"rendered":"SecuriDropper Bypasses Google Play &#038; Android Defenses"},"content":{"rendered":"<p><strong>SecuriDropper is a rare example of the Android dropper malware<\/strong> that operates under the dropper-as-a-service (DaaS) model. This malware is raising significant concerns among experts due to its ability to <strong>bypass Google&#8217;s enhanced security measures<\/strong> and deliver a variety of malicious payloads.<\/p>\n<h2>What is SecuriDropper Malware?<\/h2>\n<p>SecuriDropper represents the <strong>latest evolution in the ever-changing world<\/strong> of cyber threats. It serves as a conduit for cybercriminals to efficiently <a href=\"https:\/\/gridinsoft.com\/malware\">distribute their malware<\/a> in a convenient way. This, actually, is a key point of the dropper-as-a-service model. Such innovation enables threat actors to <strong>separate the development and execution of an attack<\/strong> from the installation of malware. This trick offers a level of sophistication that is both concerning and challenging to combat.<\/p>\n<figure id=\"attachment_17609\" aria-describedby=\"caption-attachment-17609\" style=\"width: 790px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/11\/GS_BLOG_SecuriDropper-Bypasses-Google-Play-Store-Defenses_790x374px.webp\" alt=\"SECURIDROPPER Process\" width=\"790\" height=\"374\" class=\"size-full wp-image-17609\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/11\/GS_BLOG_SecuriDropper-Bypasses-Google-Play-Store-Defenses_790x374px.webp 790w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/11\/GS_BLOG_SecuriDropper-Bypasses-Google-Play-Store-Defenses_790x374px-300x142.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/11\/GS_BLOG_SecuriDropper-Bypasses-Google-Play-Store-Defenses_790x374px-768x364.webp 768w\" sizes=\"auto, (max-width: 790px) 100vw, 790px\" \/><figcaption id=\"caption-attachment-17609\" class=\"wp-caption-text\">Two-Stage Infaction Process of SecuriDropper<\/figcaption><\/figure>\n<p><a href=\"https:\/\/gridinsoft.com\/dropper\">Dropper malware<\/a> plays a crucial role in the cybercriminal ecosystem. It acts as a precursor tool designed to <strong>provide initial access to the target system<\/strong>. Its primary function is to download and install a malicious payload on the victim&#8217;s device, making it a valuable tool for threat actors. This strategic approach <strong>allows malicious actors to advertise their services<\/strong> to other criminal groups, creating a lucrative business model.<\/p>\n<h2>Distribution of Malicious Payloads<\/h2>\n<p>SecuriDropper has been observed <strong>distributing a range of malicious payloads<\/strong>, including <a href=\"https:\/\/gridinsoft.com\/blogs\/cloud-mining-scams-spread-banking-trojans\/\">Android banking trojans<\/a> such as SpyNote and ERMAC. These trojans are often disguised as legitimate applications and are <strong>distributed through deceptive websites<\/strong> and third-party <a href=\"https:\/\/gridinsoft.com\/blogs\/stop-djvu-ransomware-discord-redline\/\">platforms like Discord<\/a>. The resurgence of Zombinder, another Dropper-as-a-Service tool, has further amplified concerns about the distribution of malware payloads through sideloaded apps.<\/p>\n<p>SecuriDropper is a stark reminder that the <strong>fight against cyber threats is an ongoing<\/strong> and evolving battle. As Android continues to <a href=\"https:\/\/support.google.com\/accounts\/answer\/9924802?hl=en&#038;co=GENIE.Platform%3DAndroid\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">implement enhanced security measures<\/a>, cybercriminals adapt and innovate, finding <strong>new ways to infiltrate devices<\/strong> and distribute malware. Dropper-as-a-Service platforms have become powerful tools for malicious actors, posing <strong>significant challenges to Android security<\/strong>.<\/p>\n<h2>Android 13 Feature Blocks SecuriDropper<\/h2>\n<p>Despite quite depressing statements from the above, things are not that bad. Users who got Android 13 updates for their devices are able to counteract SecuriDropper on their own. The new feature called Restricted Settings does what it sounds like to the side-loaded applications.<\/p>\n<figure id=\"attachment_17556\" aria-describedby=\"caption-attachment-17556\" style=\"width: 400px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/11\/SecuriDropper-633x1024.webp\" alt=\"Restricted Settings Notifications\" width=\"633\" height=\"1024\" class=\"size-large wp-image-17556\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/11\/SecuriDropper-633x1024.webp 633w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/11\/SecuriDropper-186x300.webp 186w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/11\/SecuriDropper-768x1242.webp 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/11\/SecuriDropper.webp 772w\" sizes=\"auto, (max-width: 633px) 100vw, 633px\" \/><figcaption id=\"caption-attachment-17556\" class=\"wp-caption-text\">Restricted Settings Warning Notifications<\/figcaption><\/figure>\n<p><strong>As the dropper aims at getting excessive permissions<\/strong>, particularly to Accessibility and Notifications, the feature will block such permissions by default. This, however, is an Android 13-only feature, so <strong>users of earlier OS versions should be careful<\/strong> when granting permissions.<\/p>\n<p>Folks with the most recent updates should not be reckless either. There is a chance of an <a href=\"https:\/\/gridinsoft.com\/blogs\/android-malware-scored-500-million-downloads-google-play\/\">infected app in the Google Play<\/a> Market, which diminishes any anti-side-loaded apps tricks. And since <strong>Google hesitates with implementing security features<\/strong> to its official app sources, it remains a source of a threat.<\/p>\n<h2>How to Protect Yourself from SecuriDropper<\/h2>\n<p><strong>SecuriDropper is a sophisticated Android dropper-as-a-service malware<\/strong> that poses a significant threat to the security of Android devices. To protect yourself from this emerging threat and similar malware, follow these security measures:<\/p>\n<ul>\n<li><strong>Only download applications from official app stores like Google Play Store<\/strong>. These platforms implement stringent security measures to ensure the safety of the apps they host.<\/li>\n<li><strong>Regularly update your Android device&#8217;s operating system<\/strong> and installed applications. Software updates often include security patches that address known vulnerabilities.<\/li>\n<li><strong>Install a reputable mobile security solution on your device<\/strong>. These security apps can help detect and remove threats like SecuriDropper from your device.<\/li>\n<li><strong>Be cautious when considering sideloaded apps obtained from unofficial source<\/strong>s. While sideloading offers access to a wider range of apps, it also presents security risks. Ensure you trust the source and origin of sideloaded apps.<\/li>\n<li><strong>Pay close attention to the permissions requested<\/strong> by apps during installation. Avoid granting unnecessary permissions to apps. For example, if a simple flashlight app requests access to your contacts and camera, it may be suspicious.<\/li>\n<li><strong>Regularly backup your important data<\/strong> to a secure location or cloud storage. This ensures you can recover your data in case of a malware infection.<\/li>\n<\/ul>\n<p>By following these security measures, you can <strong>reduce the risk of falling victim<\/strong> to SecuriDropper and other similar threats. Remember that staying vigilant and proactive in protecting your Android device is essential in today&#8217;s evolving threat landscape.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SecuriDropper is a rare example of the Android dropper malware that operates under the dropper-as-a-service (DaaS) model. This malware is raising significant concerns among experts due to its ability to bypass Google&#8217;s enhanced security measures and deliver a variety of malicious payloads. What is SecuriDropper Malware? SecuriDropper represents the latest evolution in the ever-changing world [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":17596,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15,6],"tags":[114,619,1197,28],"class_list":{"0":"post-17528","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"category-mobile-security","9":"tag-android","10":"tag-cybersecurity","11":"tag-dropper","12":"tag-malware"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/11\/GS_Blog_banner_SecuriDropper-Bypasses-Google-Play-Store-Defenses_1280x674.webp","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/17528","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=17528"}],"version-history":[{"count":14,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/17528\/revisions"}],"predecessor-version":[{"id":17623,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/17528\/revisions\/17623"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/17596"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=17528"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=17528"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=17528"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}