Thousands of Android Malware Apps Using Stealthy APK Compression to Evade Detection

Teilen:

Threat actors are using Android Package (APK) files with unknown or unsupported compression methods to elude malware analysis.

That’s according to findings from Zimperium, which found 3,300 artifacts leveraging such compression algorithms in the wild. 71 of the identified samples can be loaded on the operating system without any problems.

There is no evidence that the apps were available on the Google Play Store at any point in time, indicating that the apps were distributed through other means, typically via untrusted app stores or social engineering to trick the victims into sideloading them.

The APK files use “a technique that limits the possibility of decompiling the application for a large number of tools, reducing the possibilities of being analyzed,” security researcher Fernando Ortega sagte. “In order to do that, the APK (which is in essence a ZIP file), is using an unsupported decompression method.”

The advantage of such an approach is its ability to resist decompilation tools, while still being able to be installed on Android devices whose operating system version is above Android 9 Pie.

The Texas-based cybersecurity firm said it started its own analysis after a Beitrag from Joe Security on X (previously Twitter) in June 2023 about an APK file that exhibited this behavior.

Android packages use the ZIP format in two modes, one without compression and one using the DEFLATE algorithm. The crucial finding here is that APKs packed using unsupported compression methods are not installable on handsets running Android versions below 9, but they work properly on subsequent versions.

In addition, Zimperium discovered that malware authors are also deliberately corrupting the APK files by having filenames with more than 256 bytes and malformed AndroidManifest.xml files to trigger crashes on analysis tools.

The disclosure comes weeks after Google revealed that threat actors are leveraging a technique called versioning to evade its Play Store’s malware detections and target Android users.

 

(c) Thn

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
5:45 pm, März 13, 2025
Wetter-Symbol 5°C
L: 5° | H: 6°
overcast clouds
Luftfeuchtigkeit: 79 %
Druck: 1004 mb
Wind: 2 mph E
Windböe: 5 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 99%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 6:19 am
Sonnenuntergang: 6:01 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 9:00 pm
Wetter-Symbol
5° | 6°°C 0.97 mm 97% 6 mph 83 % 1005 mb 0 mm/h
Tomorrow 9:00 pm
Wetter-Symbol
1° | 6°°C 0 mm 0% 6 mph 94 % 1016 mb 0 mm/h
Sa. März 15 9:00 pm
Wetter-Symbol
2° | 8°°C 0 mm 0% 12 mph 90 % 1026 mb 0 mm/h
So. März 16 9:00 pm
Wetter-Symbol
1° | 10°°C 0 mm 0% 10 mph 75 % 1029 mb 0 mm/h
Mo. März 17 9:00 pm
Wetter-Symbol
5° | 11°°C 0 mm 0% 9 mph 88 % 1029 mb 0 mm/h
Today 6:00 pm
Wetter-Symbol
5° | 5°°C 0.97 mm 97% 6 mph 79 % 1004 mb 0 mm/h
Today 9:00 pm
Wetter-Symbol
4° | 5°°C 0.25 mm 25% 3 mph 83 % 1005 mb 0 mm/h
Tomorrow 12:00 am
Wetter-Symbol
2° | 3°°C 0 mm 0% 3 mph 87 % 1006 mb 0 mm/h
Tomorrow 3:00 am
Wetter-Symbol
2° | 2°°C 0 mm 0% 3 mph 89 % 1007 mb 0 mm/h
Tomorrow 6:00 am
Wetter-Symbol
1° | 1°°C 0 mm 0% 3 mph 94 % 1008 mb 0 mm/h
Tomorrow 9:00 am
Wetter-Symbol
3° | 3°°C 0 mm 0% 6 mph 86 % 1010 mb 0 mm/h
Tomorrow 12:00 pm
Wetter-Symbol
4° | 4°°C 0 mm 0% 5 mph 74 % 1011 mb 0 mm/h
Tomorrow 3:00 pm
Wetter-Symbol
6° | 6°°C 0 mm 0% 6 mph 62 % 1012 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€73,690.74
-2.82%
Ethereum(ETH)
€1,688.98
-2.28%
Fesseln(USDT)
€0.92
-0.01%
XRP(XRP)
€2.06
0.84%
Solana(SOL)
€111.86
-3.00%
USDC(USDC)
€0.92
0.00%
Dogecoin(DOGE)
€0.150736
-1.83%
Shiba Inu(SHIB)
€0.000011
-2.75%
Pepe(PEPE)
€0.000006
-0.75%
Nach oben scrollen