Android manifest

AppWizard
June 19, 2025
Cybersecurity researchers at Zimperium zLabs have discovered a new variant of the GodFather Android malware that uses on-device virtualization to hijack legitimate mobile applications, primarily targeting banking and cryptocurrency apps. This malware installs a concealed host application that downloads a genuine version of the targeted app within a controlled environment, redirecting users to this manipulated version. It monitors user actions in real time, capturing sensitive information like usernames and passwords. The GodFather malware targets 484 applications globally, with a focus on 12 financial institutions in Turkey. It employs traditional overlay attacks and uses legitimate open-source tools to evade detection. The malware manipulates APK files, relocates malicious code, and utilizes Android’s accessibility services to deceive users into granting permissions. It also encodes critical information to complicate tracking efforts and transmits screen details back to attackers for real-time monitoring.
AppWizard
April 17, 2024
- SoumniBot is a new banker malware targeting Korean users - The malware obfuscates the Android manifest to avoid detection - Techniques used include exploiting the libziparchive library, declaring an incorrect size for the manifest entry, and using long namespace names - SoumniBot focuses on data exfiltration and command execution - It hides its app icon, uploads personal data to a server, and listens for commands from an MQTT server - The malware searches for digital certificates used for online banking - Security solutions like those from Kaspersky can detect and prevent the installation of SoumniBot
Search