{"id":1747,"date":"2020-05-19T18:47:15","date_gmt":"2020-05-19T18:47:15","guid":{"rendered":"https:\/\/officesuppliesphoenix.com\/?p=1747"},"modified":"2020-08-14T06:36:04","modified_gmt":"2020-08-14T06:36:04","slug":"powerful-android-malware-stayed-hidden-years-infecting-tens-thousands-smartphones","status":"publish","type":"post","link":"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/powerful-android-malware-stayed-hidden-years-infecting-tens-thousands-smartphones\/","title":{"rendered":"This powerful Android malware stayed hidden for years, infecting tens of thousands of smartphones"},"content":{"rendered":"<p>Mandrake spyware hoovers up information raging from account credentials, screen records, GPS and more &#8212; and has been for years. All while those behind it carefully cover their tracks.<\/p>\n<p>A carefully managed hacking and espionage campaign is infecting smartphones with a potent form of Android malware, providing those behind it with total control of the device, while also remaining completely hidden from the user.<\/p>\n<p>Mandrake spyware abuses legitimate Android functions to help gain access to everything on the compromised device in attacks that can gather almost any information about the user.<\/p>\n<div data-shortcode=\"\"><\/div>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"><span class=\"int\">More on privacy<\/span><\/h3>\n<ul>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/microsoft-to-apply-californias-privacy-law-for-all-us-users\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\">Microsoft to apply California&#8217;s privacy law for all US users<\/a><\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/mind-reading-technology-the-security-privacy-and-inequality-threats-we-will-face\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\">Mind-reading technology: The security and privacy threats ahead<\/a><\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/goodbye-google-why-and-how-to-take-back-your-privacy\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\">How to replace each Google service with a more privacy-friendly alternative<\/a><\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/online-security-101-how-to-protect-your-privacy-from-hackers-spies-and-the-government\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\">Cyber security 101: Protect your privacy from hackers, spies, and the government<\/a><\/li>\n<\/ul>\n<\/div>\n<p>The attacker can browse and collect all data on the device, steal account credentials for accounts including banking applications. secretly take recordings of activity on the screen, track the GPS location of the user and more, all while continuously covering their tracks.<\/p>\n<p><strong>SEE:\u00a0<a href=\"https:\/\/www.zdnet.com\/topic\/cybersecurity-lets-get-tactical\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cybersecurity: Let&#8217;s get tactical<\/a>\u00a0(ZDNet\/TechRepublic special feature) |\u00a0<a href=\"https:\/\/www.techrepublic.com\/resource-library\/whitepapers\/cybersecurity-let-s-get-tactical-free-pdf\/?ftag=CMG-01-10aaa1b\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">Download the free PDF version<\/a>\u00a0(TechRepublic)<\/strong><\/p>\n<p>The full capabilities of Mandrake \u2013 which has been observed targeting users across Europe and the Americas \u2013 are\u00a0<a href=\"https:\/\/labs.bitdefender.com\/2020\/05\/mandrake-owning-android-devices-since-2016\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">detailed in a paper by cybersecurity researchers at Bitdefender<\/a>. Mandrake has been active since 2016 and researchers previously detailed how the spyware operation was specifically targeting Australian users \u2013 but now it&#8217;s targeting victims around the world.<\/p>\n<p>&#8220;The ultimate goal of Mandrake is complete control of the device, as well as account compromise. This is one of the most potent pieces of Android malware we have seen until now,&#8221; Bogdan<\/p>\n<p>Botezatu, director of threat research and reporting at Bitdefender, told ZDNet.<\/p>\n<p>It isn&#8217;t clear exactly how widespread the campaigns are, but the malware isn&#8217;t spammed out like other campaigns \u2013 the attackers appear to carefully pick their victims and once they have a valued target compromised, they&#8217;ll manually control the actions of Mandrake in order to manipulate the most information out of the user as possible.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<div id=\"sharethrough-top\" class=\"ad-sharethrough-top ad-slot rendered\" data-ad=\"sharethrough-top\" data-ad-container=\"5ec416702195c\" data-instance=\"1\" data-google-query-id=\"CNCQ5ufAwOkCFWUOfQodDa8DyQ\">\n<div id=\"google_ads_iframe_\/8264\/aw-zdnet\/security_3__container__\">\n<section id=\"content-recommendation\" class=\"leadgenads\">\n<div>\n<div class=\"medusaTitle\">\n<p><a href=\"https:\/\/adclick.g.doubleclick.net\/pcs\/click%253Fxai%253DAKAOjsvBG_-8QjBWHpSYJu8Px1aAiezUy0m4GC-QBhUAGLJx43OWNfnL5sJ_QjVu6gxJQjOYFXGHwVw_LjJOF0xWOI9b9O6h9ZR6zBcAJLhAYBNRMocA1vLb3XMYYnJuO8Dl7th2bxbaKwApywA7JG5aBSijEHiabTI3Ew5Q5RFBGb4mFh-22JAQ_zDmEpI42Z4D-YCBFNe36jLr8-GDhUZHyJ0aCMh3q6F4BDHHFZtHJaSou5aOZC-idRAgkfxbfyGN3emRqA%2526sai%253DAMfl-YSJWaNGLZ5_KOHjy_inGWGi75wvvCio3DaYJD1PMm316eo-UytMcagFgsd0xV4c0jRW04y62G-YnFkYX4_3RtwbQLKY2mf1mL8PMCVH-g%2526sig%253DCg0ArKJSzBHdA7rQs_FaEAE%2526urlfix%253D1%2526adurl%253Dhttps:\/\/cbslnk.cbsileads.com\/redir?edition=en&amp;ursuid=&amp;devicetype=desktop&amp;pagetype=&amp;assettitle=&amp;assettype=&amp;topicguid=&amp;viewguid=6db3b324-a43a-44c2-ba6c-3f8629b672e7&amp;docid=33160567&amp;promo=1065&amp;ftag_cd=TRE-00-10aaa4f&amp;spotname=dfp-in-article&amp;destUrl=https%253A%252F%252Fwww.techrepublic.com%252Fresource-library%252Fwhitepapers%252Fit-security-concerns-budgets-trends-and-plans-techrepublic-premium%252F%253Fpromo%253D1065%2526ftag%253DTRE-00-10aaa4f%2526cval%253Ddfp-in-article%2526source%253Dzdnet&amp;ctag=medc-dfp-in-article&amp;siteId=&amp;rsid=cnetzdnetglobalsite&amp;sl=&amp;sc=us&amp;assetguid=&amp;q=&amp;cval=33160567;1065&amp;ttag=&amp;bhid=\" target=\"_blank\" rel=\"noopener noreferrer\"><img src=\"https:\/\/creatives.cbsileads.com\/images\/doctype\/whitePapers_125x100.jpg\" \/><\/a><\/p>\n<div class=\"ellipsis-title\">\n<div>\n<p><a href=\"https:\/\/adclick.g.doubleclick.net\/pcs\/click%253Fxai%253DAKAOjsvBG_-8QjBWHpSYJu8Px1aAiezUy0m4GC-QBhUAGLJx43OWNfnL5sJ_QjVu6gxJQjOYFXGHwVw_LjJOF0xWOI9b9O6h9ZR6zBcAJLhAYBNRMocA1vLb3XMYYnJuO8Dl7th2bxbaKwApywA7JG5aBSijEHiabTI3Ew5Q5RFBGb4mFh-22JAQ_zDmEpI42Z4D-YCBFNe36jLr8-GDhUZHyJ0aCMh3q6F4BDHHFZtHJaSou5aOZC-idRAgkfxbfyGN3emRqA%2526sai%253DAMfl-YSJWaNGLZ5_KOHjy_inGWGi75wvvCio3DaYJD1PMm316eo-UytMcagFgsd0xV4c0jRW04y62G-YnFkYX4_3RtwbQLKY2mf1mL8PMCVH-g%2526sig%253DCg0ArKJSzBHdA7rQs_FaEAE%2526urlfix%253D1%2526adurl%253Dhttps:\/\/cbslnk.cbsileads.com\/redir?edition=en&amp;ursuid=&amp;devicetype=desktop&amp;pagetype=&amp;assettitle=&amp;assettype=&amp;topicguid=&amp;viewguid=6db3b324-a43a-44c2-ba6c-3f8629b672e7&amp;docid=33160567&amp;promo=1065&amp;ftag_cd=TRE-00-10aaa4f&amp;spotname=dfp-in-article&amp;destUrl=https%253A%252F%252Fwww.techrepublic.com%252Fresource-library%252Fwhitepapers%252Fit-security-concerns-budgets-trends-and-plans-techrepublic-premium%252F%253Fpromo%253D1065%2526ftag%253DTRE-00-10aaa4f%2526cval%253Ddfp-in-article%2526source%253Dzdnet&amp;ctag=medc-dfp-in-article&amp;siteId=&amp;rsid=cnetzdnetglobalsite&amp;sl=&amp;sc=us&amp;assetguid=&amp;q=&amp;cval=33160567;1065&amp;ttag=&amp;bhid=\" target=\"_blank\" rel=\"noopener noreferrer\">IT Security: Concerns, budgets, trends and plans (TechRepublic Premium)<\/a><\/p>\n<\/div>\n<\/div>\n<div class=\"ellipsis-desc\">\n<div>\n<p>This archived TechRepublic Premium report, originally published in November 2013, is available for free to registered TechRepublic members. For all the latest research reports, 100+ ready-made policies, IT job descriptions, and more, check out TechRepubli&#8230;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"providedBy\" align=\"left\"><a class=\"provided\" href=\"https:\/\/www.techrepublic.com\/resource-library\/content-type\/research\/\" target=\"_blank\" rel=\"noopener noreferrer\">Research<\/a> provided by <a class=\"provided\" href=\"https:\/\/www.techrepublic.com\/resource-library\/company\/techrepublic-premium\/\" target=\"_blank\" rel=\"noopener noreferrer\"> TechRepublic Premium<\/a><\/div>\n<\/div>\n<\/section>\n<\/div>\n<\/div>\n<\/section>\n<p>&#8220;We estimate the number of victims in the tens of thousands for the current wave, and probably hundreds of thousands throughout the full four-year period,&#8221; the company said.<\/p>\n<p>And when the attackers have gained all the information they want from the victim, Mandrake has a kill-switch that wipes the malware from the device.<\/p>\n<p>Mandrake&#8217;s operators have put serious effort into making sure it has stayed hidden over the years, even going so far as to develop, upload and maintain several applications on the Google Play Store \u2013 under the names of several different developers. Some of these were designed to target specific countries. The apps have now been removed.<\/p>\n<p>In order to keep users happy the apps were mostly ad free and fixes were regularly delivered. Some of the apps even had social media pages \u2013 all designed to convince users to download and trust them.<\/p>\n<p>The malware avoids detection by Google Play by using a multi-stage process to hide the payload. The app is installed on the phone and it then contacts the server to download a loader, which then provides the additional capabilities Mandrake needs to take control of the device.<\/p>\n<p>&#8220;The malware operates in stages, with the first stage being a benign app with no malicious behaviour, other than the ability to download and install a second-stage payload when expressly directed to do so. It is safe to say that its operator won&#8217;t trigger this malicious behaviour while running in Google&#8217;s analysis environment,&#8221; Botezatu explained.<\/p>\n<p>The malware tricks the user into providing it with additional privileges on the device.<\/p>\n<p>&#8220;What seems to be a simple process such as going through an End-User License Agreement and accepting it is actually translated behind the scenes into requesting and granting extremely powerful permissions. With those permissions, the malware gets complete control of the device and data on it,&#8221; said Botezatu.<\/p>\n<p><strong>SEE: <\/strong><a href=\"https:\/\/www.zdnet.com\/article\/this-new-android-mobile-malware-is-striking-banks-financial-services-across-europe\/\"><strong>This new Android mobile malware targets banks, financial services across Europe<\/strong><\/a><\/p>\n<p>While it&#8217;s still uncertain who is exactly targeted by Mandrake and why, the attackers are aware that if they push the boat out too far, their campaign will be more likely to be discovered.<\/p>\n<p>We don&#8217;t know who runs the cyber-criminal operation behind Mandrake, but the malware will specifically avoid running on devices in former Soviet Union countries, Africa and the Middle East. Researchers note that some of the first countries made exempt from Mandrake attacks were Ukraine, Belarus, Kyrgyzstan and Uzbekistan.<\/p>\n<p>ZDNet has contacted Google for comment but hasn&#8217;t received a response at the time of writing.<\/p>\n<p>The Mandrake campaign is likely to still be operating and it&#8217;s probably only a matter of time before those behind it attempt to distribute new applications to drop the malware.<\/p>\n<p>To help avoid falling victim to such a campaign, users should be sure they trust and know the company that has developed the application \u2013 sometimes it might be better to avoid downloading apps from new sources, even if they&#8217;re in the official download store.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mandrake spyware hoovers up information raging from account credentials, screen records, GPS and more &#8212; and has been for years. All while those behind it carefully cover their tracks. A carefully managed hacking and espionage campaign is infecting smartphones with a potent form of Android malware, providing those behind it with total control of the device, while also remaining completely hidden from the user. Mandrake spyware abuses legitimate Android functions to help gain access to everything on the compromised device [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2529,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[43,37],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v14.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>This powerful Android malware stayed hidden for years, infecting tens of thousands of smartphones - Office Supplies El Mirage, AZ<\/title>\n<meta name=\"robots\" content=\"index, follow\" \/>\n<meta name=\"googlebot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta name=\"bingbot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/powerful-android-malware-stayed-hidden-years-infecting-tens-thousands-smartphones\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"This powerful Android malware stayed hidden for years, infecting tens of thousands of smartphones - Office Supplies El Mirage, AZ\" \/>\n<meta property=\"og:description\" content=\"Mandrake spyware hoovers up information raging from account credentials, screen records, GPS and more &#8212; and has been for years. All while those behind it carefully cover their tracks. A carefully managed hacking and espionage campaign is infecting smartphones with a potent form of Android malware, providing those behind it with total control of the device, while also remaining completely hidden from the user. Mandrake spyware abuses legitimate Android functions to help gain access to everything on the compromised device [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/powerful-android-malware-stayed-hidden-years-infecting-tens-thousands-smartphones\/\" \/>\n<meta property=\"og:site_name\" content=\"Office Supplies El Mirage, AZ\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-19T18:47:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-14T06:36:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-content\/uploads\/2020\/05\/person-woman-hand-smartphone.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"530\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/#website\",\"url\":\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/\",\"name\":\"Office Supplies El Mirage, AZ\",\"description\":\"Swift Office Solutions\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/powerful-android-malware-stayed-hidden-years-infecting-tens-thousands-smartphones\/#primaryimage\",\"inLanguage\":\"en\",\"url\":\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-content\/uploads\/2020\/05\/person-woman-hand-smartphone.jpg\",\"width\":800,\"height\":530},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/powerful-android-malware-stayed-hidden-years-infecting-tens-thousands-smartphones\/#webpage\",\"url\":\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/powerful-android-malware-stayed-hidden-years-infecting-tens-thousands-smartphones\/\",\"name\":\"This powerful Android malware stayed hidden for years, infecting tens of thousands of smartphones - Office Supplies El Mirage, AZ\",\"isPartOf\":{\"@id\":\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/powerful-android-malware-stayed-hidden-years-infecting-tens-thousands-smartphones\/#primaryimage\"},\"datePublished\":\"2020-05-19T18:47:15+00:00\",\"dateModified\":\"2020-08-14T06:36:04+00:00\",\"author\":{\"@id\":\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/#\/schema\/person\/2b8c21fb4c500b5ab95fadf0dfe571a6\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/powerful-android-malware-stayed-hidden-years-infecting-tens-thousands-smartphones\/\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/#\/schema\/person\/2b8c21fb4c500b5ab95fadf0dfe571a6\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/#personlogo\",\"inLanguage\":\"en\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cdea6f44468c828871ef784c3a8ce0f6?s=96&d=mm&r=g\",\"caption\":\"admin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-json\/wp\/v2\/posts\/1747"}],"collection":[{"href":"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-json\/wp\/v2\/comments?post=1747"}],"version-history":[{"count":1,"href":"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-json\/wp\/v2\/posts\/1747\/revisions"}],"predecessor-version":[{"id":2530,"href":"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-json\/wp\/v2\/posts\/1747\/revisions\/2530"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-json\/wp\/v2\/media\/2529"}],"wp:attachment":[{"href":"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-json\/wp\/v2\/media?parent=1747"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-json\/wp\/v2\/categories?post=1747"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-json\/wp\/v2\/tags?post=1747"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}