FireScam Malware Breakdown: Unmasking Its Infostealer and Spyware Functions

 


New Android Malware 'FireScam' Poses Serious Threat to User Privacy

A recently discovered Android malware, named FireScam, is raising alarms across the cybersecurity community due to its extensive spying and information-stealing capabilities. According to reports from threat intelligence company Cyfirma, FireScam can collect sensitive data from a wide array of applications, posing significant risks to Android users.


Distribution Method

FireScam is being distributed under the guise of a ‘Telegram Premium’ application through a phishing website that closely resembles RuStore, a legitimate application store. The malicious site, hosted on the github[.]io domain, delivers a dropper named ‘ru.store.installer’ that installs the malware on devices running Android 8 and newer.

Malicious Functionality

Once installed, FireScam requests an alarming number of permissions, including the ability to:

  • Query and list all installed applications

  • Access and modify external storage

  • Delete and install applications

  • Update applications without user consent

To ensure persistence, the malware designates itself as the device's application owner, blocking updates from other installers. This prevents its removal or replacement by legitimate means.

How FireScam Operates

Upon execution, the malware disguises itself as Telegram Premium and seeks further permissions to operate in the background without restrictions. FireScam also performs checks to detect sandboxed or virtualized environments by monitoring process names and fingerprinting the device.

A key aspect of FireScam’s functionality is its ability to register a service that listens for Firebase Cloud Messaging (FCM) notifications. This service enables the malware to receive commands from a remote command-and-control (C&C) server, creating a backdoor for ongoing communication.

Data Harvesting and Exfiltration

FireScam's surveillance capabilities extend across various device activities, allowing it to:

  • Collect sensitive device information and messages

  • Silently intercept and log USSD responses

  • Track and manipulate USSD interactions

  • Monitor clipboard activities and content sharing

  • Observe user engagement, ecommerce transactions, and screen state changes

  • Track notifications from numerous apps

The harvested data is transmitted to a Firebase Realtime Database URL. Additionally, FireScam can download and process images from specified URLs, potentially allowing it to deploy additional malicious payloads.

Mitigation Measures

To protect against FireScam and similar threats, users should:

  • Download applications exclusively from trusted sources like Google Play Store.

  • Avoid clicking on suspicious links or downloading apps from unfamiliar websites.

  • Regularly update their devices and review app permissions.

  • Use reliable antivirus software to detect and remove malicious applications.

By staying vigilant and cautious, users can minimize the risk of falling victim to advanced Android malware like FireScam.

No comments:

FireScam Malware Breakdown: Unmasking Its Infostealer and Spyware Functions

  New Android Malware 'FireScam' Poses Serious Threat to User Privacy A recently discovered Android malware, named FireScam, is rais...