This new malware on Android can bypass security to steal data

Snowblind manipulates seccomp to hide within apps, posing a dangerous threat that requires vigilance and robust security measures for protection.
This new malware on Android can bypass security to steal data
Note: This image is AI-generated
A new Android malware called Snowblind has emerged and it's using a clever trick to bypass security. Named Snowblind, this malware exploits a feature meant to protect users – a security check called "seccomp" – to hide its tampering with legitimate apps.
Snowblind "repackages" these apps, making them blind to the fact that Snowblind is now piggybacking on them.This allows the malware to misuse accessibility services, which are meant to assist users, but in this case, are hijacked to steal login information or even remotely control the device for malicious purposes.

How this malware can be dangerous


According to a report by BleepingComputer, researchers at mobile security company Promon have discovered this malware strain called Snowblind targeting Android devices. This malware leverages tactics to bypass existing security measures.
Snowblind specifically targets apps that handle sensitive user information. The malware exploits a security feature called "seccomp" that's designed to protect users. Seccomp restricts the actions apps can take, preventing malicious activities.

The malware injects malicious code into the targeted app before its security checks can run. This allows Snowblind to install a filter within seccomp, essentially manipulating the system calls the app can make.

When the app tries to verify if it's been tampered with (a security check), Snowblind's filter intercepts this action and blocks it. This prevents the app from detecting Snowblind's presence.
Snowblind further manipulates the system by altering the app's attempts to access files. It redirects these attempts to an uninfected version of the app, effectively hiding its tampering from the security check.

What this means for users


Snowblind's use of a security feature makes it a particularly dangerous threat. The targeted nature of its attack also minimises its impact on device performance, further reducing the chances of users noticing anything unusual. This underlines the importance of staying vigilant and relying on reputable security solutions to protect your mobile devices.
author
About the Author
TOI Tech Desk

The TOI Tech Desk is a dedicated team of journalists committed to delivering the latest and most relevant news from the world of technology to readers of The Times of India. TOI Tech Desk’s news coverage spans a wide spectrum across gadget launches, gadget reviews, trends, in-depth analysis, exclusive reports and breaking stories that impact technology and the digital universe. Be it how-tos or the latest happenings in AI, cybersecurity, personal gadgets, platforms like WhatsApp, Instagram, Facebook and more; TOI Tech Desk brings the news with accuracy and authenticity.

End of Article
FOLLOW US ON SOCIAL MEDIA