K7 Computing researchers have uncovered a malicious Android campaign that exploits the name of the Indian government scheme "PM KISAN YOJNA" to spread stealer malware. The attackers have launched a fake application designed to mimic an official app associated with the PM-Kisan Samman Nidhi scheme. On installation, the malware utilizes a multi-stage dropper strategy, first installing a camouflaged application and then quietly loading a second-stage payload named `decrypted_app.apk`. The payload extracts confidential user information like names, Aadhaar and PAN card numbers, mobile numbers, and dates of birth. It also gains VPN permissions as well as permission to install other applications, gaining control over network traffic and further malicious activity. This attack goes beyond typical Android malware by incorporating advanced evasion tactics. The dropper is crafted specifically to evade static analysis tools like Apktool and Jadx. It has emulator detection, root access detection, and detection of Frida to prevent analysis in sandboxed or reverse-engineering contexts. The application also induces users to install a spoofed update, which requests additional permissions. Once activated, the malware hides its icon and copies the legitimate PM-Kisan app so that it is harder for users to spot the threat. It also exfiltrates SMS messages to a command-and-control (C2) server, but researchers found the C2 server to be inactive when conducting research. To avoid being victims of such attacks, users need to download applications only from established stores such as Google Play and verify app data such as developer name and user ratings. Security software needs to be updated, and application permissions need to be thoroughly examined prior to granting them. Public awareness also needs to be created by government agencies so that dummy apps that imitate genuine programs are not spread.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...