Description

On Google Play, two new Android malware families called 'CherryBlos' and 'FakeTrade' were identified, with the intent of stealing cryptocurrency credentials and funds or conducting frauds. Malicious apps are distributed through a variety of means, including social media, phishing websites, and deceptive shopping apps on Google Play, Android's official app store. CherryBlos malware first appeared in April 2023 in the form of an APK (Android package) file disguised as AI tools or coin miners. CherryBlos is a cryptocurrency stealer that utilizes Accessibility service privileges to retrieve configuration files from the C2 server, which automatically authorize new permissions and prevent the user from terminating the trojanized app. CherryBlos employs a variety of methods to obtain cryptocurrency credentials and assets. However, a more intriguing feature extracts text from images and photos stored on the device using OCR (optical character recognition). While taking photos of the recovery phrase is not suggested, some still do it; if this malware is enabled, it may potentially OCR the image and extract the recovery phrase, allowing them to steal the wallet. The malware also acts as a clipboard hijacker, replacing a crypto recipient's address with one controlled by the attacker while the original address appears unchanged to the user, allowing threat actors to redirect payments sent to users to their own wallets, effectively stealing the transferred funds.