New FireScam Android data-theft malware poses as Telegram Premium app

A brand new Android malware named ‘FireScam’ is being distributed as a premium model of the Telegram app by way of phishing web sites on GitHub that mimick the RuStore, Russia’s app marketplace for cell units.

RuStore launched in Might 2022 by the Russian web group VK (VKontakte) as an alternative choice to Google Play and Apple’s App Retailer, following Western sanctions that impacted Russian customers’ entry to cell software program.

It hosts apps which can be compliant with Russian rules and it was created with the assist of the Russian Ministry of Digital Growth.

In response to researchers at risk administration firm Cyfirma, the malicious GitHub web page mimicking RuStore first delivers a dropper module referred to as GetAppsRu.apk.

The dropper APK is obfuscated utilizing DexGuard to evade detection and acquires permissions that enable it to establish put in apps, provides it entry to the system’s storage, and set up extra packages.

Subsequent, it extracts and installs the principle malware payload, ‘Telegram Premium.apk’, which requests permissions to observe notifications, clipboard knowledge, SMS, and telephony companies, amongst others.

RuStore clone hosted on a GitHub.io domain
RuStore clone hosted on a GitHub.io area
Supply: CYFIRMA

FireScam capabilities

Upon execution, a misleading WebView display exhibiting a Telegram login web page steals the person’s credentials for the messaging service.

FireScam establishes communication with a Firebase Realtime Database the place it uploads stolen knowledge in real-time and registers the compromised system with distinctive identifiers, for monitoring functions.

Cyfirma studies that stolen knowledge is simply saved within the database quickly after which wiped, presumably after the risk actors filtered it for helpful info and copied it to a special location.

The malware additionally opens a persistent WebSocket reference to the Firebase C2 endpoint for real-time command execution like requesting particular knowledge, triggering instant uploads to the Firebase database, downloading and executing extra payloads, or adjusting the surveillance parameters.

FireScam may monitor adjustments within the display exercise, capturing on/off occasions and log the energetic app on the time in addition to exercise knowledge for occasions lasting for greater than 1,000 milliseconds.

The malware additionally meticulously screens any e-commerce transactions, making an attempt to seize delicate monetary knowledge.

Something the person sorts, drags and drops, copies to clipboard, and intercepts even knowledge routinely stuffed from password managers or exchanges between apps, categorized, and exfiltrated to the risk actors.

Data exfiltrated by FireScam
Information exfiltrated by FireScam
Supply: CYFIRMA

Though Cyfirma doesn’t have any hints pointing to FireScam’s operators, the researchers say that the malware is a “sophisticated and multifaceted threat” that “employs advanced evasion techniques.”

The corporate recommends customers to execute warning when opening recordsdata from probably untrusted sources or when clicking on unfamiliar hyperlinks.

Recent articles

How To Rapidly Spotlight Particular or Repeated Textual content in Phrase

Highlighting is a typical process in Microsoft Phrase, permitting...

FireScam Android Malware Poses as Telegram Premium to Steal Knowledge and Management Gadgets

î ‚Jan 06, 2025î „Ravie LakshmananMalware / Cell Safety An Android data...

The 5 Quickest VPNs for 2025

Ever puzzled find out how to hold your delicate...