Back

MiningDropper Framework Delivers Multiple Malware Types on Android Devices

Severity: High (Score: 64.5)

Sources: Gbhackers, Cybersecuritynews

Summary

Hackers are leveraging a modular Android framework known as MiningDropper to distribute various forms of malware, including infostealers, remote access trojans (RATs), and banking malware. This multi-stage dropper system can also facilitate cryptocurrency mining on compromised devices. The campaign targets Android users by disguising malicious payloads as legitimate applications. Researchers have noted a rapid increase in the scope of this malware campaign, affecting a wide range of Android devices. Specific malware types associated with MiningDropper include BTMOB RAT and credential-stealing spyware. The current status indicates ongoing exploitation with no immediate resolution in sight. Users are advised to remain vigilant against suspicious applications and potential malware infections. Key Points: • MiningDropper is a multi-stage Android dropper spreading various malware types. • The malware campaign targets Android devices disguised as normal apps. • Affected malware includes infostealers, RATs, and banking trojans.

Key Entities

  • Malware (attack_type)
  • Btmob (malware)
  • MiningDropper (malware)
  • Android (platform)
Loading threat details...

Threat Not Found

The threat cluster you're looking for doesn't exist or has been removed.

Return to Feed