Konfety Android Malware Exploits ZIP Tricks to Masquerade as Legit Apps on Google Play

Score: 74/100 3 articles 100.0% coherence 1 day ago

Activity Timeline

Android malware Konfety uses malformed APKs to eva...
BleepingComputer
Jul 15
13:10
Konfety Android Malware on Google Play Uses ZIP Ma...
Cybersecurity News
Jul 15
14:59
Konfety Android Malware Exploits ZIP Tricks to Mas...
GB Hackers
Primary Article
Jul 16
10:28
Konfety Android Malware Exploits ZIP Tricks to Masquerade as Legit Apps on Google Play Security researchers from zLabs have discovered a more advanced version of the Konfety Android malware, which uses complex ZIP-level changes to avoid detection and mimic genuine apps on the Google Play Store, marking a dramatic increase in mobile dangers. This malware employs an “evil-twin” strategy, where malicious versions distributed through third-party sources identical package names with benign apps available on official stores, thereby enhancing its stealth and deceptive capabilities. Advanced Evasion Tactics By tampering with the APK’s ZIP structure such as enabling the general purpose flag (bit 00) to falsely indicate encryption and declaring an unsupported BZIP compression method (0x000C) for critical files like AndroidManifest.xml Konfety disrupts commonreverse engineering tools. These alterations cause utilities like APKTool and JADX to either prompt for non-existent passwords or crash out...

Cluster AI

Beta Pro

Save to Folder

Choose a folder to save this cluster: