{"id":785,"date":"2020-04-12T13:16:31","date_gmt":"2020-04-12T12:16:31","guid":{"rendered":"http:\/\/zerothcode.com\/blog\/?p=785"},"modified":"2020-04-18T07:03:38","modified_gmt":"2020-04-18T06:03:38","slug":"hack-android-factory-reset","status":"publish","type":"post","link":"https:\/\/zerothcode.com\/blog\/hack-android-factory-reset\/","title":{"rendered":"Unveiled: How xHelper Android Malware Re-Installs Even After Factory Reset"},"content":{"rendered":"<p>Remember xHelper? hack android<\/p>\n<p>A mysterious piece of Android malware that re-installs itself on infected devices even after users delete it or factory reset their devices<\/p>\n<p>\u2014making it nearly impossible to remove.<\/p>\n<h4>xHelper reportedly infected over 45,000 devices last year, and since then,<\/h4>\n<h3>hack android<\/h3>\n<p>cybersecurity researchers have been trying to unfold how the malware survives factory reset and how it infected so many devices in the first place.<\/p>\n<h3><\/h3>\n<p>&nbsp;<\/p>\n<div class=\"separator\"><a href=\"https:\/\/thehackernews.com\/images\/-jVZMofDSRRo\/Xox7dwcBVFI\/AAAAAAAA2ow\/GHXjvHSoyUEn8FVtxVTJgrt7uqonvtysACLcBGAsYHQ\/s728-e100\/remove-xhelper-malware.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" title=\"xhelper malware removal\" src=\"https:\/\/thehackernews.com\/images\/-jVZMofDSRRo\/Xox7dwcBVFI\/AAAAAAAA2ow\/GHXjvHSoyUEn8FVtxVTJgrt7uqonvtysACLcBGAsYHQ\/s728-e100\/remove-xhelper-malware.jpg\" alt=\"hack android\" width=\"728\" height=\"305\" border=\"0\" data-original-height=\"305\" data-original-width=\"728\" \/><\/a><\/div>\n<p>In a\u00a0blog post published today, Igor Golovin, malware analyst at Kaspersky, hack android<\/p>\n<p>finally solved the mystery by unveiling technical details on the persistence mechanism used by this malware,<\/p>\n<p>and eventually also figured out\u00a0<b>how to remove xHelper<\/b>\u00a0from an infected device completely.<\/p>\n<p>As the initial attack vector and for distribution,<\/p>\n<p>the malware app disguises itself as a popular cleaner and speed optimization app for smartphones<\/p>\n<p>\u2014 affecting mostly users in Russia (80.56%), India (3.43%), and Algeria (2.43%).<\/p>\n<p>&#8220;But in reality, there is nothing useful about it: after installation, the &#8216;cleaner&#8217; simply disappears and is nowhere to be seen either on<\/p>\n<p>the main screen or in the program menu. You can see it only by inspecting the list of installed apps in the system settings,&#8221; Golovin said.<\/p>\n<p>Once installed by an unsuspecting user, the malicious app registers itself as a foreground service and,<\/p>\n<p>then extracts an encrypted payload that collects and sends identity information of the targeted device to an attacker-control remote web server.<\/p>\n<div class=\"separator\"><a href=\"https:\/\/thehackernews.com\/images\/-28jxE9c0gCM\/Xox6Xd7lJzI\/AAAAAAAA2oo\/DIwxVV75OM4G5V4gX3gaA-v35QVOJUdKgCLcBGAsYHQ\/s728-e100\/remove-xhelper-malware.jpg\"><img decoding=\"async\" title=\"how to remove xhelper malware from Android\" src=\"https:\/\/thehackernews.com\/images\/-28jxE9c0gCM\/Xox6Xd7lJzI\/AAAAAAAA2oo\/DIwxVV75OM4G5V4gX3gaA-v35QVOJUdKgCLcBGAsYHQ\/s728-e100\/remove-xhelper-malware.jpg\" alt=\"how to remove xhelper malware from Android\" border=\"0\" data-original-height=\"288\" data-original-width=\"728\" \/><\/a><\/div>\n<p>In the next step, the malicious app executes another obfuscated payload that triggers<\/p>\n<p>a set of Android rooting exploits and attempts to gain administrative access to the device&#8217;s operating system.<\/p>\n<p>&#8220;The malware can gain root access mainly on devices running Android versions 6 and 7 from Chinese manufacturers (including ODMs),&#8221; Golovin said.<\/p>\n<p>The malware sits silently on the device and waits for commands from the attackers. hack android<\/p>\n<p>According to a previous analysis of the same malware by\u00a0Symantec\u00a0researchers,<\/p>\n<p>it uses SSL certificate pinning to prevent its communication from being intercepted.<\/p>\n<p>&#8220;The malware installs a backdoor with the ability to execute commands as a superuser.<\/p>\n<p>If the attack succeeds, the malicious app then abuses root privilege to silently install<\/p>\n<p>xHelper by directly copying malicious package files to the system partition (\/system\/bin folder) after re-mounting it in the write-mode.<\/p>\n<p>&#8220;All files in the target folders are assigned the immutable attribute,<\/p>\n<p>which makes it difficult to delete the malware because the system does not allow even superusers to delete files with this attribute,&#8221; Golovin said.<\/p>\n<p>to permanently delete the malware file, xHelper also modifies a system library (libc.so)<\/p>\n<p>intending to prevent infected users from re-mounting system partition in the write mode.<\/p>\n<p>&#8220;On top of that, the Trojan downloads and installs several more malicious programs,<\/p>\n<p>and deletes root access control applications, such as Superuser,&#8221; Golovin said.<\/p>\n<p>According to Kaspersky, replacing the modified library with the one from the original firmware for your Android smartphone<\/p>\n<p>could re-enable mounting system partition in the write-mode to permanently remove\u00a0xHelper Android malware.<\/p>\n<p>However, instead of following such a tech-savvy procedure to get rid of the malware,<\/p>\n<p>affected users are advised to simply re-flash their backdoored phones with a fresh copy of firmware<\/p>\n<p>downloaded from the vendors&#8217; official website or by installing a different but compatible Android ROM.<\/p>\n<p>You may Also like to read:<\/p>\n<p><a href=\"http:\/\/zerothcode.com\/blog\/wi-fi-vulnerability-affects-billion\/\">http:\/\/zerothcode.com\/blog\/wi-fi-vulnerability-affects-billion\/<\/a><\/p>\n<div class=\"cf note-b\">Have something to say about this article? Comment below or share it with us on\u00a0<a href=\"https:\/\/www.facebook.com\/zerothcode\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0<a href=\"https:\/\/twitter.com\/zerothcode\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>\u00a0or our\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/zerothcode\" target=\"_blank\" rel=\"noopener noreferrer\">LinkedIn Group<\/a>.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Remember xHelper? hack android A mysterious piece of Android malware that re-installs itself on infected devices even after users delete<\/p>\n","protected":false},"author":1,"featured_media":788,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[37],"tags":[],"yst_prominent_words":[160,1010,495,1014,1009,175,1003,1013,1002,1016,425,71,1008,69,1011,1012,936,1007,170,1004],"class_list":["post-785","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hackers-news"],"_links":{"self":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/785","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/comments?post=785"}],"version-history":[{"count":0,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/785\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/media\/788"}],"wp:attachment":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/media?parent=785"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/categories?post=785"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/tags?post=785"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/yst_prominent_words?post=785"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}