Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Android Malware Konfety Evolves

July 16, 2025
Reading Time: 2 mins read
in Alerts
Google Realeases Critical Chrome Update

Zimperium zLabs researchers are closely tracking an evolving threat, noting its use of “evil-twin” tactics and duplicate package names to mimic legitimate Google Play apps. This clever masquerade allows Konfety to bypass standard security scans and trick users into installing seemingly harmless applications. Its core evasion strategy relies on subtly corrupted ZIP files, which exploit vulnerabilities in analysis tools. By enabling a misleading flag and falsely declaring an unsupported BZIP compression, the malware causes tools to incorrectly identify the APK as encrypted or leads to partial decompression and invalid file parsing. Android, however, gracefully handles these malformed files, allowing the app to install without issue.

Furthermore, Konfety employs advanced obfuscation, dynamically loading hidden, encrypted code at runtime.

This secondary DEX file, not visible during standard inspections, contains critical components declared in the app’s manifest but missing from the main code. This sophisticated technique ensures that key malicious functionalities remain concealed from static analysis, only becoming active once the app is running.

These hidden components are linked to Konfety’s history of leveraging the CaramelAds SDK for ad fraud. This enables the malware to silently execute ads, install additional payloads, and communicate with remote servers without the user’s knowledge or consent. Further indicators, such as a user agreement popup and a specific regular expression (@injseq) found in the code, reinforce its connection to previous Konfety campaigns.

Ultimately, Konfety’s deceptive tactics aim to trick users into accepting a user agreement upon launch, subsequently redirecting them through multiple sites to install unauthorized applications or enable intrusive browser notifications. By maintaining identical package names as legitimate Play Store apps but lacking their advertised features, and by hiding its icon and app name, Konfety remains a persistent and stealthy threat within the Android ecosystem.

Reference:

  • Android Malware Konfety Evolves With Advanced ZIP Manipulation and Dynamic Loading Capabilities
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityJuly 2025
ADVERTISEMENT

Related Posts

Dragon Breath Deploys Roninloader Ghosts

Rondodox Targets XWiki To Grow Botnet

November 17, 2025
Dragon Breath Deploys Roninloader Ghosts

Windows 10 Update Error 800f0922

November 17, 2025
Dragon Breath Deploys Roninloader Ghosts

Dragon Breath Deploys Roninloader Ghosts

November 17, 2025
Imunify360 Flaw Puts Sites At Risk

Imunify360 Flaw Puts Sites At Risk

November 14, 2025
Imunify360 Flaw Puts Sites At Risk

Safery Extension Steals Crypto Wallets

November 14, 2025
Imunify360 Flaw Puts Sites At Risk

ChatGPT Flaw Exposed Core Infrastructure

November 14, 2025

Latest Alerts

Rondodox Targets XWiki To Grow Botnet

Windows 10 Update Error 800f0922

Dragon Breath Deploys Roninloader Ghosts

Imunify360 Flaw Puts Sites At Risk

Safery Extension Steals Crypto Wallets

ChatGPT Flaw Exposed Core Infrastructure

Subscribe to our newsletter

    Latest Incidents

    Logitech Confirms Major Data Breach

    Hackers Steal Maternity Ward Videos

    Checkoutcom Rejects Hackers After Breach

    Hackers Breach NY State Texting Service

    Doordash Hit By October User Data Breach

    Synnovis Reports Data Theft In Attack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial