XLoader, an Android malware variant, has emerged with new capabilities, automatically executing upon infection without user interaction. Operated by the ‘Roaming Mantis’ threat actor, XLoader employs SMS texts containing shortened URLs to distribute malicious APKs, posing a significant threat to users’ privacy and security. McAfee researchers have reported this development, emphasizing the malware’s stealthy operation and its ability to extract sensitive information from infected devices.
The malware, disguised as legitimate software such as the Chrome browser, tricks users into granting risky permissions, including access to SMS content and the ability to run persistently in the background. This sophisticated approach enhances its effectiveness in evading detection and spreading further. XLoader’s recent iteration also utilizes Unicode strings for obfuscation and employs fake Chrome app prompts in multiple languages to target a wider audience.
Moreover, XLoader has evolved its attack methodologies to include custom phishing attacks via notification channels and extracting phishing messages from Pinterest profiles. This adaptability allows attackers to switch tactics dynamically and evade security measures effectively. With the malware capable of executing various commands remotely, including data exfiltration and spreading via SMS, the threat landscape posed by XLoader continues to evolve, necessitating robust security measures and awareness among users to mitigate its impact.