


This is an odd permission to request, especially for an app with a stated goal of removing content, and not showing something on top.īut the shady things continue. FakeAdsBlock modus operandiĪs for the malware itself, FakeAdsBlock is something else, especially in the brash way it bombards users with ads.Īll of this starts with its installation process, where the Ads Blocker app (in which the malware is hidden) asks for permission to display content over other apps.

This distribution vector isn't new and has been often seen being used before - especially with apps that pertain to grant access to adult movies. Users looking to watch pirated movies would eventually end up installing a malicious app infected with FakeAdsBlock.

Collier said they already found evidence that the same FakeAdsBlock malware was also available hidden in apps named "Hulk (2003).apk," "Guardians of the Galaxy.apk," and "Joker (2019).apk." The researcher says this suggests that the malware's creators were in the midst of shifting their distribution pattern to a bogus movie streaming portal. This, however, might change in the future. Its distribution vector is via third-party app stores, where it's available for download as an ad-blocking app named Ads Blocker, said Nathan Collier, Senior Malware Intelligence Analyst. Named FakeAdsBlock, this new strain has already infected at least 500 users, according to Malwarebytes, the antivirus maker who spotted the malware. Security researchers have discovered a new Android malware strain that's currently being distributed as an ad blocker for Android users, but, ironically, once installed, it pesters victims with ads through multiple methods at every couple of minutes. Ukrainian developers share stories from the war zone Linux distros for beginners: You can do this! Got questions about crypto? Ask the Coachįor Mom: The best flower delivery services How ransomware attacks threaten our food supply
