Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    People are using Chatgpt to write their text messages – here are how you can tell

    August 5, 2025

    Certain bug leaked in proton log fixes the totup secrets

    August 5, 2025

    This app immediately blocks sensitive information from your MAC screenshot.

    August 5, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Android Malware uses distorted APK to detect konfety
    Security

    Android Malware uses distorted APK to detect konfety

    PineapplesUpdateBy PineapplesUpdateJuly 15, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Android Malware uses distorted APK to detect konfety
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Android Malware uses distorted APK to detect konfety

    A new version of konfety android malware emerged with other obfuscation methods with a distorted zip structure that allows it to analyze and detect it.

    Konfety is in the form of a valid app, which mimics the spontaneous products available on Google Play, but does not facilitate any promised functionality.

    Malware capabilities include redirecting users to malicious sites, pushing unwanted app installs and fake browser notifications.

    Instead, it receives and presents hidden advertisements using carmelads SDK and exfiltrates information such as installed apps, network configurations and system information.

    Unwanted advertisements and redirects triggered by Confaity
    Unwanted advertisements and redirects triggered by Confaity
    Source: Zimperium

    Although konfety is not a spyware or rat tool, it includes an encrypted secondary dex file inside the APK, which is decryp and loaded at Runtime, which consists of hidden services declared in the Androidmanifest file.

    This dynamically leaves the door open to install additional modules, thus allowing the distribution of more dangerous capabilities on current transitions.

    Scatter

    Researchers on mobile safety platform Discover zimperium And analyzed the latest Konfety version and reports that malware uses several methods to disrupt its true nature and activity.

    Konfety tricks are available to the victims by copying the name of valid application and branding to the victims by copying it on Google Play and is distributed through the third -Paksha store – a strategy that is on researchers Human is called “Evil Twin” Or “decoy twin.”

    Malware operators are promoting it on the third-party app store.

    These marketplaces are often where users seek the “free” variant of the premium apps as they want to avoid Google tracking, there is an Android device that is no longer supported, or not access to Google services.

    Dynamic code loading, where malicious argument is hidden in an encrypted dex file that is loaded on runtime, is another effective obscuration and theft mechanism that employs the corn.

    Another unusual anti-analysis strategy in Konfety is to manipulate the APK files in a way that confuses or breaks the static analysis and reverse engineering tools.

    First, APK sets the general purpose bit flag on ‘bit 0’, indicating that the file is encrypted, even if it is not. This triggers wrong passwords when inspecting the file, tries to block or delay access to APK content.

    Secondly, important files in APK are declared using BZIP compression (0x000C), which is not supported by analysis equipment such as APKTOOL and JADX, resulting in parsing failure.

    Analysis equipment crashes while trying to pars malicious APK
    Analysis equipment crashes while trying to pars malicious APK
    Source: Zimperium

    Meanwhile, Android ignores the declared method and returns to default processing to maintain stability, allowing malicious app to install and run on the device without any problem.

    After installation, Konfety hides its app icon and uses geoofinging to change behavior according to the name and the area of the victim.

    The past has seen compression-based obfuscation in Android Malware, as highlighted in a kaspersky report on Soumnibot malware since April 2024.

    In that case, Soumnibot declared an invalid compression method in androidmanifest.xml, announced a fake file size and data overlay, and confused analysis equipment with very large name location string.

    It is usually recommended to avoid installing APK files from the third-party Android app store and only has trust software from publishers you know.


    Tines needle

    While cloud attacks can be more sophisticated, the attackers still succeed with surprisingly simple techniques.

    Drawing by the detection of Vij in thousands of organizations, this report reveals the 8 major techniques used by Claude-Floid danger actors.

    Android APK detect distorted konfety Malware
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleWatch ‘The Great British Sewing B’ Season 11 for free
    Next Article Gemini in Gmail is unsafe for injection-based fishing attacks, researcher finds
    PineapplesUpdate
    • Website

    Related Posts

    Security

    Certain bug leaked in proton log fixes the totup secrets

    August 5, 2025
    Security

    Rainmware attacks: danger of developing US financial institutions

    August 5, 2025
    Security

    Anthropic AI wants to stop the model from evil – how is here

    August 4, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    People are using Chatgpt to write their text messages – here are how you can tell

    August 5, 2025

    Certain bug leaked in proton log fixes the totup secrets

    August 5, 2025

    This app immediately blocks sensitive information from your MAC screenshot.

    August 5, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.