Android users are being tricked into installing malicious browser apps – here’s how to stay safe


Hackers have begun abusing the Android WebAPK technology to get people to install malware on their devices, a new report from the Polish Financial Supervision Authority’s Computer Security Incident Response Team (CSIRT KNF) reports.
Android WebAPK is the underlying technology powering so-called progressive web apps, or PWAs. These are a hybrid between web apps and native apps, having some features and capabilities from both. Some developers refer to progressive web apps as “installable websites”, as they can be installed on the device and offer features such as push notifications, which aren’t usually a part of a web app.
What’s more, when users install progressive web apps, they don’t need to go through the Play Store. Google explains it like this: “when a user installs a PWA from Google Chrome and a WebAPK is used, the minting server “mints” (packages” and signs an APK for the PWA.” This process is relatively slow, but once it’s done, the browser on the target endpoint will silently install the device, without disabling security, as a trusted provider signed the APK already.
In this particular case, unknown threat actors started texting customers, impersonating the Polish bank PKO Bank Polski. In the text message, they say that their banking app needs to be updated, and share a link where they can do that. Those that click the link won’t be taken to the Play Store, or a different Android app repository, but will rather be taken to a website where WebAPK technology will be used to install the malware.
After installing the malicious app, the users will be asked to type in their login credentials, as well as their multi-factor authentication (MFA) code, giving the attackers everything they need to drain the account completely.
Analysis: Why does it matter?
Banking trojans are a major risk as they’re capable of dealing immense material damage. The threat actors behind these campaigns seldom avoid targeting consumers, making the risk that much greater. What’s more, the attackers will go to lengths to make sure they impersonate the bank as best as they can, creating seemingly identical landing pages and mimicking the style and tone of the banks’ communications.
That being said, this particular campaign is also dangerous because it leverages new technologies and opens up new avenues of abuse. As such, the victims might be caught off guard, even those that are usually security-wary and aware of the dangers of phishing and social engineering. If the campaign proves to be a resounding success, chances are other threat actors will jump on the bandwagon.
To protect against such malicious apps, users should first and foremost be careful when installing new apps, or installing patches for their current software stack. The best course of action is to refrain from installing any apps that can’t be found on official repositories, such as the Play Store, or the Samsung Galaxy store. Users should also double-check everything they receive via SMS, email, or social media. If an app sends a text message asking for an update, open the official website or app store page and check if an update is available. Users can also find the latest version of the app listed, and will be able to cross-reference the numbers with what they have installed.
Finally, users should keep Google Play Protect enabled, as it’s a free antivirus app that comes with the majority of Android phones and is good enough to flag most of the malware present today. Users can always install another Android antivirus app, too.
What have others said about the campaign?
In its writeup about WebAPK technology being abused in cybercrime, the Cybersec blog also says crooks are pairing the attack with impersonation, to bypass any security measures set up by the bank: “In addition to the WebAPK attack, cybercriminals are also using specialized device spoofing tools to impersonate compromised account holders and bypass anti-fraud controls,” the report reads. “These tools, which are marketed on the dark web, are capable of spoofing mobile device fingerprints and other software and network parameters that are analyzed by anti-fraud systems. This allows threat actors to conduct unauthorized transactions via smartphones using banking malware such as TimpDoor and Clientor.”
Tom’s Guide, on the other hand, warns users that malicious apps distributed through WebAPKs are “particularly hard” for cybersecurity researchers to track, as WebAPKs have a different package name and checksum on each device they’re installed on. Furthermore, currently only the Polish bank PKO Bank Polski is being impersonated. However, that can change at any moment, with crooks targeting banks in the U.S., U.K., and around the world, the publication states. Hence, users need to remain vigilant, regardless of who sent the message, or how.
Go deeper
If you want to learn more about keeping your Android device secure, start by reading our in-depth guide on the best Android antivirus programs right now, as well as best Android phones overall. Also, make sure you read our guide for the best authenticator apps, and best firewalls today.
Hackers have begun abusing the Android WebAPK technology to get people to install malware on their devices, a new report from the Polish Financial Supervision Authority’s Computer Security Incident Response Team (CSIRT KNF) reports. Android WebAPK is the underlying technology powering so-called progressive web apps, or PWAs. These are a…
Recent Posts
- Adidas Promo Codes & Deals: 30% Off
- Volvo’s ES90 sedan will be built with a Nvidia supercomputer
- With the Humane AI Pin now dead, what does the Rabbit R1 need to do to survive?
- One of the best AI video generators is now on the iPhone – here’s what you need to know about Pika’s new app
- Apple’s C1 chip could be a big deal for iPhones – here’s why
Archives
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010