Home Malware Programs Malware Exodus Malware

Exodus Malware

Posted: April 8, 2019

The Exodus Malware was discovered when malware researchers come across the threat concealed in an application that could be obtained from the Google Play Store and was attacking the users of an Internet provider located in Italy. The analyse of the threat showed that it had sophisticated monitoring features and could root Android devices, which allowed the attackers to take control of the affected devices. Regretfully, there are various applications infected by the Exodus Malware on the Google Play Store. The main version of the Exodus Malware was crafted to target Android devices. Also, there was an IOS version advertised on phishing sites imitating Italian mobile service providers, although this version was poorly crafted, which may indicate that it was still in development.

The installation of the Exodus Malware follows three distinct steps; one that collects the device details and shares it with a C&C server, a second that boosts the capabilities of the surveillance and the last one that tries to gain root control of the device. The Exodus Malware, when inside a device, can make audio recordings, collect the device's location, photos, videos, and the user's contact list. Looks like that Google has removed the applications loading the Exodus Malware from the Google Play Store.

Loading...