Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

New Variant of XLoader Malware Runs in the Background and Steals Your Photos, Texts, and Other Data

New Variant of XLoader Malware Runs in the Background and Steals Your Photos, Texts, and Other Data

If you’re in the know about cybersecurity and, specifically, mobile malware, you might have heard the name XLoader in the past. The malware has gone through considerable versions and variations, allowing it to steal information from users in more than seven countries, but the most recent is incredibly scary.

Android encompasses a significant portion of the smartphone operating system market share, and any attack that targets it should be taken seriously. Normally, an Android malware first needs to be opened by the user for it to work. You open the infected app or file, which then launches the malware. However, this new version of XLoader is a bit different in that it can launch automatically.

Unfortunately, this new variant of XLoader can run in the background, meaning that the app doesn’t even have to be opened for it to run and perform all of its nasty tricks. It can extract data from infected devices relatively easily, including photos, text messages, contact lists, hardware information, and so much more.

According to McAfee, which discovered the malware, the threat spreads by shortened URLs in malicious text messages. These shortened URLs are designed to make detection more difficult for the user. If the user opens the link on their device, they’ll be prompted to download the Android APK file, which is a way to sideload apps on a device without installing them through the Google Play Store. If users install the app, they’ll find themselves with an infected Android device.

To avoid detection, the app impersonates Google Chrome and asks the user for permissions like sending and viewing text messages and running in the background. It will also ask users to assign it as the default SMS app. Furthermore, XLoader can extract more phishing messages and malicious links from Pinterest profiles. It will send the links to the infected smartphone in an effort to stay undetected.

Here’s the crazy part: the threat can use hard-coded phishing messages to trick the user into clicking on malicious links with bogus allegations of bank fraud if it cannot access Pinterest for whatever reason. It’s a very intelligent threat that has evolved over time, and it must be taken seriously.

You can limit the amount of risk associated with mobile malware like XLoader by avoiding sideloading apps in the first place and limiting the number of apps you download from the app store. Furthermore, we always recommend that you make sure Google Play Protect is enabled on your device.

To make sure it’s on, open the Google Play Store app. At the top right, tap the profile icon. Tap Play Protect and then Settings. Ensure Scan apps with Play Protect is on.

Be sure to educate your users about this threat and all other types of mobile malware, and take measures now to protect your business by calling Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 17 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Backup Microsoft Small Business Productivity Quick Tips Passwords Managed Service Saving Money Cybersecurity Communication Data Backup Smartphone Android AI Upgrade Disaster Recovery Data Recovery Business Management VoIP Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Artificial Intelligence Automation Facebook Miscellaneous Cloud Computing Covid-19 Training Gadgets Server Managed Service Provider Remote Work Compliance IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Windows 10 Office Government Data Management Business Continuity Windows 10 Bandwidth Business Technology Virtualization Wi-Fi Blockchain Two-factor Authentication Mobile Office Vendor Apps Data Security BYOD Mobile Device Management Chrome Gmail Budget Tip of the week WiFi Apple Managed Services Voice over Internet Protocol App Employer-Employee Relationship Networking Avoiding Downtime HIPAA Marketing Office 365 Applications Access Control Conferencing How To BDR Computing Hacker Information Technology Website Router Analytics Office Tips Virtual Private Network Augmented Reality Health Storage 2FA Help Desk Password Bring Your Own Device Big Data Retail Healthcare Managed IT Services Operating System Computers Risk Management Remote Monitoring End of Support Vulnerability Vendor Management Solutions Physical Security Display Firewall Printer Windows 11 Paperless Office Infrastructure Monitoring The Internet of Things Excel Document Management Social Remote Workers Telephone Going Green Scam Data loss Customer Service Cooperation Free Resource Cybercrime Project Management Windows 7 Patch Management Save Money Microsoft 365 Virtual Desktop IT Management Data storage LiFi VPN Employees Meetings Integration Word Outlook User Tip Modem Money Computer Repair Mobile Security Processor Humor Holidays Data Storage Safety Smart Technology Supply Chain Sports Video Conferencing Mouse Machine Learning Managed Services Provider Professional Services Saving Time Virtual Machines Administration Managed IT Service Maintenance Antivirus Downloads iPhone Customer Relationship Management Licensing Settings Printing Vulnerabilities Wireless Entertainment Data Privacy Content Filtering Hacking Presentation YouTube Images 101 Robot Mobility Telephone System Multi-Factor Authentication Cryptocurrency Cost Management Wireless Technology Content Remote Working IP Address Google Docs Wearable Technology Memory Vendors Unified Communications Experience Comparison Google Play Be Proactive Running Cable Health IT Unified Threat Management Motherboard Data Breach Bitcoin Assessment Electronic Health Records Google Wallet Permissions Workforce Unified Threat Management Directions Videos Wasting Time Threats Recovery Network Congestion Specifications Security Cameras Workplace Strategies Laptop Trend Micro Hard Drives Windows 8 Internet Exlporer Software as a Service Domains Drones Fraud Meta User Error Microchip Username Managing Costs Amazon Black Friday SSID Halloween Point of Sale eCommerce Refrigeration Database Surveillance Public Speaking Virtual Assistant Outsource IT Network Management Lithium-ion battery Tech Support IT Technicians Virtual Machine Environment Media Monitors Cyber Monday Medical IT Entrepreneur Scary Stories Proxy Server Reviews Cookies Hacks Tactics Development Hotspot Transportation Small Businesses Fun Websites Mirgation Hypervisor Displays Deep Learning PowerPoint Shopping Nanotechnology Optimization Undo Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Education SharePoint Management PCI DSS Chatbots Navigation Mobile Computing Writing Distributed Denial of Service Workplace Lenovo Gig Economy Screen Reader Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Search Server Management Regulations Compliance Private Cloud Identity Application Best Practice Evernote Paperless Co-managed IT Buisness Superfish Bookmark Identity Theft Smart Tech Memes Download Net Neutrality IBM Legal Twitter Alerts SQL Server Technology Care IT solutions Financial Data Error History Business Growth Business Communications Social Engineering Break Fix Scams Browsers Smartwatch Connectivity IT Upload Procurement Remote Computing Azure Hybrid Work Cortana Social Network Telework Cyber security Alt Codes Multi-Factor Security Tech Human Resources Tablet IoT Communitications Competition Dark Web Cables Downtime CES Trends Supply Chain Management Alert Hosted Solution Dark Data Google Calendar Term Google Apps Managed IT Customer Resource management FinTech File Sharing Regulations Typing Star Wars IT Assessment How To Microsoft Excel IT Maintenance Data Analysis Gamification Flexibility Google Drive Notifications Staff Value Business Intelligence User Knowledge Legislation Shortcuts Organization Travel Social Networking Google Maps Smart Devices Ransmoware 5G Techology Fileless Malware Digital Security Cameras

Blog Archive