Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

New Variant of XLoader Malware Runs in the Background and Steals Your Photos, Texts, and Other Data

New Variant of XLoader Malware Runs in the Background and Steals Your Photos, Texts, and Other Data

If you’re in the know about cybersecurity and, specifically, mobile malware, you might have heard the name XLoader in the past. The malware has gone through considerable versions and variations, allowing it to steal information from users in more than seven countries, but the most recent is incredibly scary.

Android encompasses a significant portion of the smartphone operating system market share, and any attack that targets it should be taken seriously. Normally, an Android malware first needs to be opened by the user for it to work. You open the infected app or file, which then launches the malware. However, this new version of XLoader is a bit different in that it can launch automatically.

Unfortunately, this new variant of XLoader can run in the background, meaning that the app doesn’t even have to be opened for it to run and perform all of its nasty tricks. It can extract data from infected devices relatively easily, including photos, text messages, contact lists, hardware information, and so much more.

According to McAfee, which discovered the malware, the threat spreads by shortened URLs in malicious text messages. These shortened URLs are designed to make detection more difficult for the user. If the user opens the link on their device, they’ll be prompted to download the Android APK file, which is a way to sideload apps on a device without installing them through the Google Play Store. If users install the app, they’ll find themselves with an infected Android device.

To avoid detection, the app impersonates Google Chrome and asks the user for permissions like sending and viewing text messages and running in the background. It will also ask users to assign it as the default SMS app. Furthermore, XLoader can extract more phishing messages and malicious links from Pinterest profiles. It will send the links to the infected smartphone in an effort to stay undetected.

Here’s the crazy part: the threat can use hard-coded phishing messages to trick the user into clicking on malicious links with bogus allegations of bank fraud if it cannot access Pinterest for whatever reason. It’s a very intelligent threat that has evolved over time, and it must be taken seriously.

You can limit the amount of risk associated with mobile malware like XLoader by avoiding sideloading apps in the first place and limiting the number of apps you download from the app store. Furthermore, we always recommend that you make sure Google Play Protect is enabled on your device.

To make sure it’s on, open the Google Play Store app. At the top right, tap the profile icon. Tap Play Protect and then Settings. Ensure Scan apps with Play Protect is on.

Be sure to educate your users about this threat and all other types of mobile malware, and take measures now to protect your business by calling Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 07 July 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Email Computer Workplace Tips Phishing Hosted Solutions IT Services Users Collaboration Mobile Device Workplace Strategy Ransomware Quick Tips Small Business Cybersecurity Microsoft Communication Passwords Data Backup Saving Money Smartphone Backup Managed Service Android Business Management VoIP Smartphones Mobile Devices communications Upgrade Disaster Recovery Browser Social Media Data Recovery Managed IT Services Microsoft Office Windows Current Events Productivity Remote Network Tech Term Internet of Things Facebook Automation AI Artificial Intelligence Holiday Gadgets Cloud Computing Covid-19 Remote Work Miscellaneous Server Managed Service Provider Outsourced IT Information Training Employee/Employer Relationship Encryption Spam Compliance Windows 10 Office Data Management Business Continuity Government Bandwidth Virtualization Business Technology Wi-Fi Blockchain IT Support Windows 10 Vendor Apps Two-factor Authentication Data Security Mobile Office Gmail Budget Apple App Employer-Employee Relationship Managed Services Voice over Internet Protocol Networking Mobile Device Management Chrome BYOD Applications WiFi Access Control Tip of the week Conferencing Computing Hacker Information Technology How To Avoiding Downtime BDR Marketing Office 365 HIPAA Router Storage Virtual Private Network Password Bring Your Own Device Big Data Health Help Desk Retail Operating System Healthcare Computers Managed IT Services Risk Management Website Analytics Office Tips Augmented Reality Physical Security Display The Internet of Things Printer Paperless Office Windows 11 Infrastructure Monitoring 2FA Social Excel Document Management Going Green Remote Workers Customer Service Telephone Cybercrime Scam Data loss Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Firewall VPN Employees Meetings Integration Safety Sports User Tip Modem Mouse Computer Repair Mobile Security Processor Holidays Administration Data Storage Smart Technology Supply Chain Video Conferencing Machine Learning Managed Services Provider Professional Services Saving Time Virtual Machines Customer Relationship Management Settings Managed IT Service Wireless Printing Maintenance Content Filtering Antivirus Hacking Downloads iPhone YouTube Presentation Licensing Cryptocurrency Vulnerabilities Entertainment Wireless Technology Data Privacy Virtual Desktop Images 101 Data storage LiFi Telephone System Multi-Factor Authentication Robot Mobility Word Cost Management Outlook Money IT Management Humor Scary Stories Trend Micro Hacks Network Congestion Specifications Security Cameras Workplace Strategies Entrepreneur Fraud Meta Fun User Error Microchip Internet Exlporer Software as a Service Username Managing Costs Amazon Deep Learning Point of Sale eCommerce Undo Black Friday SSID Virtual Assistant Outsource IT Education Database Surveillance Network Management Tech Support IT Technicians Virtual Machine Environment Media Proxy Server Reviews Cookies Mobile Computing Monitors Cyber Monday Medical IT Tactics Development Hotspot Transportation Small Businesses Search Websites Mirgation Hypervisor Displays Application Best Practice PowerPoint Buisness Shopping Nanotechnology Optimization Addiction IBM Legal Electronic Medical Records Language Employer/Employee Relationships Outsourcing IT solutions SharePoint Management PCI DSS Chatbots Business Growth Navigation Writing Distributed Denial of Service Workplace Lenovo Gig Economy Screen Reader Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Cortana Server Management Regulations Compliance Private Cloud Identity Alt Codes Evernote Paperless Co-managed IT Downtime Superfish Bookmark Identity Theft Smart Tech Memes Competition Download Net Neutrality Twitter Alerts SQL Server Technology Care Hosted Solution Financial Data Error History Typing Business Communications Social Engineering Break Fix Scams Browsers Smartwatch Connectivity IT Upload Procurement Google Drive Remote Computing Azure Hybrid Work User Knowledge Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables 5G CES Tablet IoT Communitications Trends Supply Chain Management IP Address Google Docs Alert Unified Communications Experience Managed IT Customer Resource management FinTech File Sharing Regulations Bitcoin Dark Data Google Calendar Term Google Apps Running Cable How To Microsoft Excel IT Maintenance Data Analysis Star Wars IT Assessment Google Wallet Gamification Flexibility Notifications Staff Value Business Intelligence Recovery Organization Travel Social Networking Hard Drives Windows 8 Legislation Shortcuts Laptop Ransmoware Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Domains Drones Content Remote Working Wearable Technology Memory Vendors Health IT Unified Threat Management Motherboard Data Breach Refrigeration Comparison Google Play Be Proactive Halloween Permissions Workforce Unified Threat Management Directions Videos Assessment Electronic Health Records Public Speaking Lithium-ion battery Wasting Time Threats

Blog Archive