Fake Banking And Social Apps Steal User Data Using .NET MAUI

Image by Kelli McClintock, from Unsplash

Fake Banking And Social Apps Steal User Data Using .NET MAUI

Reading time: 2 min

Android malware spread through new cybercriminal tactics now utilizes Microsoft’s .NET MAUI framework.

In a rush? Here are the quick facts:

  • Malicious apps steal banking details and personal data from users.
  • Multi-stage encryption helps malware evade security scans.
  • Malware spreads through unofficial app stores and phishing links.

The McAfee Mobile Research Team discovered malware attacks that utilize .NET MAUI to evade detection systems which allows deceptive malicious applications to extract user information.

The .NET MAUI framework from Microsoft functions as a replacement for Xamarin to let developers build cross-platform applications that work on Android and iOS systems as well as Windows and macOS platforms.

The replacement technology serves as a tool for criminals who hide their malicious code inside encrypted files which makes detection by antivirus systems challenging.

The research team identified two separate malware campaigns that used .NET MAUI to disguise themselves as a banking application and a social media platform.

The fake banking application directed users from India to provide personal and financial information when they launched the program. Attackers operate a server that receives the sensitive information collected from victims.

The malware remains undetectable by traditional security tools because its harmful code exists within hidden files instead of standard Android components.

The second malware disguises itself as a social media application to deceive users who speak Chinese. The system uses complex multi-layer encryption, which protects its malicious activities and conceals its actual harmful functions.

This malware steals contacts, messages, and photos without alerting security scanners while performing its operations. The malware manipulates Android permission files to fool security scanners, and it encrypts stolen data before attackers can retrieve it.

The malware variants stay undiscovered for extended periods because of their advanced evasion techniques. Security tools become disoriented by excessive obfuscation, such as manipulating permission settings with meaningless code, which confuses security tools and disrupts analysis.

In light of these findings, people who want to avoid becoming victims should exercise extreme caution when downloading mobile applications from unknown sources.

Did you like this article? Rate it!
I hated it I don't really like it It was ok Pretty good! Loved it!

We're thrilled you enjoyed our work!

As a valued reader, would you mind giving us a shoutout on Trustpilot? It's quick and means the world to us. Thank you for being amazing!

Rate us on Trustpilot
5.00 Voted by 2 users
Title
Comment
Thanks for your feedback
Loader
Please wait 5 minutes before posting another comment.
Comment sent for approval.

Leave a Comment

Loader
Loader Show more...