Tuesday, September 16, 2025

Researchers Discovered Malicious Android Apps Exploiting .NET MAUI


The menace actors concentrating on Android customers now make use of a brand new approach to remain beneath the radar. As caught lately, quite a few malicious Android apps now exploit Microsoft’s .NET MAUI framework to evade detection.

Quite a few Malicious Android Apps Exploit .NET MAUI To Unfold Malware

In line with a current report from the McAfee Cell Analysis Group, a brand new malware marketing campaign is energetic within the wild, using a novel method to keep away from detection. Particularly, the researchers noticed a number of malicious Android functions spreading malware by exploiting Microsoft’s .NET MAUI framework.

Microsoft launched .NET MAUI, a C#-based utility improvement framework, instead to Xamarin after noticing the latter’s abuse in malicious campaigns. The brand new .NET MAUI additionally garnered consideration because it supplied help past Android, to Home windows and macOS app improvement as effectively.

Nonetheless, it now appears this handy framework has additionally attracted the eye of unhealthy actors because it will get exploited.

As defined within the put up, the attackers exploit the .NET MAUI’s packer-like performance. Often, most Android functions retailer their core functionalities in DEX information or native libraries. Nonetheless, the .NET MAUI permits C#-based apps to retailer their core functionalities as blob binaries. Since most antivirus options usually scan DEX information to detect malware, apps developed utilizing .NET MAUI seemingly stay unchecked. Therefore, any malicious apps developed this fashion can run the embedded malware on a tool with out alerting the antivirus answer.

In addition to exploiting Microsoft’s framework, the malware additionally employs multi-stage dynamic loading of the ultimate payload. Furthermore, it encrypts its C&C communication to flee visitors scanning.

Malware Abuses Varied App Niches To Goal Customers

The researchers noticed these malicious apps concentrating on Android customers by means of unofficial app shops. The menace actors might lure the customers into downloading the malware by way of phishing assaults, mimicking authentic functions.

As examples, the researchers talked about two completely different functions distributing malware on this marketing campaign. The primary features a faux Indian banking app posing because the IndusInd Financial institution app. As soon as downloaded and put in on a tool, the app asks the person to enter private particulars and banking info. The malware working behind the app then transmits all collected info to the attackers’ C&C with out elevating alerts.

One other instance features a faux social networking app, SNS, mimicking common providers like X (previously Twitter). This app particularly targets Chinese language customers who usually go to unofficial app shops to obtain apps for restricted platforms like X.

As well as, the current malicious marketing campaign additionally mimics a number of different functions, like relationship apps, increasing its goal radius.

Stick To Official Sources to Keep away from Malware

Given the extremely evasive strategies the brand new malware employs, customers should stay as cautious as attainable when downloading apps. Since a lot of the malicious apps from this marketing campaign unfold by way of unofficial shops, customers ought to ideally stick with downloading apps from the official app shops solely.

For repressive areas like China with restricted entry to official app shops, customers might contemplate visiting the official web sites by way of workarounds like proxies/VPNs to obtain authentic functions.

Furthermore, equipping the units with the most recent variations of trusted antivirus options also can assist stop quite a few malware threats.

Tell us your ideas within the feedback.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

PHP Code Snippets Powered By : XYZScripts.com