Description

K7 Computing researchers have uncovered a malicious Android campaign that exploits the name of the Indian government scheme "PM KISAN YOJNA" to spread stealer malware. The attackers have launched a fake application designed to mimic an official app associated with the PM-Kisan Samman Nidhi scheme. On installation, the malware utilizes a multi-stage dropper strategy, first installing a camouflaged application and then quietly loading a second-stage payload named `decrypted_app.apk`. The payload extracts confidential user information like names, Aadhaar and PAN card numbers, mobile numbers, and dates of birth. It also gains VPN permissions as well as permission to install other applications, gaining control over network traffic and further malicious activity. This attack goes beyond typical Android malware by incorporating advanced evasion tactics. The dropper is crafted specifically to evade static analysis tools like Apktool and Jadx. It has emulator detection, root access detection, and detection of Frida to prevent analysis in sandboxed or reverse-engineering contexts. The application also induces users to install a spoofed update, which requests additional permissions. Once activated, the malware hides its icon and copies the legitimate PM-Kisan app so that it is harder for users to spot the threat. It also exfiltrates SMS messages to a command-and-control (C2) server, but researchers found the C2 server to be inactive when conducting research. To avoid being victims of such attacks, users need to download applications only from established stores such as Google Play and verify app data such as developer name and user ratings. Security software needs to be updated, and application permissions need to be thoroughly examined prior to granting them. Public awareness also needs to be created by government agencies so that dummy apps that imitate genuine programs are not spread.