• lemmyng@lemmy.ca
    link
    fedilink
    English
    arrow-up
    6
    ·
    7 months ago

    Not sure what you are talking about. Paragraph 1 has

    The malware is delivered through a fake Google Chrome update that is shown while using the web browser.

    and the article makes it pretty clear after that that the user is tricked into installing the fake apk.

    • Lojcs@lemm.ee
      link
      fedilink
      English
      arrow-up
      6
      ·
      7 months ago

      That’s an incredibly vague statement that’d lead most people to think they’re fucked if they so much as open a site that says to update chrome.

      Unless it’s using some unmentioned exploit, the user in question needs to:

      1. Download the ‘update’ from their browser instead of play store
      2. Ignore the dangerous download warning chromium browsers show
      3. Run the download
      4. Enable installing apk from their browser / file manager
      5. Ignore that the prompt says ‘install’ and not ‘update’
      6. Ignore the play protect unknown app warning (or dangerous app warning if it recognizes the malware)
      7. Find and enable the accessibility service for the malware
      8. Ignore the accessibility warning
      9. Enable all the other permissions or disable settings app accessibility protection

      Unless the app is circumventing the above steps, much more than just a “fake Google Chrome update that is shown while using the web browser.” is needed to get infected. Not specifying if this is just an ordinary app with malicious intentions or if it actually uses exploits to achieve what normally can’t be is misleading.