A brand new Android malware named ‘FireScam’ is being distributed as a premium model of the Telegram app through phishing web sites on GitHub that mimick the RuStore, Russia’s app marketplace for cellular gadgets.
RuStore launched in Could 2022 by the Russian web group VK (VKontakte) as a substitute for Google Play and Apple’s App Retailer, following Western sanctions that impacted Russian customers’ entry to cellular software program.
It hosts apps which might be compliant with Russian laws and it was created with the assist of the Russian Ministry of Digital Growth.
Based on researchers at menace administration firm Cyfirma, the malicious GitHub web page mimicking RuStore first delivers a dropper module known as GetAppsRu.apk.
The dropper APK is obfuscated utilizing DexGuard to evade detection and acquires permissions that permit it to determine put in apps, provides it entry to the machine’s storage, and set up further packages.
Subsequent, it extracts and installs the primary malware payload, ‘Telegram Premium.apk’, which requests permissions to observe notifications, clipboard knowledge, SMS, and telephony providers, amongst others.

Supply: CYFIRMA
FireScam capabilities
Upon execution, a misleading WebView display exhibiting a Telegram login web page steals the consumer’s credentials for the messaging service.
FireScam establishes communication with a Firebase Realtime Database the place it uploads stolen knowledge in real-time and registers the compromised machine with distinctive identifiers, for monitoring functions.
Cyfirma reviews that stolen knowledge is simply saved within the database quickly after which wiped, presumably after the menace actors filtered it for beneficial info and copied it to a unique location.
The malware additionally opens a persistent WebSocket reference to the Firebase C2 endpoint for real-time command execution like requesting particular knowledge, triggering speedy uploads to the Firebase database, downloading and executing further payloads, or adjusting the surveillance parameters.
FireScam may also monitor modifications within the display exercise, capturing on/off occasions and log the lively app on the time in addition to exercise knowledge for occasions lasting for greater than 1,000 milliseconds.
The malware additionally meticulously displays any e-commerce transactions, making an attempt to seize delicate monetary knowledge.
Something the consumer varieties, drags and drops, copies to clipboard, and intercepts even knowledge routinely crammed from password managers or exchanges between apps, categorized, and exfiltrated to the menace actors.

Supply: CYFIRMA
Though Cyfirma doesn’t have any hints pointing to FireScam’s operators, the researchers say that the malware is a “subtle and multifaceted menace” that “employs superior evasion methods.”
The corporate recommends customers to execute warning when opening recordsdata from doubtlessly untrusted sources or when clicking on unfamiliar hyperlinks.