Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
AI-Based Obfuscated Malicious Apps Evading AV Detection to Deploy Malicious Payload

AI-Based Obfuscated Malicious Apps Evading AV Detection to Deploy Malicious Payload

Posted on November 21, 2025November 21, 2025 By CWS

A brand new wave of malicious Android purposes impersonating a widely known Korean supply service has emerged, that includes superior obfuscation strategies powered by synthetic intelligence.

These apps work to bypass conventional antivirus detection strategies whereas extracting delicate consumer info.

The risk actors behind this marketing campaign have demonstrated subtle information of cell safety vulnerabilities, combining a number of evasion methods to take care of their operation undetected.

The malware marketing campaign depends on a intelligent supply mechanism that disguises itself as a reliable bundle monitoring software.

When customers grant the mandatory permissions, the app shows an interface resembling the actual supply service by connecting to genuine monitoring web sites utilizing randomly generated monitoring numbers.

Metadata of the malicious app (Supply – ASEC)

This social engineering strategy builds belief whereas the applying performs malicious actions within the background, making it significantly harmful for unsuspecting victims.

ASEC safety analysts recognized this malware after detecting repeated distribution patterns throughout varied channels.

The investigation revealed that risk actors utilized AI-enhanced obfuscation strategies to disguise the app’s performance and make reverse engineering considerably harder for safety researchers.

Detection Evasion Via Clever Obfuscation

The technical sophistication of those purposes lies of their obfuscation implementation. The builders utilized AI-powered ProGuard obfuscation, changing all class names, operate identifiers, and variable names into meaningless eight-character Korean textual content strings.

This strategy differs from customary obfuscation as a result of the random Korean characters make pattern-based detection considerably more durable for automated safety instruments.

Permission request (Supply – ASEC)

The useful resource names remained unmodified, indicating a selective obfuscation technique designed particularly to cover the app’s core performance whereas sustaining sufficient structural integrity for it to function usually.

Safety researchers found that after amassing info from contaminated units, the malware exfiltrates information by means of breached reliable web sites repurposed as command-and-control servers.

The risk actors hardcoded C2 server addresses inside blogs hosted on Korean portals, loading them dynamically when the applying launches.

This method creates a further detection barrier as a result of the precise malicious servers seem as benign net site visitors to community monitoring techniques, successfully hiding the info theft operation from safety infrastructure.

The recognized samples included 5 confirmed MD5 hashes, with related URLs pointing to compromised Korean domains used for information exfiltration.

Safety professionals ought to prioritize detecting and blocking these samples throughout their networks whereas implementing stricter software permission controls for supply service apps.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:AIBased, Apps, Deploy, Detection, Evading, Malicious, Obfuscated, Payload

Post navigation

Previous Post: Xillen Stealer With New Advanced Features Evade AI Detection and Steal Sensitive Data from Password Managers
Next Post: Phishing Breaks More Defenses Than Ever. Here’s the Fix 

Related Posts

Critical ScreenConnect Vulnerability Let Attackers Expose Sensitive Configuration Data Critical ScreenConnect Vulnerability Let Attackers Expose Sensitive Configuration Data Cyber Security News
Apache StreamPark Vulnerability Let Attackers Access Sensitive Data Apache StreamPark Vulnerability Let Attackers Access Sensitive Data Cyber Security News
New Android Malware GhostSpy Let Attacker Take Full Control Over Infected Devices New Android Malware GhostSpy Let Attacker Take Full Control Over Infected Devices Cyber Security News
Identity and Access Management Trends Shaping 2025 Identity and Access Management Trends Shaping 2025 Cyber Security News
SpyCloud Unveils Top 10 Cybersecurity Predictions Poised to Disrupt Identity Security in 2026 SpyCloud Unveils Top 10 Cybersecurity Predictions Poised to Disrupt Identity Security in 2026 Cyber Security News
UK Government Sets Timeline to Replace Passwords With Passkeys UK Government Sets Timeline to Replace Passwords With Passkeys Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News