SecuriDropper       , a newly discovered dropper-as-a-service (DaaS) for Android   , exploits a vulnerability in Android’s “Restricted Settings” feature, enabling it to bypass Google’s security measures and deliver malware.
SecuriDropper disguises itself as a harmless app    , such as a Google app or an Android update , and uses a different Android API to install a payload on compromised devices   . It mimics the process used by marketplaces   , allowing it to request permissions to read and write data to external storage , as well as install and delete packages . The malicious payload    , which includes Android banking trojans like SpyNote and ERMAC , can then be distributed through deceptive websites and third-party platforms . Another dropper service called Zombinder has also been observed offering a similar bypass for Restricted Settings . Despite Android users having control over app permissions, SecuriDropper is able to bypass these security measures.
To combat these threats, Google Play Protect is designed to block apps known for exhibiting malicious behavior . However, it is worth noting that this method of bypassing Restricted Settings is still present in Android 14, making SecuriDropper the first known case of this technique being used in cybercrime operations targeting Android users . This highlights the need for ongoing efforts to enhance Android’s security measures and develop effective countermeasures against such attacks.