Necro trojan is a form of malware that primarily targets Android devices, and is distributed through applications on the Google Play store and other third-party application extensions. This trojan infects devices and then executes commands that launch invisible ads that link to malware downloaders, installs malicious third-party apps, and even subscribes users to costly paid services.
Necro trojan first emerged in late 2018, with several high-profile applications containing Necro doppers throughout 2019. Some modified applications, like WhatsApp add-ons, that were distributed by unofficial sources were the original carriers of this form of malware.
However, over the past few years, the Necro trojan has continued to evolve…
Part of what makes Necro trojan so difficult to trace and prevent is that hackers have been able to put their malware inside extremely popular apps.
For example, one application called Wuta Camera, which was a photo retouching app with over 10 million downloads, was infected with Necro Trojan without the owners’ knowledge.
The trojan was only recently patched out of this app, but users who still have an older version on their devices could still have an infected device. Many applications with millions of downloads have seen similar hacks in the past. So, you should be extremely careful with applications you download on the Google Play store.
Even back in 2019, the first clues that this was going to be a primary distribution method began to come to light.
The widely popular application CamScanner, which has over 100 million downloads on the Google Play store, was infected with this particular trojan.
Another recent download tactic has been to send out phishing emails and launch advertisements that ask users to download a ‘Pro’ or ‘Premier’ version of a certain application. One example of this was ‘Spotify Plus,’ a fake version of the popular Spotify application.
In late 2024, it was reported that upwards of 11 million Android devices were infected with Necro trojan.
Once the Necro trojan enters a device, it’ll begin to execute payloads depending on that specific stain and its target. There are many potential outcomes for a device that is infected with Necro trojan without the user’s knowledge:
Although trojans are a difficult form of malware due to their clandestine nature, there are several strategies that you can employ to protect themselves and prevent trojans from downloading to their devices.
Here are some of the top strategies to employ to defend against trojans:
Malicious software, especially those that fly under the radar like trojans, are extremely dangerous. Beyond just having financial repercussions, they could systematically:
For any business devices, failing to cover these endpoints could be the first error that leads to a widespread breach. Check Point Harmony Mobile Protection offers full mobile security, delivering complete protection for mobile devices and defending against malware threats like Necro trojan.
With complete protection and easy adoption, businesses can secure their mobile endpoints against malware and phishing attempts while maintaining their privacy. Get started today by requesting a demo.