McAfee Mobile Research Team discovered new Android malware campaigns abusing .NET MAUI to evade detection by disguising as legitimate apps and stealing sensitive information.
Microsoft introduced .NET MAUI as a replacement for Xamarin, expanding platform support and introducing performance optimizations.
Recent Android malware campaigns developed using .NET MAUI hide their core functionalities in blob binaries, evading traditional detection methods.
Two Android malware campaigns using .NET MAUI disguise as legitimate services to steal user data, posing significant risks to mobile security.
McAfee Mobile Security detects these apps as Android/FakeApp and recommends users to avoid clicking untrusted links to stay protected.
The malware apps employ techniques like multi-stage loading, encrypted communications, excessive obfuscation, and manipulating AndroidManifest.xml.
One malware masquerades as a fake IndusInd Bank app targeting Indian users to collect and transmit sensitive user data to the attacker’s server.
Another malware targets Chinese-speaking users, using multi-stage loading and encrypted socket communication to steal contacts, SMS messages, and photos.
Users are advised to be cautious when downloading from unofficial sources and keep security software up to date to protect against evolving cyber threats.
The emergence of multiple variants using similar techniques indicates the increasing prevalence of .NET MAUI-based malware, necessitating enhanced device protection.