{"id":580,"date":"2025-03-27T20:05:01","date_gmt":"2025-03-27T20:05:01","guid":{"rendered":"https:\/\/www.techrepublic.com\/?p=4300153"},"modified":"2025-03-27T20:05:01","modified_gmt":"2025-03-27T20:05:01","slug":"android-malware-exploits-a-microsoft-related-security-blind-spot-to-avoid-detection","status":"publish","type":"post","link":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/27\/android-malware-exploits-a-microsoft-related-security-blind-spot-to-avoid-detection\/","title":{"rendered":"Android Malware Exploits a Microsoft-Related Security Blind Spot to Avoid Detection"},"content":{"rendered":"<figure id=\"attachment_4300154\" aria-describedby=\"caption-attachment-4300154\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-4300154 size-article-md\" src=\"https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/motorola-amz-mar-25-1-370x478.jpg\" alt=\"Motorola Moto G Power 5G.\" width=\"370\" height=\"478\" srcset=\"https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/motorola-amz-mar-25-1-370x478.jpg 370w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/motorola-amz-mar-25-1-232x300.jpg 232w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/motorola-amz-mar-25-1-39x50.jpg 39w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/motorola-amz-mar-25-1-270x349.jpg 270w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/motorola-amz-mar-25-1-540x698.jpg 540w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/motorola-amz-mar-25-1.jpg 696w\" sizes=\"auto, (max-width: 370px) 100vw, 370px\"><figcaption id=\"caption-attachment-4300154\" class=\"wp-caption-text\">This Motorola Moto G Power 5G shows the midnight blue color option. Image: Amazon<\/figcaption><\/figure>\n<p>New Android malware is using Microsoft\u2019s .NET MAUI to fly under the radar in a new cybersecurity dust-up this week. Disguised as actual services such as banking and social media apps targeting Indian and Chinese-speaking users, the malware is designed to gain access to sensitive information.<\/p>\n<p>Cybersecurity experts with McAfee\u2019s Mobile Research Team say that, while the threat is currently aimed at China and India, other cybercriminal groups could easily adopt the same method to target a broader audience.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"NET_MAUIs_hidden_danger_Bypassing_security\"><\/span>.NET MAUI\u2019s hidden danger: Bypassing security<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Microsoft launched .NET MAUI in 2022, a framework that lets developers build apps for both desktops and phones using C#, replacing the now retired Xamarin tool. The intent of .NET MAUI was to make it easier to create apps that work across different platforms.<\/p>\n<p>Typically, Android apps are built with Java or Kotlin, and their code is stored in a format called DEX (Dalvik Executable); Android security systems are designed to scan these DEX files for anything weird-looking. However, .NET MAUI allows developers to build Android apps with C#, and in this case, the app\u2019s code ends up in binary \u201cblob\u201d files.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Malwares_evolving_tactics_The_blob_advantage\"><\/span>Malware\u2019s evolving tactics: The blob advantage<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>These Binary Large Object or \u201cblob\u201d files are essentially raw chunks of data that do not necessarily follow any standard file structure. The issue here is that many current Android security tools \u2014 built to analyze DEX files \u2014 do not inspect the inner contents of these blob files; this creates a significant security blind spot, as malware can be quietly embedded inside these blobs.<\/p>\n<p>For cybercriminals, embedding malicious code from the outset is far more effective than waiting to deploy it through an update. The \u2018blob\u2019 format enables this kind of stealthy, immediate attack.<\/p>\n<p>\u201cWith these evasion techniques, the threats can remain hidden for long periods, making analysis and detection significantly more challenging,\u201d <a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-android-malware-campaigns-evading-detection-using-cross-platform-framework-net-maui\/\" target=\"_blank\" rel=\"noopener\">warns McAfee<\/a> in its blog post on the subject. \u201cFurthermore, the discovery of multiple variants using the same core techniques suggests that this type of malware is becoming increasingly common.\u201d<\/p>\n<p><strong>SEE: <a href=\"https:\/\/www.techrepublic.com\/article\/news-fbi-document-converters-malware-scam\/\">Scam Alert: FBI \u2018Increasingly Seeing\u2019 Malware Distributed In Document Converters<\/a><\/strong><\/p>\n<aside class=\"pinbox right\">\n<h3 class=\"heading\">Mobility must-reads<\/h3>\n<\/aside>\n<h2><span class=\"ez-toc-section\" id=\"Protecting_your_device_Security_researchers_advice\"><\/span>Protecting your device: Security researchers\u2019 advice<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>It\u2019s always important to be careful where you get your apps from, especially if you\u2019re not using the official app stores. McAfee researchers have found that \u201c\u2026these platforms are often exploited by attackers to distribute malware. This is especially concerning in countries like China, where access to official app stores is restricted, making users more vulnerable to such threats.\u201d<\/p>\n<p>To deal with how quickly cybercriminals come up with new tricks, McAfee strongly suggests that users \u201cinstall security software on their devices and keep it up to date at all times.\u201d Basically, staying alert and having good security in place are the baseline measures to stay safe from new threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This Motorola Moto G Power 5G shows the midnight blue color option. Image: Amazon New Android malware is using Microsoft\u2019s .NET MAUI to fly under the radar in a new cybersecurity dust-up this week. Disguised as actual services such as banking and social media apps targeting Indian and Chinese-speaking users, the malware is designed to [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":581,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-580","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Android Malware Exploits a Microsoft-Related Security Blind Spot to Avoid Detection - TecnoArtesanos Tech Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/27\/android-malware-exploits-a-microsoft-related-security-blind-spot-to-avoid-detection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Android Malware Exploits a Microsoft-Related Security Blind Spot to Avoid Detection - TecnoArtesanos Tech Blog\" \/>\n<meta property=\"og:description\" content=\"This Motorola Moto G Power 5G shows the midnight blue color option. Image: Amazon New Android malware is using Microsoft\u2019s .NET MAUI to fly under the radar in a new cybersecurity dust-up this week. Disguised as actual services such as banking and social media apps targeting Indian and Chinese-speaking users, the malware is designed to [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/27\/android-malware-exploits-a-microsoft-related-security-blind-spot-to-avoid-detection\/\" \/>\n<meta property=\"og:site_name\" content=\"TecnoArtesanos Tech Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-27T20:05:01+00:00\" \/>\n<meta name=\"author\" content=\"Sergio Morales\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sergio Morales\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/27\/android-malware-exploits-a-microsoft-related-security-blind-spot-to-avoid-detection\/\",\"url\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/27\/android-malware-exploits-a-microsoft-related-security-blind-spot-to-avoid-detection\/\",\"name\":\"Android Malware Exploits a Microsoft-Related Security Blind Spot to Avoid Detection - TecnoArtesanos Tech Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/27\/android-malware-exploits-a-microsoft-related-security-blind-spot-to-avoid-detection\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/27\/android-malware-exploits-a-microsoft-related-security-blind-spot-to-avoid-detection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/android-malware-exploits-a-microsoft-related-security-blind-spot-to-avoid-detection.jpg\",\"datePublished\":\"2025-03-27T20:05:01+00:00\",\"author\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/ec88bc1410fd158963717c4216f04807\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/27\/android-malware-exploits-a-microsoft-related-security-blind-spot-to-avoid-detection\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/27\/android-malware-exploits-a-microsoft-related-security-blind-spot-to-avoid-detection\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/27\/android-malware-exploits-a-microsoft-related-security-blind-spot-to-avoid-detection\/#primaryimage\",\"url\":\"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/android-malware-exploits-a-microsoft-related-security-blind-spot-to-avoid-detection.jpg\",\"contentUrl\":\"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/android-malware-exploits-a-microsoft-related-security-blind-spot-to-avoid-detection.jpg\",\"width\":370,\"height\":478},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/27\/android-malware-exploits-a-microsoft-related-security-blind-spot-to-avoid-detection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.tecnoartesanos.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Android Malware Exploits a Microsoft-Related Security Blind Spot to Avoid Detection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#website\",\"url\":\"https:\/\/blog.tecnoartesanos.com\/\",\"name\":\"TecnoArtesanos Tech Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.tecnoartesanos.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/ec88bc1410fd158963717c4216f04807\",\"name\":\"Sergio Morales\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3d45178fc8fbbe32d39278bc504fa9093f947f406ff4f1ddcfa27505ab772184?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3d45178fc8fbbe32d39278bc504fa9093f947f406ff4f1ddcfa27505ab772184?s=96&d=mm&r=g\",\"caption\":\"Sergio Morales\"},\"sameAs\":[\"https:\/\/sergiomorales.space\"],\"url\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/author\/sergiomorales\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Android Malware Exploits a Microsoft-Related Security Blind Spot to Avoid Detection - TecnoArtesanos Tech Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/27\/android-malware-exploits-a-microsoft-related-security-blind-spot-to-avoid-detection\/","og_locale":"en_US","og_type":"article","og_title":"Android Malware Exploits a Microsoft-Related Security Blind Spot to Avoid Detection - TecnoArtesanos Tech Blog","og_description":"This Motorola Moto G Power 5G shows the midnight blue color option. Image: Amazon New Android malware is using Microsoft\u2019s .NET MAUI to fly under the radar in a new cybersecurity dust-up this week. Disguised as actual services such as banking and social media apps targeting Indian and Chinese-speaking users, the malware is designed to [&hellip;]","og_url":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/27\/android-malware-exploits-a-microsoft-related-security-blind-spot-to-avoid-detection\/","og_site_name":"TecnoArtesanos Tech Blog","article_published_time":"2025-03-27T20:05:01+00:00","author":"Sergio Morales","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sergio Morales","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/27\/android-malware-exploits-a-microsoft-related-security-blind-spot-to-avoid-detection\/","url":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/27\/android-malware-exploits-a-microsoft-related-security-blind-spot-to-avoid-detection\/","name":"Android Malware Exploits a Microsoft-Related Security Blind Spot to Avoid Detection - TecnoArtesanos Tech Blog","isPartOf":{"@id":"https:\/\/blog.tecnoartesanos.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/27\/android-malware-exploits-a-microsoft-related-security-blind-spot-to-avoid-detection\/#primaryimage"},"image":{"@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/27\/android-malware-exploits-a-microsoft-related-security-blind-spot-to-avoid-detection\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/android-malware-exploits-a-microsoft-related-security-blind-spot-to-avoid-detection.jpg","datePublished":"2025-03-27T20:05:01+00:00","author":{"@id":"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/ec88bc1410fd158963717c4216f04807"},"breadcrumb":{"@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/27\/android-malware-exploits-a-microsoft-related-security-blind-spot-to-avoid-detection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/27\/android-malware-exploits-a-microsoft-related-security-blind-spot-to-avoid-detection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/27\/android-malware-exploits-a-microsoft-related-security-blind-spot-to-avoid-detection\/#primaryimage","url":"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/android-malware-exploits-a-microsoft-related-security-blind-spot-to-avoid-detection.jpg","contentUrl":"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/android-malware-exploits-a-microsoft-related-security-blind-spot-to-avoid-detection.jpg","width":370,"height":478},{"@type":"BreadcrumbList","@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/27\/android-malware-exploits-a-microsoft-related-security-blind-spot-to-avoid-detection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.tecnoartesanos.com\/"},{"@type":"ListItem","position":2,"name":"Android Malware Exploits a Microsoft-Related Security Blind Spot to Avoid Detection"}]},{"@type":"WebSite","@id":"https:\/\/blog.tecnoartesanos.com\/#website","url":"https:\/\/blog.tecnoartesanos.com\/","name":"TecnoArtesanos Tech Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.tecnoartesanos.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/ec88bc1410fd158963717c4216f04807","name":"Sergio Morales","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3d45178fc8fbbe32d39278bc504fa9093f947f406ff4f1ddcfa27505ab772184?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3d45178fc8fbbe32d39278bc504fa9093f947f406ff4f1ddcfa27505ab772184?s=96&d=mm&r=g","caption":"Sergio Morales"},"sameAs":["https:\/\/sergiomorales.space"],"url":"https:\/\/blog.tecnoartesanos.com\/index.php\/author\/sergiomorales\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/posts\/580","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/comments?post=580"}],"version-history":[{"count":0,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/posts\/580\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/media\/581"}],"wp:attachment":[{"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/media?parent=580"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/categories?post=580"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/tags?post=580"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}