{"id":17718,"date":"2020-02-12T11:10:13","date_gmt":"2020-02-12T19:10:13","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2020\/02\/12\/news-11453\/"},"modified":"2020-02-12T11:10:13","modified_gmt":"2020-02-12T19:10:13","slug":"news-11453","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/02\/12\/news-11453\/","title":{"rendered":"Android Trojan xHelper uses persistent re-infection tactics: here&#8217;s how to remove"},"content":{"rendered":"<p><strong>Credit to Author: Nathan Collier| Date: Wed, 12 Feb 2020 18:15:59 +0000<\/strong><\/p>\n<p>We first stumbled upon the nasty Android Trojan xHelper, <a href=\"https:\/\/blog.malwarebytes.com\/detections\/android-trojan-dropper-xhelper\/\">a stealthy malware dropper<\/a>, in May 2019.&nbsp;By mid-summer 2019, xHelper was topping our detection charts\u2014so <a rel=\"noreferrer noopener\" aria-label=\"we wrote an article about it (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/android\/2019\/08\/mobile-menace-monday-android-trojan-raises-xhelper\/\" target=\"_blank\">we wrote an article about it<\/a>.&nbsp;After the blog, we thought the case was closed on xHelper.&nbsp;Then a tech savvy user reached out to us in early January 2020 on the <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/forums.malwarebytes.com\/\" target=\"_blank\">Malwarebytes support forum<\/a>:<\/p>\n<p><em>\u201cI have a phone that is infected with the xhelper virus. This tenacious pain just keeps coming back.\u201d<\/em><\/p>\n<p><em>\u201cI&#8217;m fairly technically inclined so I&#8217;m comfortable with common prompt or anything else I may need to do to make this thing go away so the phone is actually usable!\u201d <\/em><\/p>\n<p><em>\u2014 <\/em>forum user<em> misspaperwait, <\/em>Amelia<\/p>\n<p>Indeed, she was infected with xHelper.&nbsp;Furthermore, <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=org.malwarebytes.antimalware\" target=\"_blank\">Malwarebytes<\/a><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=org.malwarebytes.antimalware\"> for Android<\/a> had already successfully removed two variants of xHelper and a Trojan agent from her mobile device.&nbsp;The problem was, it kept coming back within an hour of removal.&nbsp;xHelper was re-infecting over and over again.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" data-attachment-id=\"42326\" data-permalink=\"https:\/\/blog.malwarebytes.com\/android\/2020\/02\/new-variant-of-android-trojan-xhelper-reinfects-with-help-from-google-play\/attachment\/1-61\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/1-scaled.jpeg\" data-orig-size=\"1920,2560\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"1\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/1-225x300.jpeg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/1-450x600.jpeg\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/1-450x600.jpeg\" alt=\"\" class=\"wp-image-42326\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/1-450x600.jpeg 450w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/1-225x300.jpeg 225w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/1-1152x1536.jpeg 1152w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/1-1536x2048.jpeg 1536w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/1-scaled.jpeg 1920w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><figcaption>Photo provided by Amelia<\/figcaption><\/figure>\n<\/div>\n<p>If it wasn\u2019t for the expertise and persistence of forum patron Amelia, we couldn\u2019t have figured this out.&nbsp;She has graciously has allowed us to share her journey.&nbsp;<\/p>\n<h2>All the fails<\/h2>\n<p>Before we share the culprit behind this xHelper re-infection, I&#8217;d like to highlight the tactics we used to investigate the situation, including the many dead ends we hit prior to figuring out the end game. By showing the roadblocks we encountered, we demonstrate the thought process and complexity behind removing malware so that others may use it as a guide.&nbsp;<\/p>\n<h4>Clean slate<\/h4>\n<p>First off, Amelia was clever enough to do a factory reset before reaching out to us.&nbsp;Unfortunately, it didn\u2019t resolve the issue, though it did give us a clean slate to work with.&nbsp;No other apps (besides those that came with the phones) were installed besides Malwarebytes for Android,&nbsp;thus, we could rule out an infection by prior installs (or so we thought).  <\/p>\n<p>We also ruled out any of the malware having device admin rights, which would have prevented our ability to uninstall malicious apps.&nbsp;In addition, we cleared all history and cache on Amelia&#8217;s browsers, in case of a browser-based threat, such as a drive-by download, causing the re-infection.  <\/p>\n<h4>The usual suspect: pre-installed malware<\/h4>\n<p>Since we had a clean mobile device and it was still getting re-infected, our first assumption was that <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/01\/the-new-landscape-of-preinstalled-mobile-malware-malicious-code-within\/\" target=\"_blank\">pre-installed malware<\/a> was the issue.&nbsp;This assumption was fueled by the fact that the mobile device was from a <a rel=\"noreferrer noopener\" aria-label=\"lesser-known manufacturer (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/android\/2020\/01\/united-states-government-funded-phones-come-pre-installed-with-unremovable-malware\/\" target=\"_blank\">lesser-known manufacturer<\/a>, which is often the case with pre-installed malware.&nbsp; So Amelia tested this theory by going through the steps to run <a href=\"https:\/\/forums.malwarebytes.com\/topic\/216616-removal-instructions-for-adups\/\">Android<\/a><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/forums.malwarebytes.com\/topic\/216616-removal-instructions-for-adups\/\" target=\"_blank\"> Debug Bridge (adb) commands<\/a> to her mobile device.&nbsp; <\/p>\n<p>With <em>adb<\/em> command line installed and the mobile device plugged into a PC, we used the workaround of uninstalling system apps for <em>current user.&nbsp;<\/em>This method renders system apps useless even though they still technically reside on the device.&nbsp; <\/p>\n<p>Starting with the most obvious to the least, we systematically uninstalled suspicious system apps, including the mobile device\u2019s system updater and an audio app with hits on VirusTotal, a potential indicator of maliciousness.&nbsp; Amelia was even able to grab various apps we didn\u2019t have in our Mobile Intelligence System to rule everything out. After all this, xHelper\u2019s persistence would not end.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" data-attachment-id=\"42328\" data-permalink=\"https:\/\/blog.malwarebytes.com\/android\/2020\/02\/new-variant-of-android-trojan-xhelper-reinfects-with-help-from-google-play\/attachment\/2-51\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/2-scaled.jpeg\" data-orig-size=\"1920,2560\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"2\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/2-225x300.jpeg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/2-450x600.jpeg\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/2-450x600.jpeg\" alt=\"\" class=\"wp-image-42328\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/2-450x600.jpeg 450w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/2-225x300.jpeg 225w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/2-1152x1536.jpeg 1152w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/2-1536x2048.jpeg 1536w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/2-scaled.jpeg 1920w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><figcaption>Photo provided by Amelia of xHelper running on mobile device<\/figcaption><\/figure>\n<\/div>\n<h4>Triggered: Google PLAY <\/h4>\n<p>We then noticed something strange: The source of installation for the malware stated it was coming from Google PLAY.&nbsp;This was unusual because none<strong> <\/strong>of the malicious apps downloading on Amelia&#8217;s phone were on Google PLAY.&nbsp;Since we were running out of ideas, we disabled Google PLAY.&nbsp;As a result, the re-infections stopped!<\/p>\n<p>We have <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/android\/2020\/01\/united-states-government-funded-phones-come-pre-installed-with-unremovable-malware\/\" target=\"_blank\">seen important pre-installed system apps infected with malware<\/a> in the past. But Google PLAY itself!?&nbsp;After further analysis, we determined that, no, Google PLAY was <strong>not<\/strong> infected with malware. However, something within Google PLAY was triggering the re-infection\u2014perhaps something that was sitting in storage. Furthermore, that something could also be using Google PLAY as a smokescreen, falsifying it as the source of malware installation when in reality, it was coming from someplace else.<\/p>\n<p>In the hopes that our theory held true, we asked Amelia to look for suspicious files and\/or directories on her mobile device using a searchable file explorer,&nbsp;namely, anything that started with <em>com.mufc., <\/em>the malicious package names of xHelper.&nbsp;And then&#8230;eureka! <\/p>\n<figure class=\"wp-block-gallery columns-2 is-cropped\">\n<ul class=\"blocks-gallery-grid\">\n<li class=\"blocks-gallery-item\">\n<figure><img decoding=\"async\" data-attachment-id=\"42329\" data-permalink=\"https:\/\/blog.malwarebytes.com\/android\/2020\/02\/new-variant-of-android-trojan-xhelper-reinfects-with-help-from-google-play\/attachment\/3-42\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/3-scaled.jpeg\" data-orig-size=\"1920,2560\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"3\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/3-225x300.jpeg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/3-450x600.jpeg\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/3-450x600.jpeg\" alt=\"\" data-id=\"42329\" data-full-url=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/3-scaled.jpeg\" data-link=\"https:\/\/blog.malwarebytes.com\/?attachment_id=42329\" class=\"wp-image-42329\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/3-450x600.jpeg 450w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/3-225x300.jpeg 225w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/3-1152x1536.jpeg 1152w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/3-1536x2048.jpeg 1536w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/3-scaled.jpeg 1920w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure>\n<\/li>\n<li class=\"blocks-gallery-item\">\n<figure><img decoding=\"async\" data-attachment-id=\"42330\" data-permalink=\"https:\/\/blog.malwarebytes.com\/android\/2020\/02\/new-variant-of-android-trojan-xhelper-reinfects-with-help-from-google-play\/attachment\/4-27\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/4-scaled.jpeg\" data-orig-size=\"1920,2560\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"4\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/4-225x300.jpeg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/4-450x600.jpeg\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/4-450x600.jpeg\" alt=\"\" data-id=\"42330\" data-full-url=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/4-scaled.jpeg\" data-link=\"https:\/\/blog.malwarebytes.com\/?attachment_id=42330\" class=\"wp-image-42330\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/4-450x600.jpeg 450w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/4-225x300.jpeg 225w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/4-1152x1536.jpeg 1152w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/4-1536x2048.jpeg 1536w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/4-scaled.jpeg 1920w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure>\n<\/li>\n<\/ul><figcaption class=\"blocks-gallery-caption\"> Photos provided by Amelia <\/figcaption><\/figure>\n<h2>The culprit<\/h2>\n<p>Hidden within a directory named <em>com.mufc.umbtts <\/em>was yet another Android application package (APK). The APK in question was a Trojan dropper we promptly named Android\/Trojan.Dropper.xHelper.VRW.&nbsp;It is responsible for dropping one variant of xHelper, which subsequently drops more malware within seconds.<\/p>\n<p>Here\u2019s the confusing part:&nbsp;Nowhere on the device does it appear that Trojan.Dropper.xHelper.VRW is installed.&nbsp;It is our belief that it installed, ran, and uninstalled again within seconds to evade detection\u2014all by something triggered from Google PLAY.&nbsp; The &#8220;how&#8221; behind this is still unknown.<\/p>\n<p>It&#8217;s important to realize that unlike apps, directories and files remain on the Android mobile device even after a factory reset. Therefore, until the directories and files are removed, the device will keep getting infected.<\/p>\n<h2>How to remove xHelper re-infections<\/h2>\n<p>If you are experiencing re-infections of xHelper, here\u2019s how to remove it:<\/p>\n<ul>\n<li>We strongly recommend installing <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=org.malwarebytes.antimalware\" target=\"_blank\">Malwarebytes for Android<\/a> (free).<\/li>\n<li>Install a file manager from Google PLAY that has the capability to search files and directories.\n<ul>\n<li>Amelia used File Manager by ASTRO.<\/li>\n<\/ul>\n<\/li>\n<li>Disable Google PLAY temporarily to stop re-infection.\n<ul>\n<li>Go to <em>Settings<\/em> &gt; <em>Apps<\/em> &gt; <em>Google Play Store<\/em><\/li>\n<li>Press<em> Disable <\/em>button<\/li>\n<\/ul>\n<\/li>\n<li>Run a scan in Malwarebytes for Android to remove xHelper and other malware.\n<ul>\n<li>Manually uninstalling can be difficult, but the names to look for in <em>Apps info<\/em> are <em>fireway<\/em>, <em>xhelper<\/em>, and <em>Settings<\/em> (<strong><em>only<\/em><\/strong> if two settings apps are displayed).<\/li>\n<\/ul>\n<\/li>\n<li>Open the file manager and search for anything in storage starting with  <em>com.mufc.<\/em><\/li>\n<li>If found, make a note of the last modified date.\n<ul>\n<li>Pro tip: Sort by date in file manager<\/li>\n<li>In File Manager by ASTRO, you can sort by date under <em>View Settings<\/em><\/li>\n<\/ul>\n<\/li>\n<li>Delete anything starting with <em>com.mufc. <\/em>and anything with same date (except core directories like <em>Download<\/em>):<\/li>\n<\/ul>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" data-attachment-id=\"42327\" data-permalink=\"https:\/\/blog.malwarebytes.com\/android\/2020\/02\/new-variant-of-android-trojan-xhelper-reinfects-with-help-from-google-play\/attachment\/5-21\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/5.png\" data-orig-size=\"720,1280\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"5\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/5-169x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/5-338x600.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/5-338x600.png\" alt=\"\" class=\"wp-image-42327\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/5-338x600.png 338w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/5-169x300.png 169w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/5.png 720w\" sizes=\"(max-width: 338px) 100vw, 338px\" \/><\/figure>\n<\/div>\n<ul>\n<li>Re-enable Google PLAY\n<ul>\n<li>Go to <em>Settings<\/em> &gt; <em>Apps<\/em> &gt; <em>Google Play Store<\/em><\/li>\n<\/ul>\n<ul>\n<li>Press<em> Enable <\/em>button<\/li>\n<\/ul>\n<\/li>\n<li>If the infection still persists, reach out to us via <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/support.malwarebytes.com\/\" target=\"_blank\">Malwarebytes Support<\/a>.<\/li>\n<\/ul>\n<h2>Mobile malware hits a new level<\/h2>\n<p>This is by far the nastiest infection I have encountered as a mobile malware researcher.&nbsp;Usually a factory reset, which is the last option, resolves even the worst infection.&nbsp;I cannot recall a time that an infection persisted after a factory reset unless the device came with pre-installed malware.&nbsp;This fact inadvertently sent me down the wrong path.&nbsp;Luckily, I had Amelia&#8217;s help, who was as persistent as xHelper itself in finding an answer and guiding us to our conclusion.<\/p>\n<p>This, however, marks a new era in mobile malware.&nbsp;The ability to re-infect using a hidden directory containing an APK that can evade detection is both scary and frustrating.&nbsp;We will continue analyzing this malware behind the scenes.&nbsp;In the meantime, we hope this at least ends the chapter of this particular variant of xHelper.&nbsp;<\/p>\n<p>Stay safe out there!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/android\/2020\/02\/new-variant-of-android-trojan-xhelper-reinfects-with-help-from-google-play\/\">Android Trojan xHelper uses persistent re-infection tactics: here&#8217;s how to remove<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/android\/2020\/02\/new-variant-of-android-trojan-xhelper-reinfects-with-help-from-google-play\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Nathan Collier| Date: Wed, 12 Feb 2020 18:15:59 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/android\/2020\/02\/new-variant-of-android-trojan-xhelper-reinfects-with-help-from-google-play\/' title='Android Trojan xHelper uses persistent re-infection tactics: here's how to remove'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/Featured_xHelperUpdate_resize.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A new variant of the Android Trojan xHelper re-infects just hours after removal\u2014and with the help of Google PLAY?! A forum user helps us investigate.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/android\/\" rel=\"category tag\">Android<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/android\/\" rel=\"tag\">Android<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/android-malware\/\" rel=\"tag\">android malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/android-trojan-dropper-xhelper\/\" rel=\"tag\">Android\/Trojan.Dropper.xHelper<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mobile-malware\/\" rel=\"tag\">mobile malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/xhelper\/\" rel=\"tag\">xHelper<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/android\/2020\/02\/new-variant-of-android-trojan-xhelper-reinfects-with-help-from-google-play\/' title='Android Trojan xHelper uses persistent re-infection tactics: here's how to remove'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/android\/2020\/02\/new-variant-of-android-trojan-xhelper-reinfects-with-help-from-google-play\/\">Android Trojan xHelper uses persistent re-infection tactics: here&#8217;s how to remove<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10462,11254,22741,11255,22742],"class_list":["post-17718","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-android","tag-android-malware","tag-android-trojan-dropper-xhelper","tag-mobile-malware","tag-xhelper"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17718","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17718"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17718\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17718"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17718"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17718"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}