Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

New Variant of XLoader Malware Runs in the Background and Steals Your Photos, Texts, and Other Data

New Variant of XLoader Malware Runs in the Background and Steals Your Photos, Texts, and Other Data

If you’re in the know about cybersecurity and, specifically, mobile malware, you might have heard the name XLoader in the past. The malware has gone through considerable versions and variations, allowing it to steal information from users in more than seven countries, but the most recent is incredibly scary.

Android encompasses a significant portion of the smartphone operating system market share, and any attack that targets it should be taken seriously. Normally, an Android malware first needs to be opened by the user for it to work. You open the infected app or file, which then launches the malware. However, this new version of XLoader is a bit different in that it can launch automatically.

Unfortunately, this new variant of XLoader can run in the background, meaning that the app doesn’t even have to be opened for it to run and perform all of its nasty tricks. It can extract data from infected devices relatively easily, including photos, text messages, contact lists, hardware information, and so much more.

According to McAfee, which discovered the malware, the threat spreads by shortened URLs in malicious text messages. These shortened URLs are designed to make detection more difficult for the user. If the user opens the link on their device, they’ll be prompted to download the Android APK file, which is a way to sideload apps on a device without installing them through the Google Play Store. If users install the app, they’ll find themselves with an infected Android device.

To avoid detection, the app impersonates Google Chrome and asks the user for permissions like sending and viewing text messages and running in the background. It will also ask users to assign it as the default SMS app. Furthermore, XLoader can extract more phishing messages and malicious links from Pinterest profiles. It will send the links to the infected smartphone in an effort to stay undetected.

Here’s the crazy part: the threat can use hard-coded phishing messages to trick the user into clicking on malicious links with bogus allegations of bank fraud if it cannot access Pinterest for whatever reason. It’s a very intelligent threat that has evolved over time, and it must be taken seriously.

You can limit the amount of risk associated with mobile malware like XLoader by avoiding sideloading apps in the first place and limiting the number of apps you download from the app store. Furthermore, we always recommend that you make sure Google Play Protect is enabled on your device.

To make sure it’s on, open the Google Play Store app. At the top right, tap the profile icon. Tap Play Protect and then Settings. Ensure Scan apps with Play Protect is on.

Be sure to educate your users about this threat and all other types of mobile malware, and take measures now to protect your business by calling Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 04 February 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Email Google Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Saving Money Passwords Communication Cybersecurity Data Backup Smartphone AI Data Recovery Android Upgrade Disaster Recovery Business Management Smartphones VoIP Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Automation Information Artificial Intelligence Facebook Miscellaneous Holiday Training Covid-19 Gadgets Cloud Computing Managed Service Provider Remote Work Server Compliance IT Support Outsourced IT Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Business Technology Blockchain Windows 10 Bandwidth Virtualization Wi-Fi Two-factor Authentication Vendor Apps Data Security Mobile Office Mobile Device Management Gmail Tip of the week Chrome Budget WiFi Apple Networking Employer-Employee Relationship App Managed Services Voice over Internet Protocol BYOD Access Control Office 365 HIPAA Applications How To BDR Conferencing Hacker Computing Avoiding Downtime Information Technology Marketing Health Analytics Office Tips Augmented Reality Router Retail Storage Big Data Password Bring Your Own Device Managed IT Services 2FA Help Desk Computers Operating System Healthcare Website Virtual Private Network Risk Management Printer Cooperation Free Resource Project Management Paperless Office Windows 7 Infrastructure Firewall Microsoft 365 Document Management Solutions The Internet of Things Social Scam Data loss Windows 11 Monitoring Excel Going Green Patch Management Customer Service Save Money Remote Monitoring Vulnerability End of Support Remote Workers Vendor Management Cybercrime Telephone Physical Security Display Data Privacy Computer Repair Word Virtual Desktop Images 101 Data storage LiFi Mobility Telephone System Multi-Factor Authentication Cost Management Outlook Machine Learning Money Safety Humor Employees Integration Maintenance Sports User Tip Antivirus Modem Mouse Mobile Security Processor Holidays Administration Data Storage Smart Technology Supply Chain Customer Relationship Management Video Conferencing Managed Services Provider Virtual Machines Professional Services Robot Saving Time Hacking Settings Presentation Printing Managed IT Service Wireless Content Filtering Downloads Wireless Technology IT Management VPN YouTube Meetings iPhone Licensing Cryptocurrency Vulnerabilities Entertainment Hard Drives Google Docs Trends Supply Chain Management Unified Communications Experience Running Cable Tech Support Google Calendar Term Google Apps Domains Customer Resource management FinTech Bitcoin Network Management Regulations Google Wallet Star Wars IT Assessment Microsoft Excel IT Maintenance Monitors Data Analysis Refrigeration Gamification Flexibility Staff Value Business Intelligence Laptop Websites Legislation Shortcuts Public Speaking Organization Windows 8 Social Networking Drones Smart Devices Ransmoware Lithium-ion battery Fileless Malware Digital Security Cameras Entrepreneur SharePoint Content Remote Working Wearable Technology Memory Vendors Electronic Medical Records Halloween Comparison Google Play Be Proactive Health IT Motherboard Data Breach Lenovo Assessment Electronic Health Records Permissions Workforce Writing Directions Videos Undo Wasting Time Threats Virtual Reality Scary Stories Private Cloud Specifications Security Cameras Workplace Strategies Hacks Server Management Trend Micro Superfish Internet Exlporer Software as a Service Identity Theft Fraud Meta Fun Microchip Username Deep Learning Managing Costs Amazon Twitter Error Black Friday SSID eCommerce Database Surveillance Education Virtual Assistant Outsource IT Social Engineering Application IT Technicians Virtual Machine Environment Remote Computing Media Cyber Monday Medical IT IBM Proxy Server Reviews Mobile Computing Cookies Tactics Development Tablet Hotspot Transportation Small Businesses Search Best Practice Mirgation Hypervisor Displays Alert Buisness File Sharing PowerPoint Dark Data Shopping Managed IT Nanotechnology Optimization Legal Addiction IT solutions Language Employer/Employee Relationships Outsourcing How To Competition Management PCI DSS Business Growth Chatbots Notifications Navigation Screen Reader Travel Distributed Denial of Service Workplace Gig Economy Techology Service Level Agreement Internet Service Provider Google Maps Computing Infrastructure Teamwork Hiring/Firing Cortana Evernote Paperless Regulations Compliance Alt Codes Identity Smart Tech Memes Downtime Unified Threat Management Co-managed IT User Bookmark Unified Threat Management Download Net Neutrality Hosted Solution Alerts SQL Server Technology Care Business Communications Financial Data Typing History Connectivity IT Break Fix Scams IP Address Network Congestion Browsers Smartwatch Google Drive User Error Upload Procurement Azure Hybrid Work Knowledge Multi-Factor Security Tech Human Resources Social Network Telework Cyber security IoT Communitications Point of Sale Dark Web Cables 5G Recovery CES

Blog Archive