Turkish based an Android App Store named as “CepKutusu.com” spreading malware which contains many Android applications Similar as Google Play store.
Once We Try to Download an Application from “CepKutusu.com” through Browser, suddenly “Download now” Button appears which leads to download Banking Malware.
Each and every Single App that has appeared in this App store will redirect the user to Downloading the Malware by replacing the Original application.
According to ESET researchers, They introduced a seven-day window of not serving malware after a malicious download, which means after the user downloads the infected app, a cookie is set to prevent the malicious system from prevailing, leading to the user being served clean links for the next seven days.
Also Read Google Blocked a new Spyware Family Lipizzan
Investigations revealed that distributed Malicious Applications controlled Remotely which is capable of intercepting and sending SMS messages, displaying fake activity, as well as downloading and installing other apps.
Initial Downloads from this Appstore Doesn’t perform any Malicious Process for 7 days Passed and later it redirects to install malware when the user again try to Download any apps from this Appstore.
Source: ESET
According to ESET, Above image indicates that the malicious app served to a user who thinks they are downloading the Clash of Clans game and the legitimate game served to the same user within the seven day period.
Adobe Flash Player imitates instead of installing malware and the malware doesn’t mimic the app the user intended to install.so the user never Agree to Download Adobe Flash Player on their Android phones to prevent from this kind of Malicious Activities.