There is ultimately a way to take out xHelper, the unremovable Android malware – ZDNet

It has taken protection scientists nearly 10 months to find a trustworthy method of cleaning smartphones contaminated with xHelper, a kind of Android malware that, until eventually just lately, has been difficult to remove.

The removal procedure is described at the end of this article, but 1st some context for viewers who want to master far more about xHelper.

This specific malware strain has triggered pretty the discomfort for people all above the earth in the earlier 10 months. The malware was to start with noticed again in March 2019, when customers started complaining on various net boards about an app they were not capable to take away, even right after manufacturing facility resets.

These apps were accountable for perstering buyers with intrusive popup adverts and notification spam. Very little really malicious, but nevertheless very annoying.

As the 12 months progressed, xHelper campaigns expanded the malware’s get to, infecting a lot more and much more devices. According to a Malwarebytes report, there were being all around 32,000 contaminated equipment by August, a amount that later arrived at 45,000 by late Oct, when Symantec researchers also published their very own report on the danger.

According to scientists, the resource of these infections was “internet redirects” that despatched end users to internet internet pages internet hosting Android applications. The web sites instructed people on how to side-load unofficial Android applications from outdoors the Play Retail outlet. Code concealed in these apps sooner or later downloaded and set up the xHelper trojan.

But even though finding its source, arrive at, and point of infection was uncomplicated, what confounded protection scientists previous 12 months was that they couldn’t take away the malware from a system by standard strategies, these kinds of as uninstall the primary xHelper app or by a manufacturing unit reset.

Just about every time a user would manufacturing facility reset the product, the malware would only pop up a couple of hrs afterwards, reinstalling by itself with no consumer conversation.


Graphic: ZDNet

The only way to take out xHelper was to conduct a comprehensive product reflash by reinstalling the entire Android running program, a remedy that was not possible for all contaminated customers, lots of of whom failed to have accessibility to the correct Android OS firmware photographs to perform a reflash.

Some clues emerge

Given that coming throughout the malware last calendar year, stability researchers from Malwarebytes have ongoing to seem into the threat.

In a blog site put up currently, the Malwarebytes group say that when they continue to have not figured out exactly how the malware reinstalls by itself, they did discover plenty of info about its modus operandi in buy to remove it for superior and stop xHelper from reinstalling itself immediately after manufacturing facility resets.

The Malwarebytes crew suggests that xHelper has evidently uncovered a way to use a course of action inside of the Google Engage in Retailer app in get to bring about the re-install procedure.

With the aid of unique directories it had developed on the unit, xHelper was hiding its APK on disk to endure manufacturing facility resets.

“Compared with applications, directories and files continue to be on the Android cellular gadget even soon after a manufacturing facility reset,” suggests Nathan Collier, Senior Malware Intelligence Analyst at Malwarebytes.

Collier believes that at the time the Google Play Shop application executed some but-to-be-decided procedure (supposedly some sort of scan), it reinstalled itself.

Removal recommendations

Collier has now set collectively a collection of measures that people can comply with to take out the xHelper malware from products and reduce it from reinstalling by itself.

Of be aware, these guidance count on consumers putting in the Malwarebytes for Android application, but this app is totally free to use, so it shouldn’t be any situation for customers.

Phase one: Put in a file manager from Google Enjoy that has the capacity to search information and directories. (ex: Amelia employed File Manager by ASTRO).

Stage two: Disable Google Perform briefly to end re-infection.

  • Go to Options > Applications > Google Engage in Retailer
  • Push Disable button

Phase 3: Operate a scan in Malwarebytes for Android to discover the nameof the app that hides the xHelper malware. Manually uninstalling can be challenging, but the names to seem for in the Android OS Applications info segment are fireway, xhelper, and Options (only if two configurations apps are shown).

Stage four: Open up the file manager and search for just about anything in storage commencing with com.mufc.

Action 5: If uncovered, make a observe of the past modified date.

  • Type by date in file supervisor
  • In File Manager by ASTRO, you can type by day under See Settings.

Phase six: Delete anything at all setting up with com.mufc. and everything with identical day (besides main directories like Download):


Graphic: Malwarebytes

Step 7: Re-permit Google Perform

  • Go to Options > Apps > Google Participate in Retail store
  • Press Permit button

Browse More

Add Comment