Tuesday, February 25, 2025
HomeAndroidTgToxic Android Malware Updated it’s Features to Steal Login Credentials

TgToxic Android Malware Updated it’s Features to Steal Login Credentials

Published on

SIEM as a Service

Follow Us on Google News

The TgToxic Android malware, initially discovered in July 2022, has undergone significant updates, enhancing its ability to steal login credentials and financial data.

Originally targeting Southeast Asian users through phishing campaigns and deceptive apps, the malware has now evolved to include advanced features and expanded its geographical scope to Europe and Latin America.

Researchers have identified these updates as part of a calculated effort by threat actors to evade detection and improve operational efficiency.

Advanced Techniques for Evasion and Control

The latest version of TgToxic incorporates sophisticated anti-emulation techniques designed to bypass automated analysis systems.

By analyzing Android system features, hardware specifications, and device properties, the malware can detect emulated environments commonly used by cybersecurity researchers.

It identifies discrepancies in hardware fingerprints, processor types, and emulator-specific indicators such as QEMU or Genymotion.

This ensures that the malware remains undetected in controlled testing environments.

Additionally, the malware has transitioned from hard-coded command-and-control (C2) server addresses to more dynamic methods.

TgToxic Android Malware
open directory that hosted both the dropper and main payload 

Initially, it utilized “dead drop” locations hosted on community forums, embedding encrypted configurations within user profiles.

However, this method was short-lived due to the exposure of these accounts.

The latest variant now employs a domain generation algorithm (DGA), which periodically generates new domain names for C2 servers.

According to Intel471, this approach significantly enhances resilience by making it harder for defenders to block communications.

Increased Threat

The evolution of TgToxic reflects a deliberate strategy by its operators to expand their target base beyond Southeast Asia.

By including European and Latin American banks in its list of targets, the malware demonstrates a calculated attempt to exploit new markets.

The use of public platforms for hosting malware configurations further complicates detection efforts, leveraging the legitimacy of these platforms to bypass security measures.

TgToxic Android Malware
TLDs included in the malware configuration

Moreover, the adoption of DGAs underscores the operators’ commitment to maintaining operational longevity.

Unlike static C2 addresses that can be easily neutralized, DGAs provide a dynamic mechanism for ensuring uninterrupted communication between infected devices and the malware’s control servers.

The continuous updates to TgToxic highlight the adaptability of modern cyber threats.

The operators’ ability to monitor open-source intelligence and swiftly modify their tactics poses significant challenges for cybersecurity defenses.

These developments emphasize the need for dynamic and adaptive security measures capable of countering evolving threats.

Organizations are advised to restrict app installations from unknown sources, deploy mobile threat defense solutions, and conduct regular cybersecurity training for employees.

Vigilance against excessive app permissions and proactive monitoring for indicators of compromise are crucial steps in mitigating risks associated with advanced malware like TgToxic.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response, and Threat Hunting - Register Here

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Google Issues Warning on Phishing Campaigns Targeting Higher Education Institutions

Google, in collaboration with its Mandiant Threat Intelligence team, has issued a warning about...

Hackers Exploiting Cisco Small Business Routers RCE Vulnerability Deploying Webshell

A critical remote code execution (RCE) vulnerability, CVE-2023-20118, affecting Cisco Small Business Routers, has...

Malicious npm Package Targets Developers for Supply Chain Attack

The Socket Research Team has uncovered a malicious npm package@ton-wallet/create designed to steal sensitive...

New Auto-Color Malware Attacking Linux Devices to Gain Full Remote Access

Researchers at Palo Alto Networks have identified a new Linux malware, dubbed "Auto-Color," that...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Google Issues Warning on Phishing Campaigns Targeting Higher Education Institutions

Google, in collaboration with its Mandiant Threat Intelligence team, has issued a warning about...

Hackers Exploiting Cisco Small Business Routers RCE Vulnerability Deploying Webshell

A critical remote code execution (RCE) vulnerability, CVE-2023-20118, affecting Cisco Small Business Routers, has...

Malicious npm Package Targets Developers for Supply Chain Attack

The Socket Research Team has uncovered a malicious npm package@ton-wallet/create designed to steal sensitive...