Tuesday, May 13, 2025
HomeMalwareAndroid Banking Malware Uses Fake Google Play Page to Spread to Devices

Android Banking Malware Uses Fake Google Play Page to Spread to Devices

Published on

SIEM as a Service

Follow Us on Google News

In Brazil a large financial services provider, Itaú Unibanco has been targeted by an Android banking trojan, as the cyber security analysts at Cyble claimed. And this financial service provider has more than 55 million customers globally.

The Itaú Unibanco has been exploited by the threat actors to deploy an extraordinary trick to distribute to the devices. Here, to trick the users the threat actors use a fake page of the Android’s official Google Play app store by mocking it.

As this sneaky trick easily fools the users and makes them believe that they are installing the genuine app from the official app store of Android.

- Advertisement - Google News

In Brazil a large financial services provider, Itaú Unibanco has been targeted by an Android banking trojan, as the cyber security analysts at Cyble claimed. And this financial service provider has more than 55 million customers globally.

The Itaú Unibanco has been exploited by the threat actors to deploy an extraordinary trick to distribute to the devices. Here, to trick the users the threat actors use a fake page of the Android’s official Google Play app store by mocking it.

As this sneaky trick easily fools the users and makes them believe that they are installing the genuine app from the official app store of Android.

Besides mocking the Android’s official Google Play app store, the threat actors also mock the official Itaú Unibanco app by changing the icon with the original one.

APK Metadata Information

Here below we have mentioned the metadata information of the malicious APK:-

  • ​App Name: _lTAU_SINC/sincronizador 
  • ​Package Name: com.app.pacotesinkinstall 
  • ​SHA256 Hash: 3500c50910c94c7f9bc7b39a7b194bac6137cef586281ee22f5439bb2d140480 

Hacking The Original App

Once it infected the users’ devices then it starts executing its malicious operations in which, from the actual Play Store it attempts to open the authentic Itaú app to perform deceitful transactions by changing the input fields of the users.

Here during the installation process, the malicious app doesn’t ask for any special and dangerous permissions which makes it more sneaky for the AVs and helps to circumvent users’ observing radar.

Since it doesn’t request any special permissions, it primarily aims to exploit or abuse the Accessibility Service of Android, and it’s one of the key things that could easily allow an attacker to evade all the security on Android systems.

Prevent malware infection

Here below we have mentioned all the preventive measures provided by the Cyble analysts:-

  • Always download and install applications from official app stores only.
  • On your connected devices, you should always use good anti-virus and internet security solutions.
  • Always use a strong and complex password.
  • Try to use multi-factor authentication.
  • Always keep enabled the biometric security features.
  • On Android devices always keep enabled the Google Play Protect.
  • Always keep active devices, OS, and apps updated.
  • Always keep track before enabling any permissions.

Moreover, in case, if you need to install any Android APK files from outside the official store, then you should analyze and scan the APK files properly before downloading and installing them.

Besides mocking the Android’s official Google Play app store, the threat actors also mock the official Itaú Unibanco app by changing the icon with the original one.

APK Metadata Information

Here below we have mentioned the metadata information of the malicious APK:-

  • ​App Name: _lTAU_SINC/sincronizador 
  • ​Package Name: com.app.pacotesinkinstall 
  • ​SHA256 Hash: 3500c50910c94c7f9bc7b39a7b194bac6137cef586281ee22f5439bb2d140480 

Hacking the Original App

Once it infected the users’ devices then it starts executing its malicious operations in which, from the actual Play Store it attempts to open the authentic Itaú app to perform deceitful transactions by changing the input fields of the users.

Here during the installation process, the malicious app doesn’t ask for any special and dangerous permissions which makes it more sneaky for the AVs and helps to circumvent users’ observing radar.

Since it doesn’t request any special permissions, it primarily aims to exploit or abuse the Accessibility Service of Android, and it’s one of the key things that could easily allow an attacker to evade all the security on Android systems.

Prevent Malware Infection

Here below we have mentioned all the preventive measures provided by the Cyble analysts:-

  • Always download and install applications from official app stores only.
  • On your connected devices, you should always use good anti-virus and internet security solutions.
  • Always use a strong and complex password.
  • Try to use multi-factor authentication.
  • Always keep enabled the biometric security features.
  • On Android devices always keep enabled the Google Play Protect.
  • Always keep active devices, OS, and apps updated.
  • Always keep track before enabling any permissions.

Moreover, in case, if you need to install any Android APK files from outside the official store, then you should analyze and scan the APK files properly before downloading and installing them.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Microsoft Patch Tuesday May 2025 Released With the Fixes for 72 Flaws With 5 Actively Exploited 0-Day

Microsoft has released its May 2025 Patch Tuesday updates, addressing 72 security vulnerabilities across...

Ivanti Released Security Updates to Fix for the Mutiple RCE Vulnerabilities – Patch Now

Ivanti, a leading enterprise software provider, has released critical security updates addressing vulnerabilities across...

Fortinet FortiVoice Zero-day Vulnerability Actively Exploited in The Wild

A critical stack-based buffer overflow vulnerability (CWE-121) has been discovered in multiple Fortinet products,...

Ransomware Attacks Surge by 123% Amid Evolving Tactics and Strategies

The 2025 Third-Party Breach Report from Black Kite highlights a staggering 123% surge in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Weaponize KeePass Password Manager to Spread Malware and Steal Passwords

Threat actors have successfully exploited the widely-used open-source password manager, KeePass, to spread malware...

Researchers Uncover Remote IT Job Fraud Scheme Involving North Korean Nationals

The United States indicted fourteen North Korean nationals for orchestrating a sophisticated scheme to...

Lumma Stealer Upgraded with PowerShell Tools and Advanced Evasion Techniques

Sophos Managed Detection and Response (MDR) in September 2024, the notorious Lumma Stealer malware...