In Brazil a large financial services provider, Itaú Unibanco has been targeted by an Android banking trojan, as the cyber security analysts at Cyble claimed. And this financial service provider has more than 55 million customers globally.
The Itaú Unibanco has been exploited by the threat actors to deploy an extraordinary trick to distribute to the devices. Here, to trick the users the threat actors use a fake page of the Android’s official Google Play app store by mocking it.
As this sneaky trick easily fools the users and makes them believe that they are installing the genuine app from the official app store of Android.
In Brazil a large financial services provider, Itaú Unibanco has been targeted by an Android banking trojan, as the cyber security analysts at Cyble claimed. And this financial service provider has more than 55 million customers globally.
The Itaú Unibanco has been exploited by the threat actors to deploy an extraordinary trick to distribute to the devices. Here, to trick the users the threat actors use a fake page of the Android’s official Google Play app store by mocking it.
As this sneaky trick easily fools the users and makes them believe that they are installing the genuine app from the official app store of Android.
Besides mocking the Android’s official Google Play app store, the threat actors also mock the official Itaú Unibanco app by changing the icon with the original one.
Here below we have mentioned the metadata information of the malicious APK:-
Once it infected the users’ devices then it starts executing its malicious operations in which, from the actual Play Store it attempts to open the authentic Itaú app to perform deceitful transactions by changing the input fields of the users.
Here during the installation process, the malicious app doesn’t ask for any special and dangerous permissions which makes it more sneaky for the AVs and helps to circumvent users’ observing radar.
Since it doesn’t request any special permissions, it primarily aims to exploit or abuse the Accessibility Service of Android, and it’s one of the key things that could easily allow an attacker to evade all the security on Android systems.
Here below we have mentioned all the preventive measures provided by the Cyble analysts:-
Moreover, in case, if you need to install any Android APK files from outside the official store, then you should analyze and scan the APK files properly before downloading and installing them.
Besides mocking the Android’s official Google Play app store, the threat actors also mock the official Itaú Unibanco app by changing the icon with the original one.
Here below we have mentioned the metadata information of the malicious APK:-
Once it infected the users’ devices then it starts executing its malicious operations in which, from the actual Play Store it attempts to open the authentic Itaú app to perform deceitful transactions by changing the input fields of the users.
Here during the installation process, the malicious app doesn’t ask for any special and dangerous permissions which makes it more sneaky for the AVs and helps to circumvent users’ observing radar.
Since it doesn’t request any special permissions, it primarily aims to exploit or abuse the Accessibility Service of Android, and it’s one of the key things that could easily allow an attacker to evade all the security on Android systems.
Here below we have mentioned all the preventive measures provided by the Cyble analysts:-
Moreover, in case, if you need to install any Android APK files from outside the official store, then you should analyze and scan the APK files properly before downloading and installing them.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.
Cybersecurity experts are sounding the alarm over a new strain of malware dubbed "I2PRAT," which…
A new cyber campaign by the advanced persistent threat (APT) group Earth Koshchei has brought…
Recent research has linked a series of cyberattacks to The Mask group, as one notable…
RiseLoader, a new malware family discovered in October 2024, leverages a custom TCP-based binary protocol…
GFI Software's Kerio Control, a popular UTM solution, was found to be vulnerable to multiple…
Researchers have uncovered vulnerabilities in Microsoft Azure Data Factory's integration with Apache Airflow, which could…