Sunday, March 30, 2025
HomeCyber CrimeNew Android Banking Malware Attacking Indian Banks To Steal Login Credentials

New Android Banking Malware Attacking Indian Banks To Steal Login Credentials

Published on

SIEM as a Service

Follow Us on Google News

Researchers have discovered a new Android banking trojan targeting Indian users, and this malware disguises itself as essential utility services to trick users into providing sensitive information. 

The malware has already compromised 419 devices, intercepted 4,918 SMS messages, and stolen 623 banking credentials.

As this active campaign continues, the number of affected devices and stolen data is likely to increase.

2024 MITRE ATT&CK Evaluation Results for SMEs & MSPs -> Download Free Guide

Cybercriminals are leveraging WhatsApp’s immense user base in India to distribute malicious APKs, which, once installed, grant attackers unauthorized access to victims’ financial data. 

Scammer messages reaching users via Whatsapp

By exploiting the trust and familiarity associated with messaging platforms, phishers can deceive users into downloading and executing harmful software, leading to potential financial loss and compromised personal information. 

The malware, disguised as a gas bill payment app, leverages the PayRup logo to gain user trust.

Once installed and permissions granted, it prompts users for sensitive financial information, including card and bank details, which is then exfiltrated to a C2 server while the app displays a deceptive payment failure message. 

It lacks the “android.intent.category.LAUNCHER” attribute in its AndroidManifest.xml, preventing its icon from appearing in the launcher and potentially allowing it to remain undetected on the device.

Payment failure message displayed but data sent to C2 server

Malware exploited Supabase’s RESTful APIs to store stolen data and exposed a JWT token in plaintext, allowing unauthorized access to the Supabase instance. 

Investigators discovered 5,558 records, including 4,918 SMS messages and 623 financial records, stored in the database, while the analysis of package names reveals a sophisticated scam operation with a focus on financial institutions and utility services. 

JWT token exposed in plaintext

Eight distinct package prefixes were identified, each corresponding to a specific scam theme, including major banks like Axis, ICICI, and Punjab National Bank, as well as regional banks and utility providers.

This strategic approach, coupled with the development of multiple variants within each theme, significantly enhances the effectiveness and resilience of their malicious campaigns, making detection and mitigation more challenging.

The malware actor has developed a mobile app to directly manage the C2 infrastructure, which, unlike previous malware, bypasses web interfaces and communicates directly with C2 servers. 

C2 management mobile application

It can remotely command infected devices to forward SMS messages to specified numbers. The app leverages Firebase Realtime Database for simple configuration data storage and retrieval, highlighting its focus on direct device control and data exfiltration. 

McAfee research has identified 419 unique devices infected with a specific malware variant, which is expected to rise due to the continuous evolution and spread of new strains.

Given the prevalence of scams originating from messaging platforms like WhatsApp, users should exercise caution when interacting with messages from unfamiliar sources, while the deployment of robust security software capable of addressing emerging threats is strongly recommended. 

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Gamaredon Hackers Weaponize LNK Files to Deliver Remcos Backdoor

Cisco Talos has uncovered an ongoing cyber campaign by the Gamaredon threat actor group,...

“Crocodilus” A New Malware Targeting Android Devices for Full Takeover

Researchers have uncovered a dangerous new mobile banking Trojan dubbed Crocodilus actively targeting financial...

SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk

From WannaCry to the MGM Resorts Hack, ransomware remains one of the most damaging...

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed "Morphing Meerkat," that leverages...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Gamaredon Hackers Weaponize LNK Files to Deliver Remcos Backdoor

Cisco Talos has uncovered an ongoing cyber campaign by the Gamaredon threat actor group,...

“Crocodilus” A New Malware Targeting Android Devices for Full Takeover

Researchers have uncovered a dangerous new mobile banking Trojan dubbed Crocodilus actively targeting financial...

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed "Morphing Meerkat," that leverages...