Friday, April 4, 2025
HomeMalwareAndroid Spyware & Banking Trojan Attack via DNS Spoofing that Poses as...

Android Spyware & Banking Trojan Attack via DNS Spoofing that Poses as Legitimate Facebook or Chrome App

Published on

SIEM as a Service

Follow Us on Google News

A new wave of network attacks that uses DNS spoofing and cache poisoning method to distribute XLoader  Android Spyware and Banking Trojan.

DNS Spoofing or poisoning  is a type of cyber-attack that exploits system vulnerabilities in the domain name server to divert traffic away from legitimate servers and directs it towards fake ones

The malicious app poses a legitimate Chrome or Facebook app and it is distributed through fake by pushing a notification to a victim device.

According to TrendMicro analysis report “this new wave of network attacks since early March which for now are targeting Japan, Korea, China, Taiwan, and Hong Kong.

Upon installation, the malicious app is capable of stealing personal information, financial data and it installs additional apps to the device.

It is also capable of hijacking the device and establish persistence through administrator privileges.

How the Infection Work with DNS Spoofing

Attackers compromise the router settings and redirect the traffic to certain websites and fake drive users to the malicious domains and to download XLoader.

Once the application triggered it hides from the application list and keeps running in the background and triggers the malicious activities.

Trend Micro Researcher says “XLoader creates a provisional web server to receive the broadcast events. It can also create a simple HTTP server on the infected device to deceive victims. It shows a web phishing page whenever the affected device receives a broadcast event (i.e., if a new package is installed or if the device’s screen is on) to steal personal data, such as those keyed in for banking apps”.

The Phishing page translated to Korean, Japanese, Chinese, or English based on the device language that setup in the device. It is capable of collecting SMS details, records phone calls, steals personal and financial data from the device.

XLoader abuses WebSocket protocol over SSL/TLS to establish persistent and secure communication with C&C server, it also abuses message pack to steal the exfiltrated the data faster.

Mitigations

Setup complex password to routers.
Regularly update the Router & Firewall Firmware.
Monitoring the router’s DNS setting at regular intervals.
Stay wise against social engineering attacks.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Halo ITSM Vulnerability Lets Attackers Inject Malicious SQL Code

A critical security flaw has been discovered in Halo ITSM, an IT support management software...

Australian Pension Funds Hacked: Members Face Financial Losses

Several of Australia’s largest superannuation funds have been targeted in a coordinated cyberattack, leading...

Frida Penetration Testing Toolkit Updated with Advanced Threat Monitoring APIs

In a significant update to the popular dynamic instrumentation toolkit Frida, developers have introduced...

OpenVPN Flaw Allows Attackers Crash Servers and Run Remote Code

OpenVPN, a widely-used open-source virtual private network (VPN) software, has recently patched a security...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Operation HollowQuill Uses Malicious PDFs to Target Academic and Government Networks

A newly uncovered cyber-espionage campaign, dubbed Operation HollowQuill, has been identified as targeting academic,...

New Trinda Malware Targets Android Devices by Replacing Phone Numbers During Calls

Kaspersky Lab has uncovered a new version of the Triada Trojan, a sophisticated malware...

Hackers Selling SnowDog RAT Malware With Remote Control Capabilities Online

A sophisticated remote access trojan (RAT) dubbed SnowDog has surfaced on underground cybercrime forums, prompting alarms...