Thursday, March 28, 2024

Beware of an Android Spyware Mandrake that went Undetected for Last 4 Years

Bitdefender Security Researchers identified a new, highly sophisticated spyware targeting Android users for financial motivations and distributed via Google Apps Market place.

Researchers named the threat “Mandrake” and estimated victim users were probably hundreds of thousands throughout the full 4-year period.

Malware has complete control over infected android phones as it can turn down the volume of the phone and block calls or messages, steal credentials, exfiltrate information, money transfers, and blackmailing.

Malicious applications on Google Play:

Mandrake operators published seven malicious applications, “Abfix, CoinCast, SnapTune Vid, Currency XE Converter, Office Scanner, Horoskope, and Car News “on Google Play market place for creditability.

To disguise as a legitimate app, these apps have a dedicated microsite, a Facebook page, social media accounts like Twitter, Telegram or Reddit and even YouTube channels to gain the user’s interest & trust to get victimized.

Researchers highlighted that “Besides posing as legit applications, the apps use extra techniques to avoid Google Play protection: they delay malicious activity greatly and work in stages.

These three stages are dropper, loader, and core. These functionalities have different roles and complexity. The dropper is considered the app that the victim installs from Google Play.

Android Spyware Mandrake
Mandrake Malware Chain

One cannot predict when they will get the loader and the core components, which will be downloaded by the dropper at some point when the attacker issues the command (or possibly never)”.

Threat Infrastructure

Mandrake used several hardcoded Command and Control servers as mentioned below and most of them were active for the full 4 years.  Researcher spot an active C2 server androidfirmware(.)top associated with ip address “159.69.66.184” and hosting provided by  “Hetzner Online GmbH” in Germany location.

DomainRegistration Date
rendfiles.top11-02-2016
androidfrimware.com06-04-2016
android-soft.top09-04-2016
androidfirmware.ca06-06-2016
nfmmlrkagflemt.top17-11-2016
xjkbhysexthnpl.top23-11-2016
livingstream.mobi14-12-2016
androidfirmware.top21-08-2019
Known C2 Servers

The malicious applications hosted on Google play targets mostly banking applications such as CommBank, NAB Mobile Banking, Westpac Mobile Banking, Bankwest, Bendigo Bank, St.George MobileBanking, ING Australia Banking, AustralianSuper, Beyond Bank Australia.

Other target applications belonged to cryptocurrency, communications, a gaming application, and product category. For example: PayPal Mobile Cash: Send and Request Money Fast, Microsoft Outlook: Organize Your Email & Calendar, Google Pay: Pay with your phone and send cash, Amazon Shopping – Search Fast, Browse Deals Easy, AliExpress – Smarter Shopping, Better Living, Coinbase – Buy & Sell Bitcoin, Crypto Wallet, Blockchain Wallet-Bitcoin, Bitcoin Cash, Ethereum and VIP Access.

This campaign masters all elements of a professional spyware platform,this attack is most likely financially motivated. This threat can easily defeat two-factor authentication (2FA) codes that some banks send to prevent fraud.

It conducts phishing attack on targeted application, by loading a webpage and injecting a specially crafted JavaScript code to retrieve all data from input forms loaded in an overlay web component.In some cases, for legitimate apps that are themselves webviews, the user is not aware he’s interactingwith a credential-stealing page.

As a backup measure in case JavaScript injection fails, the screen is also recorded, this MP4 recording is saved as <timestamp>.dat in the private files dir and it is later sent to the C2 server with a post request to URL http://androidfirmware.top:8888/?r=<victim UID>.

Android Spyware Mandrake
Phishing attack – An overlay screen

Mandrake targets specific countries: Australia, Canada, United States, Poland, Netherlands, Germany, Austria, Italy, Spain, United Kingdom, Belgium, Brazil, CzechRepublic, and Singapore”, besides targeting globally utilized popular applications.

It was observed that more than 40 different targeted banking applications that serve Australian users.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Website

Latest articles

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles