Friday, June 14, 2024

Banking Trojan “BankBot” Infected More Than 150 Play Store Apps to Steal Bank Details

Android Based Banking Trojan Called “Bankbot” Discovered from Google Play store and the Infected  Count Could be Around 150 to 160 apps Along with this, 5 United Arab Emirates (UAE) banking apps were added to the list.

Bankbot Malware Basically considering as too Risky one when its behavioral Intelligence Mimics as legitimate with existing Banking application and create a fake overlay which helps to steal the Credentials from Victims.

Few Month before Sophisticated same Banking Trojan “BankBot” Reach Play Store Which Avoids Detection by Google Security Scanner.

One of the BankBot App From Google Play

Bankbot mostly Trgeting the Entertainment And Banking related Plat Stote Apps that targets legitimate apps from banks based in 27 different countries.

Newly Discovered Bankbot Variant Infected By 5 Utility Google Play Store Apps that disguised as utility apps and one Particular Bankbot infected apps were downloaded 5000-10000 times.

 Also Read    BankingTrojan Called “EMOTET” Re-emerging to Steal Username And Password

How Does This Bankbot Banking Trojan Works

Once user Download and get installed into Android Mobile, Initially it will check all the Package information of the installed Machine.

In this case, Bankbot Discover one of the targetted Banking apps Availability, then Label and Target Package Name will be sent to the Attacker by connecting the C&C Server

The C&C server will send a URL to BankBot so it can download the library that contains files used for the overlay webpage. When targeting UAE banking apps, this newer variant of BankBot includes an additional step. Instead of showing the fake overlay page directly, BankBot will prompt the user to enter their phone number. Then the C&C server will send a pin code to the victim via Firebase Message.
Banking Trojan

Fake Emirates Banking App Screen

Downloaded Web page overlayed on top of the Legitimate Banking Application and steal the Victims Credentials.

Later Installed Banking Apps Details send to via C&C Server after downloads the library from the URL that contains Packed e APK  cache directory.

According to Trend Micro Report, The C&C server will acknowledge the download with the message “success” an hour after it happens. The delay could either be a strategy the malware uses to avoid antivirus sandbox detection, or it is simply busy generating fake overlay webpages for the device token

BankBot Malware will only Work When it meets these 3 conditions

  • The running environment is a real device
  • The location of the device is not in Commonwealth of Independent States (CIS) countries
  • An app of a targeted bank is installed on the device

“Apparently, the author of BankBot wants to verify the banking details of their victims. They ask for the details twice, just in case users input it incorrectly at first. BankBot will send the stolen data to the C&C server only after account information is entered twice. Trend Micro Said.”

Website

Latest articles

Sleepy Pickle Exploit Let Attackers Exploit ML Models And Attack End-Users

Hackers are targeting, attacking, and exploiting ML models. They want to hack into these...

SolarWinds Serv-U Vulnerability Let Attackers Access sensitive files

SolarWinds released a security advisory for addressing a Directory Traversal vulnerability which allows a...

Smishing Triad Hackers Attacking Online Banking, E-Commerce AND Payment Systems Customers

Hackers often attack online banking platforms, e-commerce portals, and payment systems for illicit purposes.Resecurity...

Threat Actor Claiming Leak Of 5 Million Ecuador’s Citizen Database

A threat actor has claimed responsibility for leaking the personal data of 5 million...

Ascension Hack Caused By an Employee Who Downloaded a Malicious File

Ascension, a leading healthcare provider, has made significant strides in its investigation and recovery...

AWS Announced Malware Detection Tool For S3 Buckets

Amazon Web Services (AWS) has announced the general availability of Amazon GuardDuty Malware Protection...

Hackers Exploiting MS Office Editor Vulnerability to Deploy Keylogger

Researchers have identified a sophisticated cyberattack orchestrated by the notorious Kimsuky threat group.The...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles