Monday, February 24, 2025
HomeAndroidBeware!! BrazKing Android Malware Upgraded & Attack Banks

Beware!! BrazKing Android Malware Upgraded & Attack Banks

Published on

SIEM as a Service

Follow Us on Google News

The BrazKing Android Banking trojan has resurfaced in the form of a phishing app to gain access to financial data. 

The app has been updated with new dynamic overlays to create the illusion that the banking data is being accessed. This technique will also work without requesting risky permissions, which can raise red flags for security apps.

Banking Trojans are generally designed to steal banking credentials that are transmitted through the Android device. The only purpose is to steal money from the victim’s account.

A local threat group operates BrazKing, and it mainly targets Brazillian users. While it’s being tracked during the examination of IBM Trusteer researchers and MalwareHunterTeam, BrazKing belongs to the RAT category, and it’s an Android banking Trojan.

Stealthier Version of BrazKing

The BrazKing developers now use its core overlay mechanism to pull fake overlay screens from the C2 server in real-time. In short, BrazKing is more agile than before, with this move to a new overlay technique.

To detect which app the user opened, the BrazKing abused the Android’s accessibility service in its previous version which is known as “PixStealer.” Here, from a hardcoded URL, the BrazKing pulls an overlay screen to present it on top of the targeted banking app when it detects the launch of that targeted banking app.

According to the Security Intelligence report, In the same manner, the desktop banking Trojans also deliver their malicious configurations and web injections. Not only that even, BrazKing also has the ability to steal two-factor authentication (2FA) codes to carry out financial fraud attacks.

Abilities

Here we have mentioned all the abilities that BrazKing king can perform:-

  • Rather than taking screenshots in picture format, BrazKing operates the screen programmatically.
  • Keylogger capabilities 
  • RAT capabilities
  • Read SMS without the ‘android.permission.READ_SMS’ permission
  • Read contact lists without ‘android.permission.READ_CONTACTS’ permission
  • Input injection
  • Fake overlay screens
  • Stealing 2FA Codes

Data collected

Here we have mentioned all the data collected by the BrazKing from the compromised Android devices:-

  • BUILD version
  • Device name
  • OS version
  • Device manufacturer
  • Android ID
  • List of installed apps
  • Display properties

Infection Cycle of BrazKing

With a social engineering message, the infection cycle of BrazKing starts with a link to an HTTPS website. Here, in this stage, it warns the target user about the security threats in their devices.

But, here at this point, updating the operating system to the latest version prompts a fake overlay and tricks the user into enabling the “install apps from unknown sources” option from settings.

Here we have mentioned the infection cycle of BrazKing below:-

  • Initial Download
  • Request access to the “Accessibility Service”
  • First Run – New Bot Registration
  • Remove-Me-Not

So, the experts have strongly recommended users to stay alert and cautious with APK downloads outside the Google Play Store.

But, apart from this, they have also asserted that this BrazKing Android banking trojan operated by the local threat groups in Brazil, and that’s on Portuguese-speaking websites they are being circulated.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Exim Mail Transfer Vulnerability Allows Attackers to Inject Malicious SQL

A newly disclosed vulnerability in the Exim mail transfer agent (CVE-2025-26794) has sent shockwaves...

Biggest Crypto Hack in History – Hackers Stolen $1.46 Billion Worth Crypto From Bybit

In what has become the largest cryptocurrency theft in history, hackers infiltrated Bybit’s Ethereum...

PoC Exploit Released for F5 BIG-IP Command Injection Vulnerability

Security researchers have disclosed critical details about CVE-2025-20029, a command injection vulnerability in F5’s BIG-IP...

Google Introduces Quantum-Safe Digital Signatures in Cloud KMS

Google Cloud has unveiled a critical cybersecurity upgrade: quantum-safe digital signatures via its Key Management Service...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New Zhong Stealer Malware Exploit Zendesk to Attack Fintech and Cryptocurrency

A newly identified malware, dubbed Zhong Stealer, has emerged as a significant threat to...

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...