Cyber Security News

Gorilla Android Malware Intercepts SMS to Steal One-Time Passwords

In a concerning development within the Android ecosystem, a new malware variant known as “Gorilla” has been identified, primarily targeting financial and personal information through SMS interception.

Written in Kotlin, Gorilla appears to be in its developmental infancy, yet it already showcases sophisticated mechanisms for evasion, persistence, and data extraction.

Gorilla’s code lacks obfuscation and includes excessive logging and unused classes, hallmarks of a software still under active development.

Despite these rudimentary aspects, the malware has demonstrated a strategic understanding of Android’s security model by requesting permissions like READ_PHONE_STATE and READ_PHONE_NUMBERS, enabling it to access SIM card details and phone numbers.

Its ability to bypass battery optimizations and maintain persistent access through Android services underscores its potential for long-term monitoring without raising immediate suspicion.

SMS Interception and Command & Control

One of the Gorilla’s core functionalities is its focus on SMS interception (T1582 – SMS Control).

After promoting itself to the default SMS handler, it categorizes collected messages into tags like “Banks” and “Yandex,” indicating its primary focus on financial transactions.

This data is then relayed back to a command and control (C2) server via WebSockets at the URL ws://$URL/ws/devices/?device_id=$android_id&platform=android.

Command and Control panel of the Gorilla.

This communication not only sends back the harvested information but also allows the server to push commands like sending SMS, updating settings, or retrieving device information.

Stealth and Persistence

Gorilla employs various strategies to remain undetected and operational. It uses foreground services to maintain execution, which requires the FOREGROUND_SERVICE permission (T1541 – Foreground Persistence).

To circumvent aggressive battery-saving features prevalent in some Android devices, Gorilla delays its heartbeat service execution, particularly on devices from brands like Huawei or Honor.

Apps section of victim device.

Moreover, it is cleverly asks users to ignore battery optimizations, ensuring it can keep running.

The presence of tags like “State Authority” and “Important” within its C2 panel suggests Gorilla might not just be after financial gain but could also serve espionage or surveillance purposes.

According to the Catalyst researchers, the inclusion of an unused WebViewActivity class hints at potential future uses for phishing attacks, exploiting WebView to display fraudulent banking login pages to harvest credentials.

While Gorilla is in its nascent stages, its evolution could pose significant threats if additional features are implemented.

Security researchers must continue monitoring its development closely, as future iterations might introduce methods to capture one-time passwords (OTP) or deploy phishing attacks through sophisticated means like USSD codes.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner

The open-source penetration testing toolkit Metasploit has unveiled a major update, introducing four new modules,…

2 hours ago

Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities

Google Project Zero researchers have uncovered new sandbox escape vulnerabilities in macOS using an innovative…

3 hours ago

Cybercriminals Hide Undetectable Ransomware Inside JPG Images

A chilling new ransomware attack method has emerged, with hackers exploiting innocuous JPEG image files…

3 hours ago

Hackers Exploit Legacy Protocols in Microsoft Entra ID to Bypass MFA and Conditional Access

A sophisticated and highly coordinated cyberattack campaign came to light, as tracked by Guardz Research.…

3 hours ago

Hackers Abuse Copilot AI in SharePoint to Steal Passwords and Sensitive Data

Microsoft’s Copilot for SharePoint, designed to streamline enterprise collaboration through generative AI, has become an…

4 hours ago

Defendnot: A Tool That Disables Windows Defender by Registering as Antivirus

Cybersecurity developers have released a new tool called "defendnot," a successor to the previously DMCA-takedown-affected…

4 hours ago