Tuesday, March 4, 2025
HomeAndroidHackers Breached MDM Servers to Install Banking Malware on Android Devices

Hackers Breached MDM Servers to Install Banking Malware on Android Devices

Published on

SIEM as a Service

Follow Us on Google News

Security researchers uncovered that hackers had breached at least 75% of the MDM (Mobile Device Manager) server to install banking malware on Android devices in wide.

MDM is also recognized as EMM (Enterprise Mobility Management); it is a mechanism that is generally used by most of the companies. The company who register for enterprise-owned projects with the corresponding command server to get it more comfortable to accomplish tasks such as addressing company-wide device arrangements, disposing applications, and many more.

But, this recent conflict has now infected across 75% of the company’s devices globally. After installing it, this dangerous Cerberus variant can accumulate huge amounts of delicate data, that comprises users’ private data, and transfer it to a remote command and control (C&C) server.

Cerberus is a banking trojan, and it was initially spotted in June 2019. It simply uses a Malware-as-a-Service (MaaS) business model and allowing the clients who borrow their services to lower their payloads. And not only that, even they also allow the attackers to configure and control the devices that are compromised during their attacks.

HTML popup to steal user’s Gmail credentials.

Factory Reset all registered Devices

After getting access to the company server, which is the MDM, the hackers then start deploying the application, and after that, they managed to breach nearly 75% of companies’ Android devices.

When two malicious apps got installed on a vast number on the company’s devices within a short time, the researchers got curious, and they started to detect the conflict with the help of the breached MDM server.

Here’s what the researchers at Check Point have stated, “This is the first time we have a reported incident of mobile malware distribution that uses the MDM server as an attack vector.”

Moreover, the security researchers at Check Point has also concluded that to get rid of this malware and the ability of the attacker to control the infected Android devices, companies should immediately factory reset all the Android devices registered with the compromised MDM server.

MDM
payload module can receive from the C&C

Securing Access to Compromised Devices

Well, Cerberus simply ensures access to the compromised devices just by preventing the victims’ efforts to uninstall the TeamViewer app.

Apart from this, it obtains admin rights, and simply retard the users to uninstall any apps it requires to execute its ill-disposed tasks and it goes the same with the malware as it simply blocks any users who are trying to remove the app.

MDM
Popup window asking the user to update Accessibility Service.

Moreover, the Cerberus also deactivates the built-in Android malware security system, Google Play Protect, simply by exploiting the Accessibility Service mainly on compromised Android devices as it prevents automatic removal and detection.

MDM

“Managing this type of device implies installing the application, configuring settings, and implementing different types of policies on various devices at a time,” security researchers said.

We can state that this conflict illustrates the significance of knowing the variation between managing and securing mobile devices.

Whereas MDM contributes an accessible method to handle those devices, and more importantly, the security cannot be neglected. But, the conflict of this type happened for the first time, and now people will understand the necessity of managing and securing the devices. 

So, what do you think about this? Simply share all your views and thoughts in the comment section below.

Indicators of Compromise

C2 Server – 91.210.169[.]114

Package NameApplication Namesha256
com.wjnjrmigikmpher.efaunxmGoogle Play 1.04254670ea5f353263570792a8ff4a1e6ea35999c2454fa1ec040786d7be33b69
com.dfxsdgr.qvoorGoogle 1.06291192d0c2
f6318f9a4f345203b35cfe140be53889f9fefdd8e057a4f02e898
com.sakkkwyl.ncceberwpdhfqGTA V 1.03ef8349d4b717d73d31366dfbe941470e749222331edd0b9484955a212080ad8

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution

A newly disclosed path traversal vulnerability (CVE-2024-4885) in Progress Software’s WhatsUp Gold network monitoring...

CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent warning on March...

Threat Actors Exploiting AES Encryption for Stealthy Payload Protection

Cybersecurity researchers have uncovered a surge in the use of Advanced Encryption Standard (AES)...

33.3 Million Cyber Attacks Targeted Mobile Devices in 2024 as Threats Surge

Kaspersky's latest report on mobile malware evolution in 2024 reveals a significant increase in...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Winos4.0 Malware Targets Windows Users Through Malicious PDF Files

A new wave of cyberattacks leveraging the Winos4.0 malware framework has targeted organizations in...

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has...

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government,...